The Internal Revenue Service (IRS) issued an urgent alert yesterday (February 2, 2017) to all employers regarding the return of a phishing scam called “The Form W-2 email.” The scam, seen during previous tax seasons, has now spread from targeting small businesses to all employers, including non-profits. The W-2 scammers are also coupling their efforts to steal employee W-2 information with an older wire transfer scheme that is victimizing some organizations twice.


“This is one of the most dangerous email phishing scams we’ve seen in a long time. It can result in the large-scale theft of sensitive data that criminals can use to commit various crimes, including filing fraudulent tax returns. We need everyone’s help to turn the tide against this scheme.’’

IRS Commissioner John Koskinen


How the scam works

Cyber criminals use various spoofing techniques to disguise an email so that it appears to be from a company  executive and is a request for information like W-2 data and even social security numbers.

How do they get employee addresses? An email is sent to an employee in the payroll or human resources departments, requesting a list of all employees and their Forms W-2.

Those businesses that received the scam email last year also are reportedly receiving it again this year.

The scam reappeared last week and has seen an upswing in reports in recent days.

New twist to W-2 scam: Companies also being asked to wire money

In the latest twist, the cybercriminal follows up with an “executive” email to the payroll or comptroller and asks that a wire transfer a be made to a certain account.

Although not tax related, the wire transfer scam is being coupled with the W-2 scam email and some companies have lost both employees’ W-2s and thousands of dollars due to wire transfers.

What to do

  • The IRS urges all employers to share information with their payroll, finance and human resources employees about the W-2 and wire transfer scam.
  • Organizations receiving a W-2 scam email should forward it to phishing@irs.gov and place “W2 Scam” in the subject line.
  • Organizations that receive the scams or fall victim to them should file a complaint with the Internet Crime Complaint Center (IC3,) operated by the Federal Bureau of Investigation.
  • Employees whose Forms W-2 have been stolen should review the recommended actions by the Federal Trade Commission at or the IRS.
  • Employees should file a Form 14039, Identity Theft Affidavit, if the employee’s own tax return rejects because of a duplicate Social Security number or if instructed to do so by the IRS.

 

8
What Does HTTPS Mean? And Why a Small Business Website Needs the ‘S’

Get ready to add more security to your business website in 2017 and beyond.

9
Homeland Security Tips for Choosing Harder to Hack Passwords

In addition to password management applications and two-step validation, here are some tips for making your password harder to hack.

10
Passwords Are Stolen Everyday; How to Protect Yours From Being One of Them

Don’t wait until your password is stolen to follow these procedures.

11
How to Recognize and Avoid an Attempt to Crack Your Two-Step Verification Passwords

As attackers evolve, there are many steps businesses and consumers can take to protect themselves.

12
How Voice Recognition Software is Being Used to Detect Cyber Criminals

(In cyber crime), the weakest link is often the human. Software developers are trying to strengthen that link.

13
How to Avoid a New Cyber Attack Attempting to Access Small Business Bank  Funds

Cyber criminals are using a new attack against hundreds of small business employees.

14
Seven Resolutions for 2016 That Will Help Protect Your Small Business Computers

Simple steps you should take to help protect your computers and data in 2016.

15
Top Ten Free Antivirus Utilities For Your Small Business | 2016

PCMag.com has released its annual list of free antivirus utilities.

16
Most Small Businesses Have No Cyber Attack Response Plan

A survey reveals 80% of small business owners say their companies do not have a cyber attack response plan.

17
If Your Business Bank Account Gets Hacked, Your Bank May Blame You

For individual customers, banks must reimburse victims of cyber-fraud. For bank accounts of businesses, even one owned by one person, the same rule doesn’t apply.

18
Why You Should Still Use a Password Management System, Even if You Heard One Was ‘Hacked’

A breach of a password management system provides another opportunity to explain how a password management service is better than other methods.

19
Advice From Google on Avoiding Scams Directed at Small Businesses

A wide range of warnings for avoiding scams from con-artists claiming to be from Google.

20
More Tips for Actively Managing Your Passwords

More helpful tips and ideas for managing your passwords.

21
What Small Business Customers Should Know and Do About the JPMorgan Chase Cyberattack

From the bank’s SEC filing and information provided on Chase.com, this is what is currently known about the cyberattack and what the bank is recommending to its customers.

22
How Hackers Use ‘Social Engineering’ and How to Prevent It

Following the recent wave of celebrities having online accounts hacked, here is an explanation of “social engineering,” part of the method the cyber criminals likely used.

23
Ten Tips From the FCC for Improving Your Small Business Cyber Security

Ways to improve your small business cyber security from the U.S. Federal Communications Commission.

24
Password Protection Advice from SmallBusiness.com

Username and password protection is an ongoing requirement for small businesses. Here is a roundup of helpful advice on internet security and password management that has appeared recently on SmallBusiness.com

25
Ebay Asks 145 Million Users to Change Passwords

Ebay is asking its 145 million users to change their passwords because of a cyberattack that compromised a database containing encrypted passwords “and other non-financial data.”

26
What is Two-Step Verification and Why You Should Start Using Them

It’s incredibly easy and fast to use a two-step verification method to protect your online accounts. Here’s how they work and why you should use them.

27
How (and Why) to Use a Password Management Application

A lock on your front door doesn’t do you any good if you keep the key under the mat, just like the best security on the web won’t protect you if you have the same bad password on every site you visit.

28
How to Reduce the Odds of Being Hacked While Using Public Wifi

Getting in a solid work session at the local coffee shop may be a tempting idea, but it has its risks. Like getting your personal information stolen because you were careless on a public network.