After a spike in the number of Form W-2 scams during 2017’s tax season, the Internal Revenue Service (IRS) is preparing early for 2018’s season: urging tax professionals and businesses to beware of the increase in email scams targeting employee Forms W-2.


What is the W-2 Scam?

The W-2 scam (also called a business email compromise or BEC) is one of the most dangerous phishing email schemes trending nationwide from a tax administration perspective. As we reported at the time, the IRS saw a sharp increase in the number of incidents and victims during the 2017 filing season.

A business email compromise occurs when a cybercriminal is able to “spoof” or impersonate a company or organization executive’s email address and target a payroll, financial or human resources employee with a request. For example, fraudsters will try to trick an employee to transfer funds into a specified account or request a list of all employees and their Forms W-2.

“These are incredibly tricky schemes that can be devastating to a tax professional or business,” said IRS Commissioner John Koskinen. “Cybercriminals target people with access to sensitive information, and they cleverly disguise their effort through an official-looking email request.”


The FBI reported earlier this year that there has been a 1,300 percent increase in identified losses – with more than $3 billion in wire transfers – since January 2015. The FBI found that the culprits behind these scams are national and international organized crime groups who have targeted businesses and organizations in all 50 states and 100 countries worldwide.


During the 2016 filing season, the IRS first warned businesses that the scam had migrated to tax administration and scammers were using business email compromise tactics to obtain employees’ Forms W-2. The criminals were immediately filing fraudulent tax returns that could mirror the actual income received by employees – making the fraud more difficult to detect.

In 2017, the IRS saw the number of businesses, public schools, universities, tribal governments and nonprofits victimized by the W-2 scam increase to 200 from 50 in 2016. Those 200 victims translated into several hundred thousand employees whose sensitive data was stolen. In some cases, the criminals requested both the W-2 information and a wire transfer.


Why is the W-2 fraud so bad?

The Form W-2 contains the employee’s name, address, Social Security number, income and withholdings. That information can be used to file fraudulent tax returns, and it can be posted for sale on the Dark Net, where criminals also seek to profit from these thefts.


What should you do if your business is victimized by a W-2 or other another attack?

If the business or organization victimized by these attacks notifies the IRS, the IRS can take steps to help prevent employees from being victims of tax-related identity theft. However, because of the nature of these scams, many businesses and organizations did not realize for days, weeks or months that they had been scammed.

The IRS established a special email notification address specifically for businesses and organizations to report W-2 thefts: [email protected]. Be sure to include “W-2 scam” in the subject line and information about a point of contact in the body of the email. Businesses and organizations that receive a suspect email but do not fall victim to the scam can forward it to the BEC to [email protected], again with “W-2 scam” in the subject line.


Protecting Clients and Businesses from BECs

The IRS urges tax professionals to both beware of business email compromises as a threat to their own systems and to educate their clients about the existence of business email compromise scams. Employers, including tax practitioners, should review their policies for sending sensitive data such as W-2s or making wire transfers based solely on an email request.

Tax professionals should consider taking these steps

  • Confirm requests for Forms W-2, wire transfers or any sensitive data exchanges verbally, using previously-known telephone numbers, not telephone numbers listed in the email.
  • Verify requests for location changes in vendor payments and require a secondary sign-off by company personnel.
  • Educate employees about this scam, particularly those with access to sensitive data such as W-2s or with authorization to make wire transfers.
  • Consult with an IT professional and follow these FBI recommended safeguards:
  • Create intrusion detection system rules that flag e-mails with extensions that are similar to company email. For example, legitimate e-mail of abc_company.com would flag fraudulent email of abc-company.com.
  • Create an email rule to flag email communications where the “reply” email address is different from the “from” email address shown.
  • Color code virtual correspondence so emails from employee/internal accounts are one color and emails from non-employee/external accounts are another.
  • If a BEC incident occurs, notify the IRS. File a complaint with the FBI at the Internet Crime Complaint Center (IC3).

istock

Related Articles

9
How to Protect Your Business from Ransomware Attacks

Steps to take to keep your company’s computers from being taken hostage by criminal hackers.

10
How to Monitor Small Business Computer Security Alerts

When major security threats occur, here are places to turn for the latest updates.

11
11 Google Scams and Links to Google Support for Each | 2017

Advice for avoiding online scams that try to make you think they originate with Google.

12
IRS Issues Urgent Warning to Small Businesses: Beware of W-2 Phishing Scam Return | 2017

The IRS has issued an urgent warning about the return of an annual scam. This year it’s worse.

13
What Does HTTPS Mean? And Why a Small Business Website Needs the ‘S’

Get ready to add more security to your business website in 2017 and beyond.

14
Homeland Security Tips for Choosing Harder to Hack Passwords

In addition to password management applications and two-step validation, here are some tips for making your password harder to hack.

15
Passwords Are Stolen Everyday; How to Protect Yours From Being One of Them

Don’t wait until your password is stolen to follow these procedures.

16
How to Recognize and Avoid an Attempt to Crack Your Two-Step Verification Passwords

As attackers evolve, there are many steps businesses and consumers can take to protect themselves.

17
How Voice Recognition Software is Being Used to Detect Cyber Criminals

(In cyber crime), the weakest link is often the human. Software developers are trying to strengthen that link.

18
How to Avoid a New Cyber Attack Attempting to Access Small Business Bank  Funds

Cyber criminals are using a new attack against hundreds of small business employees.

19
Seven Resolutions for 2016 That Will Help Protect Your Small Business Computers

Simple steps you should take to help protect your computers and data in 2016.

20
Top Ten Free Antivirus Utilities For Your Small Business | 2016

PCMag.com has released its annual list of free antivirus utilities.

21
Most Small Businesses Have No Cyber Attack Response Plan

A survey reveals 80% of small business owners say their companies do not have a cyber attack response plan.

22
If Your Business Bank Account Gets Hacked, Your Bank May Blame You

For individual customers, banks must reimburse victims of cyber-fraud. For bank accounts of businesses, even one owned by one person, the same rule doesn’t apply.

23
Why You Should Still Use a Password Manager

A breach of a password management system provides another opportunity to explain how a password management service is better than other methods.

24
Advice From Google on Avoiding Scams Directed at Small Businesses

A wide range of warnings for avoiding scams from con-artists claiming to be from Google.

25
More Tips for Actively Managing Your Passwords

More helpful tips and ideas for managing your passwords.

26
What Small Business Customers Should Know and Do About the JPMorgan Chase Cyberattack

From the bank’s SEC filing and information provided on Chase.com, this is what is currently known about the cyberattack and what the bank is recommending to its customers.

27
How Hackers Use ‘Social Engineering’ and How to Prevent It

Following the recent wave of celebrities having online accounts hacked, here is an explanation of “social engineering,” part of the method the cyber criminals likely used.

28
Ten Tips From the FCC for Improving Your Small Business Cyber Security

Ways to improve your small business cyber security from the U.S. Federal Communications Commission.

29
Password Protection Advice from SmallBusiness.com

Username and password protection is an ongoing requirement for small businesses. Here is a roundup of helpful advice on internet security and password management that has appeared recently on SmallBusiness.com

30
Ebay Asks 145 Million Users to Change Passwords

Ebay is asking its 145 million users to change their passwords because of a cyberattack that compromised a database containing encrypted passwords “and other non-financial data.”

31
What is Two-Step Verification and Why You Should Start Using Them

It’s incredibly easy and fast to use a two-step verification method to protect your online accounts. Here’s how they work and why you should use them.

32
How (and Why) to Use a Password Management Application

A lock on your front door doesn’t do you any good if you keep the key under the mat, just like the best security on the web won’t protect you if you have the same bad password on every site you visit.

33
How to Reduce the Odds of Being Hacked While Using Public Wifi

Getting in a solid work session at the local coffee shop may be a tempting idea, but it has its risks. Like getting your personal information stolen because you were careless on a public network.