Tax season is predictable. Attackers are not. Every filing window brings a spike in tax-themed phishing, credential harvesting, and illicit marketplaces selling stolen returns or forged IRS documents. Security teams should treat tax season like a recurring high-risk event and plan accordingly.
The evidence is clear: threat actors weaponize tax messaging, malicious domains, URL shorteners and even QR codes to trick taxpayers and tax professionals into giving up credentials or opening malware-laden attachments. At the same time, deep and dark web vendors trade ready-made fraudulent tax forms and completed returns, which lowers the bar for large scale fraud. These are not hypothetical tactics. They are active campaigns that intensify as deadlines approach, and they are increasingly automated and scalable.
Those campaigns collide with real operational stress inside tax administrations. The IRS has for years struggled with a growing inventory of identity-theft victim assistance cases and long resolution times. Public reporting by the Taxpayer Advocate shows hundreds of thousands of IDTVA cases and average resolution timelines measured in many months rather than weeks. That backlog is not just an administrative problem. It is a force multiplier for attackers because slow response increases taxpayer harm and public distrust.
Operational gaps create a second wave of harms. When the agency cannot triage or resolve suspected fraud quickly, legitimate returns get suspended, refunds are delayed, and victims must wait months for restitution. Those delays fall disproportionately on lower income taxpayers who rely on refunds to meet basic needs. Adversaries count on that friction. If you are defending a tax practice or a customer base, assume attackers will exploit any delay, confusion, or gap in verification workflows.
So what are the practical lessons for organizations, tax professionals and technologists? Start with threat reduction and data hygiene:
- Harden email and web channels. Enforce SPF, DKIM and DMARC to make spoofing harder. Monitor for lookalike domains and register common permutations of your firm domain. Use real-time domain and certificate monitoring to detect impersonation before a campaign scales.
- Assume phishing will bypass perimeter filters. Protect accounts with multi-factor authentication that resists SMS interception, prefer hardware keys or app-based OATH with phishing-resistant push where possible. Combine this with conditional access and device posture checks for remote logins.
- Minimize the PII footprint. Only collect and store the personally identifiable information you need, encrypt data at rest and in transit, and adopt strict retention schedules. Tax preparers should avoid storing full SSNs in clear text and move to tokenization for repeat-client workflows.
- Secure file exchange. Replace email attachments with authenticated client portals that log access, apply watermarking, and support end-to-end encryption. If you use cloud file sharing, enforce tenant restrictions, link expiration, and preview-only modes for sensitive documents.
- Train on the seasonal threat model. Phishing simulations for tax-season scenarios should be run in January and repeated in March. Teach staff to verify unusual submission requests, to validate preparer PTINs, and to resist pressure tactics commonly used by imposters.
For incident response and customer care, prioritize speed and transparency:
- Pre-build a tax-season IR playbook. Include templates for client notifications, steps to lock accounts, credit and deposit monitoring instructions, and escalation paths to law enforcement and the IRS. Time is the scarce resource here; playbooks reduce cognitive load during peak incidents.
- Automate evidence collection. Use centralized logging and immutable storage for incoming suspicious emails, uploaded documents and account access records. That reduces investigation time and supports faster remediation and disputes.
- Offer remediation bundles. Affected taxpayers need short-term cash flow options, credit monitoring, and clear instructions on filing Form 14039 when appropriate. Firms that package these services reduce client churn and limit downstream fraud.
Tax professionals should also adopt population-level defenses. Encourage clients to file early, sign up for an identity protection PIN if eligible, and consider credit freezes when identity theft risk is confirmed. Regulators and industry groups have long pushed awareness campaigns for exactly these behaviors.
At the systems level there are persistent policy and engineering gaps to address. The IRS and its partners have repeatedly flagged the need for improved automation, better backend processing for electronic document uploads, and expanded online account functionality to reduce manual casework. Investing in robust document ingestion pipelines, automated identity verification with privacy-respecting signals, and stronger fraud detection models will reduce the dependence on scarce human triage during peak season. These are not silver bullets, but they are critical capacity multipliers.
Finally, public-private collaboration matters. The Security Summit model and industry sharing of Indicators of Compromise and malicious domains is effective because attackers move fast and defenders operate in silos. Tax software vendors, state revenue departments, banks, and security vendors must share telemetry, lock down abusive domains, and coordinate takedowns earlier in the kill chain. The cost of delaying that coordination is measured in stolen refunds and damaged trust.
Tax season will always be a target. That means defenders must treat it as a mission-critical, annually recurring exercise. Prepare earlier, instrument systems for rapid detection, automate what you can, and keep human experts focused on the cases automation cannot resolve. When the next wave hits, speed and simplicity in response will protect more people than any single piece of technology.