I Need IT Support Now
IRS Phishing
Shane

Tax Season Phishing Alert: Microsoft Warns 29,000 Users Targeted with IRS Lures

Tax Season Phishing: What Houston Businesses Should Check This Week – Practical Steps to Protect Your Business from Tax Season Credential Theft

Tax Season Phishing Alert: Microsoft Warns 29,000 Users Targeted with IRS Lures and RMM Malware
Cybersecurity Alert - March 2026

Tax Season Phishing Alert: Microsoft Warns 29,000 Users Targeted with IRS Lures and RMM Malware

Attackers are weaponizing legitimate IT tools to gain persistent access to business networks - and tax season is the bait.

TL;DR
Microsoft identified multiple phishing campaigns exploiting tax season urgency to target 29,000+ U.S. users. Attackers use IRS-themed lures to steal credentials via phishing-as-a-service platforms and deploy legitimate remote management tools as persistent backdoors. RMM tool abuse has surged 277% year-over-year.

On March 19, 2026, Microsoft Threat Intelligence published a detailed analysis of multiple phishing campaigns targeting U.S. businesses and individuals during the 2026 tax filing season. One campaign alone reached approximately 29,000 users in a single day. For Houston businesses already juggling year-end financials and compliance deadlines, this is a direct and immediate threat to your cybersecurity posture.

What makes these campaigns different from typical phishing attempts is the payload. Rather than dropping traditional malware, attackers are installing legitimate remote monitoring and management (RMM) tools - the same software your IT department might use - to quietly take control of compromised systems. Your security tools are less likely to flag a recognized IT application, which is exactly what the attackers are counting on.

CinchOps is a managed IT services provider based in Katy, Texas, serving small and mid-sized businesses across the Houston metro area. CinchOps specializes in cybersecurity, network security, managed IT support, VoIP, and SD-WAN for businesses with 10-200 employees.

Critical reminder: The IRS does not initiate contact with taxpayers by email, text message, or social media to request personal or financial information. Any email claiming to be from the IRS asking you to click a link or download a file is fraudulent - full stop.
⚠️
What Microsoft Discovered
A coordinated set of tax-season phishing campaigns combining credential theft with persistent remote access.

Microsoft's Threat Intelligence team tracked several distinct but overlapping campaigns between January and March 2026, all exploiting tax season anxiety. The campaigns share a common playbook: send urgently worded emails that look like they're from the IRS or a tax preparer, then either harvest credentials through fake sign-in pages or trick users into installing remote access software.

The scale is significant. One IRS-impersonation campaign hit roughly 29,000 mailboxes in a single day, targeting organizations across every major industry vertical. The emails impersonated the IRS, claiming potentially irregular tax returns had been filed under the recipient's Electronic Filing Identification Number (EFIN). Recipients were told to review returns by downloading a fake "IRS Transcript Viewer."

By the Numbers
Key figures from Microsoft's tax season threat analysis
29,000
Users targeted in a single day by the IRS transcript campaign
277%
Year-over-year increase in RMM tool abuse by attackers
79%
Of ransomware cases involved at least one RMM tool
14
Fake IRS sender identities rotated per campaign
49
Unique email subject lines to evade detection
100+
Organizations hit by W-2 QR code campaign
Energy365
100,000s/day
SneakyLog
Active since 2025
ScreenConnect
Primary tool
SimpleHelp
Rising adoption
Datto
Secondary
Sources: Microsoft Threat Intelligence (March 2026), Huntress Annual Report, Microsoft Digital Defense Report 2025

To boost credibility, the attackers rotated across 14 different IRS-themed sender display names and at least 49 different email subject lines. This rotation is designed to slip past email security systems that rely on matching known malicious patterns. The emails were sent through Amazon Simple Email Service, a legitimate platform that many businesses use for outbound email - another layer of camouflage.

Two major phishing-as-a-service (PhaaS) platforms powered these campaigns: Energy365 and SneakyLog (also called Kratos). Energy365 alone is responsible for hundreds of thousands of malicious emails every day, according to Microsoft's telemetry. SneakyLog has been active since early 2025 and specializes in harvesting both credentials and two-factor authentication codes, which means even MFA-protected accounts aren't automatically safe.

Campaign Timeline
How the 2026 tax season phishing campaigns escalated from January through March
DateCampaignScale
Jan - Feb Tax-themed domains registered using keywords like "tax" and "1099form," impersonating legitimate tax filing companies Preparation
Feb 5-6 CPA lure campaign via Energy365 PhaaS - Excel and OneNote attachments targeting financial services, education, consulting Hundreds of emails
Feb 8-10 Tax Form 1099-R campaign delivers ScreenConnect RMM tool via malicious executables across multiple U.S. industries Hundreds + RMM
Feb 10 W-2 QR code campaign via SneakyLog PhaaS targets manufacturing, retail, healthcare - steals M365 credentials + 2FA ~100 organizations
Feb 23 + 27 Cryptocurrency 1099 campaign abuses Eventbrite to impersonate IRS - targets higher education with ScreenConnect and SimpleHelp Thousands of emails
March IRS Transcript Viewer campaign - 14 sender identities, 49 subject lines, sent via Amazon SES, Cloudflare bot protection, ScreenConnect payload 29,000 in one day
April 15 tax deadline approaching. Based on prior year patterns, Microsoft expects campaigns to intensify through mid-April as filing urgency peaks.
🎯
How the Attacks Work
Multiple lure strategies converging on the same goals: credential theft and remote access.

Microsoft documented at least four distinct attack chains operating simultaneously. Each one targets a different slice of the business world, and each uses a slightly different lure:

  • CPA and accountant lures: Emails impersonating specific accounting firms delivered Excel and OneNote attachments. The OneNote files used a real CPA's name and logo to appear legitimate. Clicking the embedded link landed victims on an Energy365 phishing page that harvested email credentials. This campaign specifically targeted financial services, education, and consulting organizations.
  • W-2 and QR code lures: On February 10, 2026, roughly 100 organizations in manufacturing, retail, and healthcare received emails with the subject "2025 Employee Tax Docs." The attachment contained a personalized Word document with the recipient's name and a QR code pointing to a phishing page built on the SneakyLog platform - designed to steal Microsoft 365 credentials and 2FA codes.
  • Cryptocurrency 1099 lures: Sent on February 23 and 27, several thousand emails targeted higher education organizations with the subject "IR-2026-216." The email body referenced a "Cryptocurrency Tax Form 1099" and included a URL that, when pasted into a browser, downloaded an MSI file containing either ScreenConnect or SimpleHelp remote access tools.
  • IRS transcript viewer lures: The largest campaign, hitting 29,000 users, used EFIN-themed urgency to drive downloads of a fake IRS application. The downloaded package was actually a maliciously configured ScreenConnect installer that gave attackers remote access to the victim's machine.

The common thread across all four: attackers are combining social engineering with real infrastructure. Legitimate email platforms, real business names, customized documents with actual recipient data, and trusted software tools. Every layer is designed to look normal.

Four Attack Chains at a Glance
Each campaign uses a different lure but converges on the same outcomes
StageCPA LuresW-2 / QR CodeCrypto 1099IRS Transcript
Email lure Fake accountant emails Employee tax docs Fake IRS crypto forms EFIN alert scam
Delivery Excel / OneNote with CPA branding Word doc + personalized QR code Non-clickable paste-in URL Download button for fake app
Payload Energy365 PhaaS - credential theft SneakyLog PhaaS - credentials + 2FA ScreenConnect / SimpleHelp RMM ScreenConnect RMM
Result Account compromise Account + MFA compromise Persistent remote access Persistent remote access
All paths lead to: data theft, lateral movement, ransomware deployment
Financial Services Education Manufacturing Retail Healthcare Consulting All Verticals
🔧
The RMM Malware Problem
Why legitimate IT tools are becoming attackers' favorite weapons.

Here's the part that should make every business owner's blood pressure spike. The "malware" being deployed in these campaigns isn't really malware at all. It's ConnectWise ScreenConnect, SimpleHelp, and Datto - the same remote monitoring and management tools that thousands of legitimate IT departments and managed service providers use every day. Cybersecurity Houston-area businesses rely on similar tools for routine support and maintenance.

That's what makes this attack strategy so dangerous. When your endpoint protection sees ScreenConnect running on a workstation, it doesn't raise an alarm. It's a known, trusted application. But in the hands of an attacker, it functions exactly like a remote access trojan - giving them full control over the compromised machine, the ability to move across your network, and a persistent connection that survives reboots.

The numbers tell the story. Huntress reported that RMM tool abuse by threat actors has surged 277% year-over-year. Microsoft's own 2025 Digital Defense Report found that 79% of ransomware incidents their incident response team handled involved at least one RMM tool. ConnectWise has already revoked a specific code-signing certificate used in these tax-season campaigns due to widespread abuse.

The attackers aren't sloppy about it, either. The IRS transcript viewer campaign used Cloudflare's bot protection to screen out automated security scanners, ensuring only real human victims reached the malicious download page. Once ScreenConnect was installed, the attacker-controlled instance facilitated data theft, credential harvesting, and additional post-exploitation activity.

🔒

Is Your Business Running Unauthorized RMM Tools?

Many small businesses in Houston, Katy, and Sugar Land don't have visibility into what remote access software is running on their endpoints. If an attacker installs ScreenConnect alongside your legitimate management tools, would your team notice? This is exactly the kind of gap a proper cybersecurity assessment can identify.

Get a Free Security Assessment →
🏢
Who Is Being Targeted
These campaigns aren't limited to one industry - they're hitting businesses across the board.

Microsoft's data shows broad targeting across virtually every industry. The CPA-themed campaign focused on financial services, education, and consulting. The W-2 campaign zeroed in on manufacturing, retail, and healthcare. The cryptocurrency lure hit higher education hardest. And the 29,000-user IRS campaign spread across multiple verticals indiscriminately.

For Houston-area businesses, the implications are straightforward. If you're a CPA firm or accounting practice, your team is handling sensitive client tax data right now - making them prime targets for credential-harvesting campaigns. Law firms dealing with tax-related matters face similar exposure. Manufacturing and construction companies with administrative staff who process W-2s and 1099s are being directly targeted by the QR code campaigns.

Wealth management firms and energy services companies in the Houston metro area handle financial data that makes them attractive targets for both credential theft and the follow-on ransomware attacks that RMM tool access can enable.

The IRS also released its 2026 "Dirty Dozen" list of tax scams this month, confirming that phishing remains the top tactic criminals use during filing season. The pattern is consistent year after year - but the tools and techniques keep getting more sophisticated.

🛡️
How to Protect Your Business
Practical steps you can take this week to reduce your exposure to tax-season phishing campaigns.

The good news is that these attacks, while sophisticated in their packaging, are preventable with the right controls. Here's where to focus your cybersecurity effort right now:

  • Audit your RMM tools immediately: Know exactly which remote access tools are authorized on your network. If you find ScreenConnect, SimpleHelp, Datto, or any other RMM tool that your IT team didn't install, treat it as a potential compromise and investigate. Check for installations in non-standard directories or with renamed executables.
  • Enforce phishing-resistant MFA: Standard two-factor authentication using SMS or authenticator app codes isn't enough anymore - SneakyLog is specifically designed to intercept 2FA tokens. Push notifications, hardware security keys, or certificate-based authentication provide stronger protection.
  • Implement conditional access policies: Restrict sign-ins from unfamiliar locations, unmanaged devices, or suspicious IP ranges. Conditional access is one of the most effective controls against credential theft, because even stolen credentials can't be used from unauthorized contexts.
  • Train your team on tax-season scams: Make sure every employee knows that the IRS never sends emails requesting downloads, clicks, or personal information. Run a simulated phishing exercise using tax-themed lures before April 15.
  • Block known malicious domains: Microsoft's research identifies specific domains used in these campaigns, including domains using keywords like "tax" and "1099form." Your DNS filtering and web security gateway should be updated to block newly registered domains matching these patterns.
  • Enable zero-hour auto purge: If you're running Microsoft 365, enable ZAP in Defender for Office 365. This feature retroactively removes malicious emails from mailboxes after new threat intelligence becomes available - catching messages that initially slipped through.

If your business operates in Cypress, The Woodlands, or anywhere across the Houston metro area and you're not sure whether your current IT provider is monitoring for unauthorized RMM installations, that's a gap you should close before tax season ends.

Is This Tax Email Real?
Share this interactive checklist with your team - click through each question to assess a suspicious email
Question 1 of 5
Does the email claim to be from the IRS?
Does the email claim to be from the IRS?
Stop - this is a scam. The IRS never initiates contact via email, text, or social media. Never click links or download files. Delete the email and report it to your IT team immediately.
Does the email claim to be from the IRS?
Question 2 of 5
Does it ask you to click a link, scan a QR code, or download a file?
Does it ask you to click a link, scan a QR code, or download?
Question 3 of 5
Is it referencing tax forms (W-2, 1099, EFIN) or refunds?
Is it referencing tax forms or refunds?
High risk - likely phishing. Tax-themed emails with download links or QR codes match the exact pattern Microsoft identified in the 2026 campaigns. Do not interact with the email. Forward it to your IT team and delete it.
Is it referencing tax forms or refunds?
Question 4 of 5
Does the sender domain match the company it claims to be from?
Does the sender domain match?
Suspicious - do not click. Domain mismatches are a strong indicator of phishing. Report to your IT team before taking any action.
Does the sender domain match?
Question 5 of 5
Were you expecting this email? Did you request this document?
Were you expecting this email?
Proceed with caution. Unsolicited emails with download requests should always be verified. Contact the supposed sender through a known phone number or email - not through the email itself - to confirm legitimacy before clicking anything.
Were you expecting this email?
Likely legitimate - but still verify. Hover over links before clicking to confirm the destination URL matches the expected domain. If anything looks off, contact the sender directly through a known channel.
Does it ask you to click a link, scan a QR code, or download?
Lower risk. Informational emails without links or downloads are less likely to be phishing. Still verify the sender if the content seems unusual or creates a sense of urgency.
🤝
How CinchOps Can Help
Protecting Houston businesses from phishing, RMM abuse, and the threats that follow.

In 30 years working in IT - including time at Cisco managing enterprise security infrastructure - the pattern I see most often with small and mid-sized businesses is that phishing protection gets treated as a checkbox rather than a layered defense. These tax-season campaigns prove why that approach fails. The emails get past basic filters. The payloads look legitimate. And by the time someone notices something is wrong, an attacker has been sitting on the network for weeks.

CinchOps provides the kind of cybersecurity coverage that prevents these scenarios from turning into breach headlines:

  • Endpoint monitoring and RMM auditing: We maintain visibility into every piece of software running on your managed endpoints. Unauthorized remote access tools get flagged and investigated before they can be used for lateral movement or data exfiltration.
  • Advanced email security: Our email protection goes beyond basic spam filtering. We implement conditional access policies, safe links, safe attachments, and zero-hour auto purge to catch phishing emails even after delivery.
  • Phishing-resistant MFA deployment: We configure and manage multi-factor authentication that can withstand adversary-in-the-middle attacks like those used by SneakyLog and Energy365.
  • Security awareness training: Regular, targeted training and simulated phishing exercises that use current, real-world lures - including tax-season scenarios - to keep your team sharp.
  • 24/7 threat monitoring: Our managed detection and response capabilities mean suspicious activity gets investigated in real time, not the next business day.
  • Incident response planning: If a phishing email does get through, we ensure your business has a tested, documented response plan that limits damage and accelerates recovery.

The businesses we work with across Houston, Katy, Sugar Land, and Fulshear don't have to wonder whether someone on their team accidentally installed a backdoor through a fake IRS email. We're already watching for it.

Frequently Asked Questions

What is an RMM tool and why are attackers using them?

A remote monitoring and management (RMM) tool is software used by IT departments and managed service providers to remotely access and manage computers. Attackers deploy RMM tools like ScreenConnect and SimpleHelp because they are trusted applications that most security software won't flag as malicious. This lets attackers maintain persistent access to compromised systems while blending in with normal IT operations.

How can I tell if a tax-related email is a phishing attempt?

The IRS never initiates contact via email, text, or social media to request personal or financial information. Any email asking you to click a link, download a file, or provide credentials related to tax filing is fraudulent. Check the sender domain carefully, hover over links before clicking, and verify any unexpected tax communications by contacting your accountant or the IRS directly through their official website at irs.gov.

My business uses ScreenConnect for IT support - should I be worried?

If ScreenConnect was installed by your authorized IT provider, that installation is legitimate. The concern is unauthorized installations - instances of ScreenConnect or other RMM tools that appear on workstations without your IT team's knowledge. Ask your IT provider to audit all RMM installations across your environment and verify that each one connects to known, authorized servers. Any unrecognized instance should be treated as a potential compromise.

Does multi-factor authentication protect against these attacks?

Standard MFA provides a layer of protection, but the SneakyLog phishing platform used in these campaigns is specifically designed to capture two-factor authentication codes in real time. Phishing-resistant MFA methods - such as FIDO2 hardware security keys, Windows Hello for Business, or certificate-based authentication - provide stronger protection because they can't be intercepted by adversary-in-the-middle phishing pages.

What should a Houston business do if an employee clicked a suspicious tax email?

Act immediately. Disconnect the affected device from the network, reset the user's credentials from a separate clean device, and check for any newly installed remote access software. Contact your IT provider or a cybersecurity incident response team to assess whether lateral movement occurred. For Houston businesses without an incident response plan, CinchOps offers complimentary security assessments to identify exposure and build a response framework.

100% Free

Know Your Business Security Score

Get a FREE comprehensive security assessment for your Houston area business. Understand vulnerabilities across your network, applications, DNS, and more.

📚
Discover More
Explore related CinchOps cybersecurity resources for Houston businesses.

Sources

Take Your IT to the Next Level!

Book A Consultation for a Free Managed IT Quote

281-269-6506