Skip to content

Free 15-minute cybersecurity consultation — no obligation

Book Free Call
Tax26 min read

Phishing Attacks on Tax Professionals: How to Fight Back

Learn how to defend your tax practice from phishing attacks targeting EFINs and client data. FTC- and IRS-compliant controls for CPAs and tax preparers.

Phishing Attacks on Tax Professionals: How to Fight Back - phishing attacks on tax professionals

Why Tax Professionals Are Prime Phishing Targets

Phishing attacks on tax professionals have reached a level of sophistication that demands more than basic spam filters and annual training reminders. The FBI Internet Crime Complaint Center documents over 300,000 phishing incidents annually, and the IRS Security Summit reports that 93% of data breaches affecting tax firms originate from phishing. Those numbers reflect a deliberate targeting strategy—not random opportunism.

Tax preparers, CPAs, and accounting firms hold an extraordinarily dense concentration of high-value data: Social Security numbers, Employer Identification Numbers, bank account credentials, prior-year returns, and complete financial portraits of individuals and businesses. That data profile commands premium prices on dark web markets and enables everything from identity theft to fraudulent refund schemes using stolen Electronic Filing Identification Numbers (EFINs).

One successful phishing attack can cascade into EFIN theft, fraudulent return filings, client identity theft, and regulatory enforcement—all simultaneously. The financial consequences extend well beyond any immediate data loss: civil penalties up to $300,000, permanent EFIN revocation, professional liability claims, and reputational damage that has forced practices to close permanently. Understanding how these attacks work—and how to stop them—is now a core business competency for every tax firm, regardless of size.

Phishing Threats to Tax Firms: By the Numbers

93%
Of Tax Firm Breaches Start With Phishing

IRS Security Summit annual reporting

300K+
Phishing Incidents Per Year

FBI Internet Crime Complaint Center (IC3)

$2.9B
BEC Losses in 2023

FBI IC3 — tax firms are high-value BEC targets

The Evolving Phishing Threat in 2026

Modern phishing attacks targeting tax professionals have moved far beyond the mass-distribution spam campaigns of the early 2010s. Today's threats combine artificial intelligence-generated content, multi-channel delivery, and meticulous social engineering timed to exploit the vulnerabilities unique to tax preparation workflows—specifically the high-pressure, deadline-driven environment of filing season.

Cybercriminals deliberately concentrate attack campaigns during peak filing periods when staff face maximum workload pressure and reduced vigilance. Campaigns routinely impersonate IRS communications, tax software vendor notifications (Drake, Lacerte, ProSeries, UltraTax, CCH Axcess), or urgent client document requests—all engineered to bypass both technical filters and human skepticism.

The NSA's Cybersecurity Information Sheet identifies attack vectors that have grown significantly: SMS phishing (smishing), messaging platform exploitation through Teams and Slack, AI-generated deepfake voice calls, and QR code phishing that sidesteps email security gateways entirely. Tax professionals who built their defenses around email filters alone are now exposed on multiple flanks.

Primary Attack Vectors Targeting Tax Firms

  • Email phishing: Spoofed IRS, software vendor, or client communications with malicious links or infected attachments
  • Spear phishing: Highly targeted attacks using researched firm details—partner names, client references, software platforms—to appear credible
  • SMS phishing (smishing): Text messages claiming urgent EFIN suspension, document availability, or client emergencies
  • Voice phishing (vishing): Phone calls using AI-generated voice clones impersonating software vendors, IRS representatives, or firm partners
  • QR code phishing (quishing): Physical mail or email with QR codes that bypass URL filtering and attachment sandboxing entirely
  • Business Email Compromise (BEC): Compromised legitimate email accounts used to send fraudulent wire transfer requests or data access demands from real addresses

Each vector requires a different defensive response. A firm relying solely on email security to address all six attack types has significant unguarded exposure—particularly to smishing, vishing, and quishing, which do not pass through email security infrastructure at all.

2026 Tax Season Security Alert

The IRS requires all tax preparers handling 11 or more individual returns to maintain an updated Written Information Security Plan (WISP) addressing phishing threats before the start of the 2026 filing season. Firms without a compliant WISP face EFIN revocation, PTIN suspension, and potential criminal referral under 26 U.S.C. § 7216. Review your WISP now—do not wait until filing season begins.

Federal Compliance Requirements That Govern Phishing Defense

Tax professionals don't get to choose whether to implement phishing defenses—federal regulations mandate specific controls. Two regulatory frameworks drive these requirements: the FTC Safeguards Rule and IRS Publication 4557. Both frameworks overlap substantially with best-practice phishing defenses, meaning compliance and security reinforce each other.

FTC Safeguards Rule Mandates

The FTC Safeguards Rule, fully enforceable since June 2023, classifies tax preparation firms as financial institutions and requires them to develop, implement, and maintain thorough information security programs. The rule's technical requirements map directly onto phishing defense:

  • Designate a qualified individual to oversee your information security program
  • Conduct risk assessments identifying reasonably foreseeable threats to customer information
  • Implement access controls limiting employee access based on business need
  • Deploy multi-factor authentication (MFA) for any individual accessing customer information from external networks
  • Encrypt customer information in transit and at rest using NIST-approved protocols
  • Maintain security awareness training for all personnel, updated at least annually
  • Monitor authorized user activity for unusual access patterns indicating account compromise
  • Maintain documented incident response procedures for phishing events and data breaches

Non-compliance carries civil penalties up to $50,120 per violation—and the FTC has demonstrated consistent willingness to pursue enforcement actions. Each affected customer may constitute a separate violation, making aggregate penalty exposure severe for firms with large client bases.

IRS Publication 4557 Security Standards

The IRS mandates security protections under IRS Publication 4557: Safeguarding Taxpayer Data, which requires tax professionals to create and maintain a Written Information Security Plan (WISP) covering administrative, technical, and physical safeguards. The WISP must specifically address email security, authentication protocols, employee phishing recognition training, and incident response procedures.

Tax professionals handling 11 or more individual returns annually must comply. Enforcement mechanisms include EFIN revocation, PTIN suspension, exclusion from IRS e-file programs, and criminal referral for willful violations. Scammers specifically target EFINs because a stolen EFIN enables mass filing of fraudulent returns—the IRS instructs that EFINs should only be shared through secure provider portals, never via email response, and any suspected EFIN phishing attempt should be reported to phishing@irs.gov.

The IRS and FTC frameworks work in concert to establish a baseline security posture that, when properly implemented, substantially reduces phishing exposure. The WISP template for tax preparers provides a starting point for firms that haven't yet built this documentation.

Technical Security Controls: A Layered Defense Architecture

Effective protection against phishing attacks requires layered technical defenses addressing multiple attack vectors simultaneously. No single control is sufficient. The following framework provides actionable guidance for deploying enterprise-grade security in tax preparation environments—including small and solo practices that often assume enterprise-grade tools are out of reach.

Email Security Architecture

Email remains the primary delivery mechanism for phishing attacks targeting tax professionals, and securing it requires multiple authentication and inspection layers working together—not just a spam filter.

Email Authentication Protocols: Configure Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) records for your domain. Microsoft's email authentication documentation confirms these protocols verify sender legitimacy and prevent the domain spoofing that bypasses traditional spam filters. Without DMARC, attackers can send email that appears to come from your own domain—or from irs.gov, your software vendor, or your largest client.

Advanced Threat Protection: Deploy email security solutions with URL rewriting and attachment sandboxing that detonate files in isolated environments before delivery. Enterprise solutions including Microsoft Defender for Office 365, Proofpoint, and Mimecast provide real-time link analysis, Safe Attachments scanning, and behavioral analytics that identify zero-day phishing campaigns before signature-based detection catches up.

External Email Warning Banners: Configure automatic warning banners on all email originating from outside your domain. This low-cost control provides a visual prompt during high-pressure periods when staff are processing high volumes and vigilance naturally decreases.

Attachment Blocking Policies: Block high-risk attachment types including executables (.exe, .scr, .bat), macro-enabled documents from unknown senders, and archive formats concealing malicious payloads. The NIST Cybersecurity Framework recommends allowlist policies permitting only file types necessary for business operations—a practical standard for tax firms whose document exchange needs are well-defined.

Multi-Factor Authentication: The Highest-Impact Control

Research from Microsoft Security demonstrates that MFA blocks 99.9% of automated credential stuffing attacks. Even when an employee falls victim to credential phishing and discloses a username and password, MFA prevents the attacker from accessing protected systems. For tax firms, MFA is the single highest-impact phishing defense available.

Deploy MFA on every access point that touches client data: all tax preparation software platforms, email accounts for all staff with client data access, cloud storage containing tax documents, remote desktop and VPN connections, administrative access to servers and network infrastructure, and client portals. Prioritize authenticator app-based MFA (Microsoft Authenticator, Google Authenticator, Duo) over SMS codes, which are vulnerable to SIM-swapping attacks. Hardware security keys using FIDO2 authentication (YubiKey, Titan Security Key) provide the strongest phishing resistance but require additional key management procedures.

For a deeper look at endpoint protection that complements MFA, see our guide on antivirus and endpoint security for tax professionals.

Endpoint Detection and Response (EDR)

Modern Endpoint Detection and Response (EDR) platforms provide essential defenses when phishing attacks successfully bypass email security and users click malicious links or download infected attachments. EDR solutions monitor endpoint behavior for indicators of compromise including credential harvesting, malware execution, unauthorized data access, and command-and-control communications.

Deploy EDR solutions from vendors including SentinelOne, CrowdStrike, or Microsoft Defender for Endpoint, or engage a managed detection and response (MDR) service providing 24/7 monitoring and incident response. EDR platforms should integrate with your security information and event management (SIEM) system for centralized threat detection and automated response. Tax firms that cannot staff an in-house security team should strongly consider managed endpoint security to maintain continuous coverage during evenings, weekends, and the high-risk periods immediately before filing deadlines.

Email Security Implementation: Step-by-Step

1

Audit Your Current Email Authentication

Use MXToolbox or Google Admin Toolbox to verify whether SPF, DKIM, and DMARC records are configured and set to enforcement mode (p=reject for DMARC). Many firms have partial configurations that provide no actual protection.

2

Deploy Advanced Threat Protection

Enable URL rewriting, Safe Attachments, and anti-phishing policies in Microsoft Defender for Office 365 or your email security platform. Configure sandboxing to detonate attachments before delivery to user inboxes.

3

Configure External Email Banners

Add a clearly visible warning banner to all externally originated email. Most email platforms support this natively. The banner should prompt staff to verify sender authenticity before clicking links or opening attachments.

4

Implement Attachment Blocking Policies

Block high-risk file types (.exe, .scr, .bat, .vbs, macro-enabled Office formats from external senders) at the email gateway level. Build an exceptions process for legitimate business needs rather than permitting by default.

5

Enable One-Click Phishing Reporting

Deploy a phishing report button in your email client (Microsoft Report Message, KnowBe4 Phish Alert Button, or similar). Immediate reporting enables faster threat intelligence updates and protects colleagues who haven't seen the same message yet.

6

Test and Measure

Run a baseline phishing simulation using KnowBe4, Proofpoint Security Awareness, or Cofense before training begins. Measure click rates and credential disclosure rates. Use results to prioritize training and measure improvement quarterly.

Procedural Safeguards and Security Awareness Training

Technical controls are necessary but not sufficient. Every phishing defense architecture has a human layer, and that layer is consistently where attacks succeed. The FTC Safeguards Rule and IRS Publication 4557 both mandate annual security awareness training—but annual-only training produces annual-only vigilance. Effective programs are continuous.

Building a Training Program That Works

Effective security awareness training for tax firms extends well beyond checking a compliance box. Training programs should include quarterly phishing simulations, targeted remediation for employees who click during simulations, and just-in-time education during peak threat periods such as the weeks leading into filing season.

Core training content should cover phishing identification techniques (spoofed sender addresses, urgency language, mismatched URLs, requests for credentials), tax-specific attack scenarios (IRS impersonation, fake software vendor notifications, EFIN suspension warnings, W-2 data requests), one-click reporting procedures, and immediate response steps when credentials are accidentally disclosed. Mobile device security deserves its own module—research indicates 48% of tax professionals check work email on personal smartphones lacking the endpoint protection deployed on office workstations, and smaller screens make phishing indicators substantially harder to detect.

Voice and Video Authentication Protocols

AI-generated deepfake voice attacks now require as little as 3 seconds of source audio harvested from publicly available interviews, voicemails, or social media posts. Attackers use cloned voices to authorize fraudulent wire transfers, request urgent client data access, or instruct staff to disable security controls. Video deepfakes are becoming increasingly accessible through real-time face-swapping tools.

The defense is procedural: establish pre-shared authentication codes with key contacts including software vendors, financial institutions, and high-value clients. Rotate these codes quarterly and never disclose them via email. For any high-value request received by phone or video—wire transfer authorizations, EFIN modifications, bulk data access requests—require callback verification using independently verified contact information from your own records, never from numbers provided in the suspicious communication.

This same verification principle applies to social engineering attacks more broadly. Legitimate vendors and government agencies will accommodate reasonable verification delays. Any caller who resists a callback procedure is itself a warning signal.

Bottom Line

Multi-factor authentication blocks 99.9% of automated credential attacks, making it the single highest-ROI phishing defense for tax firms. Combined with email authentication protocols (SPF, DKIM, DMARC), external email banners, and quarterly phishing simulations, these four controls address the majority of successful phishing scenarios at relatively low cost and complexity.

Critical Security Mistakes Tax Professionals Must Avoid

Trusting Display Names Over Actual Email Addresses

Email display names can be configured to show any text without authentication. An attacker can make an email appear to come from "IRS e-Services" or "Drake Support" using a completely unrelated sending domain. Compromised email accounts create even more dangerous scenarios—attackers send phishing from legitimate addresses after gaining access through credential theft.

Train all staff to hover over or tap sender names to reveal the actual sending address, and examine domains carefully for subtle substitutions (irs.g0v vs. irs.gov, dr4ke-software.com vs. drakeenterprise.com). Configure email security solutions to flag messages originating from external domains even when display names match internal contacts.

Inadequate Mobile Device Security

With 48% of tax professionals accessing work email on personal devices, mobile represents a significant unprotected attack surface. Personal smartphones typically lack the endpoint protection deployed on office workstations, and smaller screens make URL inspection and phishing indicator identification substantially harder.

Implement Mobile Device Management (MDM) solutions enforcing encryption, remote wipe capability, prohibition of jailbroken devices, automatic security updates, biometric authentication, and work/personal data separation. Containerized email solutions like Microsoft Intune isolate work email and documents from personal applications, limiting the blast radius when a personal device is compromised.

Processing Urgent Requests Without Out-of-Band Verification

Phishing attacks manufacture urgency to short-circuit rational decision-making. Messages claiming EFIN suspension, IRS penalties, client emergencies, or expiring software licenses use time pressure to bypass normal verification. This is the defining characteristic of most successful tax firm phishing attacks.

Establish firm-wide policies requiring out-of-band verification for all urgent requests involving financial transactions, credential disclosure, or system access changes—regardless of how authentic the sender appears. Document these verification procedures in your WISP and conduct regular training emphasizing that legitimate parties will accommodate a brief verification delay.

Overreliance on Email Security Filters

No email security solution achieves 100% detection. Zero-day phishing campaigns and highly targeted spear phishing attacks using extensive social engineering research regularly bypass automated filters. Firms that treat email security as a complete solution—rather than one layer in a defense stack—create dangerous false confidence.

Implement defense-in-depth combining email security, endpoint protection, network monitoring, access controls, and employee training. Assume some phishing emails will reach inboxes and train employees to serve as the final detection layer. For practical guidance on building this stack, see our resource on defending tax firms against cyberattacks.

Emerging Phishing Threats for 2026 and Beyond

AI-Enhanced Social Engineering

Large language models now enable attackers to generate grammatically flawless phishing emails in fluent English, eliminating the spelling errors and awkward phrasing that historically served as phishing red flags. AI tools analyze target social media profiles, professional associations, and public records to create highly personalized messages referencing specific clients, cases, or relationships—making the message feel legitimate in ways that generic campaigns cannot achieve.

This democratization of sophisticated attack capabilities means small and mid-size tax firms now face the same quality of targeted attacks previously reserved for enterprise targets. Update security awareness training to explicitly address this shift: well-written, professional-appearing communications are no longer inherently trustworthy. Verification procedures—not message quality—are the reliable defense. For context on how AI is reshaping the threat environment, see our analysis of AI agents and the evolving cyber threat kill chain.

QR Code Phishing (Quishing)

The Anti-Phishing Working Group reported a 2,000% increase in QR code phishing attacks during 2024–2025. Criminals send physical mail—formatted as IRS notices, software vendor communications, or client document notifications—containing QR codes that redirect to credential harvesting sites. Because QR codes arrive as images, they bypass URL filtering, attachment sandboxing, and link rewriting entirely.

Mobile device cameras automatically open QR code URLs without displaying the destination first, eliminating the hover-to-inspect verification that email links allow. Train staff to treat QR codes with the same suspicion as email links. Never scan a QR code from unsolicited mail claiming to originate from the IRS or a software vendor. Use QR scanner applications that preview destination URLs before loading, and implement MDM solutions that can block access to known malicious sites from mobile devices.

Business Email Compromise Evolution

BEC attacks have evolved beyond email spoofing into sophisticated account takeover campaigns. Attackers use credential phishing to access legitimate employee email accounts, then monitor communications for weeks—identifying valuable targets, learning firm procedures, and timing fraudulent requests for maximum credibility. When they act, the message appears in an existing email thread, uses a real address, and references actual clients and cases.

The FBI IC3 reported over $2.9 billion in BEC losses during 2023 alone, with tax and accounting firms representing high-value targets due to their authority over financial transactions and access to client accounts. Defense requires MFA on all email accounts (preventing the initial credential compromise), behavioral analytics detecting unusual sending patterns or off-hours access, and firm-wide verification procedures for all financial transaction requests regardless of apparent email source.

For firms managing ransomware risk alongside BEC exposure, see our guide on ransomware protection for tax practices.

Emerging Threat Statistics

2,000%
Increase in QR Code Phishing

Anti-Phishing Working Group, 2024–2025

3 Seconds
Audio Needed to Clone a Voice

Minimum source audio for AI voice deepfakes

48%
Tax Pros Using Personal Devices for Work Email

Without adequate mobile security controls

Need a WISP That Covers Phishing Defense?

Our team has helped thousands of tax professionals build IRS- and FTC-compliant Written Information Security Plans that specifically address phishing, email security, MFA, and incident response requirements.

Building Long-Term Phishing Resilience

Defending against phishing attacks on tax professionals is not a one-time project—it is an ongoing operational discipline. The threat environment changes faster than annual training cycles can track, and attackers specifically target the gaps between compliance reviews. Firms that treat security as a filing season checklist rather than a year-round practice will consistently find themselves defending against attacks they didn't know existed.

The most resilient tax firms build security into their operating rhythms: quarterly phishing simulations with immediate remediation for staff who click, monthly review of email security reports and anomaly alerts, annual WISP updates that reflect the current threat environment, and a documented incident response plan that staff have actually practiced. A secure client portal reduces the volume of sensitive document exchange happening over uncontrolled email channels—itself a meaningful phishing risk reduction.

The IRS and FTC frameworks provide the regulatory floor. The goal is to build security practices that exceed that floor—because the attackers targeting your firm are not constrained by regulatory minimum standards. For firms evaluating their overall security posture, our cybersecurity services for CPAs and accounting firms provide a structured path from compliance baseline to genuine operational security. The phishing scams resource center offers ongoing threat intelligence relevant to tax professionals throughout the year.

Protecting client data is not just a regulatory obligation—it is the foundation of the trust that sustains a tax practice. Every control implemented against phishing attacks is also an investment in that trust.

Get a Free Tax Practice Cybersecurity Assessment

Our security experts will evaluate your current phishing defenses, WISP compliance, and email security configuration — and provide a prioritized action plan at no cost.

Frequently Asked Questions

Tax preparers, CPAs, and accounting firms hold concentrated repositories of high-value personal and financial data: Social Security numbers, Employer Identification Numbers, bank account credentials, and complete financial records for individuals and businesses. This data profile enables identity theft, fraudulent tax return filing, and financial account takeover simultaneously. The IRS Security Summit reports that 93% of data breaches affecting tax firms originate from phishing attacks, reflecting deliberate targeting rather than random opportunism.

Do not reply to the email, click any links, open attachments, or scan any QR codes it contains. Forward the message to phishing@irs.gov and delete it from your inbox. The IRS initiates contact with tax professionals through official mail — not email, text messages, or phone calls demanding immediate action. If the message references your EFIN, contact the IRS Return Preparer Office through the official IRS.gov contact channels to verify whether any actual issue exists with your account.

Attackers impersonate tax software providers or IRS representatives and request EFIN information via email or fax. Once obtained, the stolen EFIN is used to file fraudulent tax returns at scale. Prevention requires strict EFIN handling policies: share your EFIN only through secure provider portals, never via email response to inbound requests. Configure email authentication (SPF, DKIM, DMARC) to prevent spoofing of your domain. Report any suspected EFIN phishing to phishing@irs.gov immediately.

MFA blocks 99.9% of automated credential stuffing attacks and prevents attackers from using stolen passwords to access your systems. It is the single highest-impact technical control for phishing defense. However, MFA does not prevent users from clicking malicious links, downloading infected attachments, or falling victim to deepfake voice attacks. Effective defense requires MFA combined with email security controls, endpoint protection, and employee training — no single control is sufficient on its own.

A Written Information Security Plan (WISP) is a documented security program required by the IRS under Publication 4557. Tax professionals handling 11 or more individual returns annually are required to maintain a WISP addressing administrative, technical, and physical safeguards — including specific provisions for email security, phishing defense, MFA, and incident response. The FTC Safeguards Rule imposes similar documentation requirements for all tax preparation firms. Firms without a compliant WISP face EFIN revocation, PTIN suspension, and civil penalties.

Quarterly simulations provide the right balance of frequency and actionability. Annual simulations are insufficient because they measure awareness only at one point in time and allow complacency to develop between tests. Monthly simulations can create alert fatigue. Quarterly exercises allow you to measure improvement, target remediation training at employees who click, and demonstrate ongoing compliance with FTC and IRS training mandates. Track click rates, credential disclosure rates, and reporting rates across each campaign to quantify program effectiveness.

QR code phishing (quishing) involves sending physical mail or email containing QR codes that redirect to credential harvesting websites. Because QR codes are image-based, they bypass email URL filters, attachment sandboxing, and link rewriting tools entirely. The Anti-Phishing Working Group reported a 2,000% increase in these attacks during 2024–2025. Protection requires training staff to treat QR codes with the same suspicion as email links, using QR scanner applications that preview destination URLs before loading, and never scanning codes from unsolicited IRS or software vendor mail.

Act immediately: (1) Change the compromised account's password and terminate active sessions. (2) Enable or verify MFA on the affected account. (3) Notify your IT team or managed security provider to begin investigating for unauthorized access. (4) Review access logs for the compromised account going back at least 30 days for signs of data exfiltration or lateral movement. (5) Assess whether client data was exposed and consult your incident response plan for breach notification requirements under your state's data breach law and the FTC Safeguards Rule. (6) Document the incident in detail for your WISP compliance records.

Attackers harvest audio from publicly available sources — video interviews, conference recordings, voicemails, social media posts — to create voice clones using generative AI tools that require as little as 3 seconds of source audio. The cloned voice is then used in phone calls to impersonate software vendors, IRS representatives, or firm partners, requesting wire transfer authorizations, bulk client data access, or EFIN modifications. Defense requires pre-shared authentication codes with key contacts, mandatory callback verification using independently verified contact information for all high-value requests, and staff training that emphasizes verification over trust in voice authenticity.

Yes — and in some respects more so. Solo practitioners and small firms typically lack dedicated IT staff, have less mature security controls, and are assumed by attackers to present easier targets. The IRS and FTC compliance obligations apply regardless of firm size. The phishing campaigns targeting EFINs and client data do not screen by firm size. Small firms should prioritize MFA, email authentication protocols, a compliant WISP, and annual training as the minimum viable security baseline, then build from there as resources allow.

Share

Share on X
Share on LinkedIn
Share on Facebook
Send via Email
Copy URL
(800) 492-6076
Share

Schedule

Need help with IRS compliance?

Our tax cybersecurity specialists can review your security posture and help you get compliant.

Protect your tax practice from cyber threats

Schedule a free consultation to assess your firm's security posture.