As Tax Day approaches in the USA on April 15, Microsoft has noticed a number of phishing campaigns utilizing tax-related themes for social engineering to steal credentials and deploy malware. These campaigns notably use redirection strategies akin to URL shorteners and QR codes contained in malicious attachments and abuse reliable providers like file-hosting providers and enterprise profile pages to keep away from detection. These campaigns result in phishing pages delivered through the RaccoonO365 phishing-as-a-service (PhaaS) platform, distant entry trojans (RATs) like Remcos, and different malware like Latrodectus, BruteRatel C4 (BRc4), AHKBot, and GuLoader.
Yearly, menace actors use varied social engineering strategies throughout tax season to steal private and monetary data, which may end up in identification theft and financial loss. These menace actors craft campaigns that mislead taxpayers into revealing delicate data, making funds to faux providers, or putting in malicious payloads. Though these are well-known, longstanding strategies, they may nonetheless be extremely efficient if customers and organizations don’t use superior anti-phishing options and conduct consumer consciousness and coaching.
On this weblog, we share particulars on the totally different campaigns noticed by Microsoft up to now a number of months leveraging the tax season for social engineering. This additionally consists of extra suggestions to assist customers and organizations defend in opposition to tax-centric threats. Microsoft Defender for Workplace 365 blocks and identifies the malicious emails and attachments used within the noticed campaigns. Microsoft Defender for Endpoint additionally detects and blocks a wide range of threats and malicious actions associated however not restricted to the tax menace panorama. Moreover, the United States Inner Income Service (IRS) doesn’t provoke contact with taxpayers by e-mail, textual content messages or social media to request private or monetary data.
BruteRatel C4 and Latrodectus delivered in tax and IRS-themed phishing emails
On February 6, 2025, Microsoft noticed a phishing marketing campaign that concerned a number of thousand emails focusing on the USA. The marketing campaign used tax-themed emails that tried to ship the red-teaming software BRc4 and Latrodectus malware. Microsoft attributes this marketing campaign to Storm-0249, an entry dealer lively since 2021 and identified for distributing, at minimal, BazaLoader, IcedID, Bumblebee, and Emotet malware. The next lists the small print of the phishing emails used within the marketing campaign:
Instance e-mail topics:
Discover: IRS Has Flagged Points with Your Tax Submitting
Uncommon Exercise Detected in Your IRS Submitting
Necessary Motion Required: IRS Audit
Instance PDF attachment names:
lrs_Verification_Form_1773.pdf
lrs_Verification_Form_2182.pdf
lrs_Verification_Form_222.pdf
The emails contained a PDF attachment with an embedded DoubleClick URL that redirected customers to a Rebrandly URL shortening hyperlink. That hyperlink in flip redirected the browser to a touchdown web site that displayed a faux DocuSign web page hosted on a site masquerading as DocuSign. When customers clicked the Obtain button on the touchdown web page, the end result relied on whether or not their system and IP tackle have been allowed to entry the subsequent stage primarily based on filtering guidelines arrange by the menace actor:
If entry was permitted, the consumer acquired a JavaScript file from Firebase, a platform generally misused by cybercriminals to host malware. If executed, this JavaScript file downloaded a Microsoft Software program Installer (MSI) containing BRc4 malware, which then put in Latrodectus, a malicious software used for additional assaults.
If entry was restricted, the consumer acquired a benign PDF file from royalegroupnyc(.)com. This served as a decoy to evade detection by safety techniques.
Determine 1. Pattern phishing e-mail that claims to be from the IRS
Determine 2. PDF attachment masquerading as a DocuSign doc
Latrodectus is a loader primarily used for preliminary entry and payload supply. It options dynamic command-and-control (C2) configurations, anti-analysis options akin to minimal course of rely and community adapter verify, C2 check-in habits that splits POST knowledge between the Cookie header and POST knowledge. Latrodectus 1.9, the malware’s newest evolution first noticed in February 2025, reintroduced scheduled duties for persistence and added the flexibility to run Home windows instructions through the command immediate.
BRc4 is a sophisticated adversary simulation and red-teaming framework designed to bypass fashionable safety defenses, nevertheless it has additionally been exploited by menace actors for post-exploitation actions and C2 operations.
Phishing e-mail with QR code in a PDF hyperlinks to RaccoonO365 infrastructure
Between February 12 and 28, 2025, tax-themed phishing emails have been despatched to over 2,300 organizations, largely in the USA within the engineering, IT, and consulting sectors. The emails had an empty physique however contained a PDF attachment with a QR code and topics indicating that the paperwork wanted to be signed by the recipient. The QR code pointed to a hyperlink related to a RaccoonO365 area: shareddocumentso365cloudauthstorage(.)com. The URL included the recipient e-mail as a question string parameter, so the PDF attachments have been all distinctive. RaccoonO365 is a PhaaS platform that gives phishing kits that mimic Microsoft 365 sign-in pages to steal credentials. The URL was probably a phishing web page used to gather the focused consumer’s credentials.
The emails have been despatched with a wide range of show names, that are the names that recipients see of their inboxes, to make the emails seem as in the event that they got here from an official supply. The next show names have been noticed in these campaigns:
EMPLOYEE TAX REFUND REPORT
Challenge Funding Request Funds Allocation
Insurance coverage Fee Schedule Bill Processing
Consumer Contract Negotiation Service Settlement
Adjustment Evaluation Worker Compensation
Tax Technique Replace Marketing campaign Targets
Workforce Bonus Distribution Efficiency Evaluation
proposal request
HR|Worker Handbooks
Determine 3. Screenshot of the opened PDF with the QR code
AHKBot delivered in IRS-themed phishing emails
On February 13, 2025, Microsoft noticed a marketing campaign utilizing an IRS-themed e-mail that focused customers in the USA. The e-mail’s topic was IRS Refund Eligibility Notification and the sender was jessicalee@eboxsystems(.)com.
The e-mail contained a hyperlink that directed customers to obtain a malicious Excel file. The hyperlink (hxxps://enterprise.google(.)com/website_shared/launch_bw(.)html?f=hxxps://historyofpia(.)com/Tax_Refund_Eligibility_Document(.)xlsm) abused an open redirector on what gave the impression to be a reliable Google Enterprise web page. It redirected customers to historyofpia(.)com, which was probably compromised to host the malicious Excel file. If the consumer opened the Excel file, they have been prompted to allow macros, and if the consumer enabled macros, a malicious MSI file was downloaded and run.
The MSI file contained two recordsdata. The primary file, AutoNotify.exe, is a reliable copy of the executable used to run AutoHotKey script recordsdata. The second file, AutoNotify.ahk, is an AHKBot Looper script which is a straightforward infinite loop that receives and runs extra AutoHotKey scripts. The AHKBot Looper was in flip noticed downloading the Screenshotter module, which incorporates code to seize screenshots from the compromised system. Each Looper and Screenshotter used the C2 IP tackle 181.49.105(.)59 to obtain instructions and add screenshots.
Determine 4. Screenshot of the e-mail displaying the hyperlink to obtain a malicious Excel file
Determine 5. Macro code to put in the malicious MSI file from hxxps://acusense(.)ae/umbrella/
GuLoader and Remcos delivered in tax-themed phishing emails
On March 3, 2025, Microsoft noticed a tax-themed phishing marketing campaign focusing on CPAs and accountants in the USA, trying to ship GuLoader and Remcos malware. The marketing campaign, which consisted of lower than 100 emails, started with a benign rapport-building e-mail from a faux persona asking for tax submitting providers resulting from negligence by a earlier CPA. If the recipient replied, they might then obtain a second e-mail with the malicious PDF. This method will increase the clicking charges on the malicious payloads because of the established rapport between attacker and recipient.
The malicious PDF attachment contained an embedded URL. If the attachment was opened and the URL clicked, a ZIP file was downloaded from Dropbox. The ZIP file contained varied .lnk recordsdata set as much as mimic tax paperwork. If launched by the consumer, the .lnk file makes use of PowerShell to obtain a PDF and a .bat file. The .bat file in flip downloaded the GuLoader executable, which then put in Remcos.
Determine 6. Pattern phishing e-mail exhibits the unique benign request for tax submitting providers, adopted by one other e-mail containing a malicious PDF attachment if the goal replies.
Determine 7. The PDF attachment accommodates a outstanding blue “Obtain” button that hyperlinks to obtain of the malicious payload. The button is overlaid over a blurred background mimicking a “W-2” tax type, which additional contributes to the phantasm of the attachment being a reliable tax file.
GuLoader is a extremely evasive malware downloader that leverages encrypted shellcode, course of injection, and cloud-based internet hosting providers to ship varied payloads, together with RATs and infostealers. It employs a number of anti-analysis strategies, akin to sandbox detection and API obfuscation, to bypass safety defenses and guarantee profitable payload execution.
Remcos is a RAT that gives attackers with full management over compromised techniques by means of keylogging, display capturing, and course of manipulation whereas using stealth strategies to evade detection.
Mitigation and safety steering
Microsoft recommends the next mitigations to scale back the affect of this menace.
Educate customers about defending private and enterprise data in social media, filtering unsolicited communication, figuring out lure hyperlinks in phishing emails, and reporting reconnaissance makes an attempt and different suspicious exercise.
Activate Zero-hour auto purge (ZAP) in Defender for Workplace 365 to quarantine despatched mail in response to newly-acquired menace intelligence and retroactively neutralize malicious phishing, spam, or malware messages which have already been delivered to mailboxes.
Pilot and deploy phishing-resistant authentication strategies for customers.
Implement multifactor authentication (MFA) on all accounts, take away customers excluded from MFA, and strictly require MFA from all units in all areas always.
Implement Entra ID Conditional Entry authentication power to require phishing-resistant authentication for workers and exterior customers for crucial apps.
Encourage customers to make use of Microsoft Edge and different net browsers that help Microsoft Defender SmartScreen, which identifies and blocks malicious web sites together with phishing websites, rip-off websites, and websites that include exploits and host malware.
Educate customers about utilizing the browser URL navigator to validate that upon clicking a hyperlink in search outcomes they’ve arrived at an anticipated reliable area.
Allow community safety to stop functions or customers from accessing malicious domains and different malicious content material on the web.
Configure Microsoft Defender for Workplace 365 to recheck hyperlinks on click on. Secure Hyperlinks offers URL scanning and rewriting of inbound e-mail messages in mail circulation and time-of-click verification of URLs and hyperlinks in e-mail messages, different Microsoft Workplace functions akin to Groups, and different areas akin to SharePoint On-line. Secure Hyperlinks scanning happens along with the common anti-spam and anti-malware safety in inbound e-mail messages in Microsoft Alternate On-line Safety (EOP). Secure Hyperlinks scanning might help shield your group from malicious hyperlinks which can be utilized in phishing and different assaults.
Activate cloud-delivered safety in Microsoft Defender Antivirus or the equal to your antivirus product to cowl quickly evolving attacker instruments and strategies. Cloud-based machine studying protections block an enormous majority of latest and unknown variants.
Allow investigation and remediation in full automated mode to permit Defender for Endpoint to take rapid motion on alerts to resolve breaches, considerably lowering alert quantity.
Run endpoint detection and response (EDR) in block mode, in order that Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus doesn’t detect the menace or when Microsoft Defender Antivirus is operating in passive mode. EDR in block mode works behind the scenes to remediate malicious artifacts detected post-breach.
Microsoft Defender XDR detections
Microsoft Defender XDR clients can discuss with the checklist of relevant detections under. Microsoft Defender XDR coordinates detection, prevention, investigation, and response throughout endpoints, identities, e-mail, apps to supply built-in safety in opposition to assaults just like the menace mentioned on this weblog.
Clients with provisioned entry can even use Microsoft Safety Copilot in Microsoft Defender to analyze and reply to incidents, hunt for threats, and shield their group with related menace intelligence.
Microsoft Defender Antivirus
Microsoft Defender Antivirus detects menace elements used within the campaigns shared on this weblog as the next:
Microsoft Defender for Endpoint
The next alerts may point out menace exercise related to this menace. These alerts, nonetheless, could be triggered by unrelated menace exercise and are usually not monitored within the standing playing cards supplied with this report.
Attainable Latrodectus exercise
Brute Ratel toolkit associated habits
A file or community connection associated to ransomware-linked actor Storm-0249 detected
Suspicious phishing exercise detected
Microsoft Defender for Workplace 365
Microsoft Defender for Workplace 365 affords enhanced options for blocking and figuring out malicious emails. These alerts, nonetheless, could be triggered by unrelated menace exercise.
A doubtlessly malicious URL click on was detected
Electronic mail messages containing malicious URL eliminated after supply
Electronic mail messages eliminated after supply
A consumer clicked by means of to a doubtlessly malicious URL
Suspicious e-mail sending patterns detected
Electronic mail reported by consumer as malware or phish
Defender for Workplace 365 additionally detects the malicious PDF attachments used within the phishing marketing campaign launched by Storm-0249.
Microsoft Safety Copilot
Safety Copilot clients can use the standalone expertise to create their very own prompts or run the next pre-built promptbooks to automate incident response or investigation duties associated to this menace:
Incident investigation
Microsoft Consumer evaluation
Menace actor profile
Menace Intelligence 360 report primarily based on MDTI article
Vulnerability affect evaluation
Notice that some promptbooks require entry to plugins for Microsoft merchandise akin to Microsoft Defender XDR or Microsoft Sentinel.
Menace intelligence studies
Microsoft clients can use the next studies in Microsoft merchandise to get probably the most up-to-date details about the menace actor, malicious exercise, and strategies mentioned on this weblog. These studies present the intelligence, safety data, and advisable actions to stop, mitigate, or reply to related threats present in buyer environments.
Microsoft Defender Menace Intelligence
Microsoft Safety Copilot clients can even use the Microsoft Safety Copilot integration in Microsoft Defender Menace Intelligence, both within the Safety Copilot standalone portal or within the embedded expertise within the Microsoft Defender portal to get extra details about this menace actor.
Searching queries
Microsoft Sentinel
Microsoft Sentinel clients can use the TI Mapping analytics (a collection of analytics all prefixed with ‘TI map’) to mechanically match the malicious area indicators talked about on this weblog submit with knowledge of their workspace. If the TI Map analytics are usually not at present deployed, clients can set up the Menace Intelligence resolution from the Microsoft Sentinel Content material Hub to have the analytics rule deployed of their Sentinel workspace.
Moreover, listed under are some pattern queries using Sentinel ASIM Capabilities for menace searching throughout each Microsoft first-party and third-party knowledge sources.
Hunt normalized Community Session occasions utilizing the ASIM unifying parser _Im_NetworkSession for IOCs:
let lookback = 7d;
let ioc_ip_addr = dynamic((“181.49.105.59 “));
_Im_NetworkSession(starttime=todatetime(in the past(lookback)), endtime=now())
| the place DstIpAddr in (ioc_ip_addr)
| summarize imNWS_mintime=min(TimeGenerated), imNWS_maxtime=max(TimeGenerated), EventCount=rely() by SrcIpAddr, DstIpAddr, DstDomain, Dvc, EventProduct, EventVendor
Hunt normalized File occasions utilizing the ASIM unifying parser imFileEvent for IOCs:
let ioc_sha_hashes=dynamic((“fe0b2e0fe7ce26ae398fe6c36dae551cb635696c927761738f040b581e4ed422″,”bb3b6262a288610df46f785c57d7f1fa0ebc75178c625eaabf087c7ec3fccb6a”,”9728b7c73ef25566cba2599cb86d87c360db7cafec003616f09ef70962f0f6fc”,
“3c482415979debc041d7e4c41a8f1a35ca0850b9e392fecbdef3d3bc0ac69960″,”165896fb5761596c6f6d80323e4b5804e4ad448370ceaf9b525db30b2452f7f5″,”a31ea11c98a398f4709d52e202f3f2d1698569b7b6878572fc891b8de56e1ff7”,
“a1b4db93eb72a520878ad338d66313fbaeab3634000fb7c69b1c34c9f3e17727″,”0b22a0d84afb8bc4426ac3882a5ecd2e93818a2ea62d4d5cbae36d942552a36a”,”4d5839d70f16e8f4f7980d0ae1758bb5a88b061fd723ea4bf32b4b474c222bec”,”9bffe9add38808b3f6021e6d07084a06300347dd5d4b7e159d97e949735cff1e”));
imFileEvent
| the place SrcFileSHA256 in (ioc_sha_hashes) or TargetFileSHA256 in (ioc_sha_hashes)
| prolong AccountName = tostring(cut up(Consumer, @”)(1)), AccountNTDomain = tostring(cut up(Consumer, @”)(0))
| prolong AlgorithmType = “SHA256”
Hunt normalized Net Session occasions utilizing the ASIM unifying parser _Im_WebSession for IOCs:
let lookback = 7d;
let ioc_domains = dynamic((“slgndocline.onlxtg.com “, “cronoze.com “, “muuxxu.com “, “proliforetka.com “, “porelinofigoventa.com “, “shareddocumentso365cloudauthstorage.com”, “newsbloger1.duckdns.org”));
_Im_WebSession (starttime=in the past(lookback), eventresult=’Success’, url_has_any=ioc_domains)
| summarize imWS_mintime=min(TimeGenerated), imWS_maxtime=max(TimeGenerated), EventCount=rely() by SrcIpAddr, DstIpAddr, Url, Dvc, EventProduct, EventVendor
Along with the above, Sentinel customers can even leverage the next queries, which can be related to the content material of this weblog.
Indicators of compromise
BruteRatel C4 and Lactrodectus an infection chain
IndicatorTypeDescription9bffe9add38808b3f6021e6d07084a06300347dd5d4b7e159d97e949735cff1eSHA-256lrs_Verification_Form_1730.pdf0b22a0d84afb8bc4426ac3882a5ecd2e93818a2ea62d4d5cbae36d942552a36aSHA-256Irs_verif_form_2025_214859.js4d5839d70f16e8f4f7980d0ae1758bb5a88b061fd723ea4bf32b4b474c222becSHA-256bars.msia1b4db93eb72a520878ad338d66313fbaeab3634000fb7c69b1c34c9f3e17727SHA-256BRc4, filename: nvidiamast.dllhxxp://rebrand(.)ly/243eaaDomain nameURL shortener to load faux DocuSign pageslgndocline.onlxtg(.)comDomain nameDomain used to host faux DocuSign pagecronoze(.)comDomain nameBRc4 C2muuxxu(.)comDomain nameBRc4 C2proliforetka(.)comDomain nameLatrodectus C2porelinofigoventa(.)comDomain nameLatrodectus C2hxxp://slgndocline.onlxtg(.)com/87300038978/URLFake DocuSign URLhxxps://rosenbaum(.)stay/bars.phpURLJavaScript downloading MSI
RaccoonO365
IndicatorTypeDescriptionshareddocumentso365cloudauthstorage(.)comDomain nameRaccoonO365 area
AHKBot
IndicatorTypeDescriptiona31ea11c98a398f4709d52e202f3f2d1698569b7b6878572fc891b8de56e1ff7SHA-256Tax_Refund_Eligibility_Document.xlsm165896fb5761596c6f6d80323e4b5804e4ad448370ceaf9b525db30b2452f7f5SHA-256umbrella.msi3c482415979debc041d7e4c41a8f1a35ca0850b9e392fecbdef3d3bc0ac69960SHA-256AutoNotify.ahk9728b7c73ef25566cba2599cb86d87c360db7cafec003616f09ef70962f0f6fcSHA-256AHKBot Screenshotter modulehxxps://enterprise.google(.)com/website_shared/launch_bw.html?f=hxxps://historyofpia(.)com/Tax_Refund_Eligibility_Document.xlsmURLURL redirecting to URL internet hosting malicious Excel filehxxps://historyofpia(.)com/Tax_Refund_Eligibility_Document.xlsmURLURL internet hosting malicious Excel filehxxps://acusense(.)ae/umbrella/URLURL in macro that hosted the malicious MSI file181.49.105(.)59IP addressAHKBot C2
Remcos
IndicatorTypeDescriptionbb3b6262a288610df46f785c57d7f1fa0ebc75178c625eaabf087c7ec3fccb6aSHA-2562024 Tax Document_Copy (1).pdffe0b2e0fe7ce26ae398fe6c36dae551cb635696c927761738f040b581e4ed422SHA-2562024 Tax Doc.ziphxxps://www.dropbox(.)com/scl/fi/ox2fv884k4mhzv05lf4g1/2024-Tax-Doc.zip?rlkey=fjtynsx5c5ow59l4zc1nsslfi&st=gvfamzw3&dl=1URLURL in PDFnewsbloger1.duckdns(.)orgDomain nameRemcos C2
References
Study extra
For the most recent safety analysis from the Microsoft Menace Intelligence neighborhood, try the Microsoft Menace Intelligence Weblog: https://aka.ms/threatintelblog.
To get notified about new publications and to hitch discussions on social media, observe us on LinkedIn at https://www.linkedin.com/showcase/microsoft-threat-intelligence, and on X (previously Twitter) at https://x.com/MsftSecIntel.
To listen to tales and insights from the Microsoft Menace Intelligence neighborhood in regards to the ever-evolving menace panorama, take heed to the Microsoft Menace Intelligence podcast: https://thecyberwire.com/podcasts/microsoft-threat-intelligence.