The Microsoft Cloud Blog

Expert insights on Microsoft Azure, Cloud Architecture, and Enterprise Technology

When tax season becomes cyberattack season: Phishing and malware campaigns using tax-related lures
2 min read
Cybersecurity

When tax season becomes cyberattack season: Phishing and malware campaigns using tax-related lures

Tax season has always been a favourite hunting ground for cybercriminals, but Microsoft’s recent intelligence points to increasingly sophisticated campaigns exploiting the urgency and familiarity of tax-related correspondence. This annual surge is not simply opportunistic; it demonstrates a nuanced understanding of both individual and organisational behaviours at this time of year. What stands out in Microsoft’s analysis is not merely the volume of attacks, but the tailored nature of lures—ranging from fake refund notices to highly personalised communications aimed at accountants and finance professionals. The consistent exploitation of routine financial workflows signals an evolution in how threat actors weaponise trust and routine.

Evolving Techniques and Strategic Implications

From my perspective, the most pressing issue for technology leaders is the widespread availability of Phishing-as-a-Service (PhaaS) platforms such as Energy365. These offerings lower the barrier to entry for would-be attackers, enabling even modestly resourced groups to orchestrate convincing campaigns with tailored social engineering lures. The rise in multi-format attacks—using Excel, OneNote, or leveraging legitimate services like OneDrive—complicates detection and response mechanisms. It is particularly concerning that these campaigns now target not just individuals but also professionals who routinely manage sensitive documents during tax season. The risk here is twofold: direct credential theft and persistent malware delivery via abused remote monitoring and management (RMM) tools.

For CIOs and CISOs, this highlights a strategic need to revisit both technical controls and human factors. Standard email security solutions may no longer suffice given the sophistication described in these campaigns. Defence must extend beyond perimeter detection to include robust user education about increasingly subtle phishing lures, regular review of access privileges for finance staff, and stringent controls on the use of third-party collaboration tools. Moreover, the abuse of legitimate RMM software as described by Microsoft suggests that organisations must implement tighter monitoring for anomalous remote access activity, especially during periods of heightened risk like tax season.

This trend also raises a broader question about how well-prepared organisations are for “seasonal” threat surges that align with business cycles. Are incident response plans sufficiently agile to adapt to these predictable spikes? Is there adequate cross-team communication between IT security and finance functions? There remains much room for improvement across sectors.

Looking Ahead

In my view, tax-themed cyberattacks exemplify how adversaries continue to adapt their tactics in alignment with our own business rhythms. As we move forward, I expect further blurring of lines between traditional phishing and more persistent forms of compromise leveraging legitimate tools. Continuous investment in layered security controls—coupled with adaptive awareness programmes—will be essential if organisations are to keep pace with these evolving threats.

Source: [When tax season becomes cyberattack season: Phishing and malware campaigns using tax-related lures](https://is.gd/FnYwCf)

Want more cloud insights? Listen to Cloudy with a Chance of Insights podcast:

Spotify | YouTube | Apple Podcasts

Tags

AzureM365CyberSecuritySecurity
Like this article?

Comments

Loading comments...

Richard Hogan

Richard Hogan

Author & Host

Richard is a Microsoft-focused architect and consultant with deep expertise in Azure, Microsoft 365, cybersecurity, and enterprise cloud migration. He is the founder of The Microsoft Cloud Blog and co-host of the Cloudy with a Chance of Insights podcast. All views expressed are his own.

You might also like

Building Confidence in Azure Workload Continuity: Strategic Approaches to Reliability, Resiliency, and Recoverability

Building Confidence in Azure Workload Continuity: Strategic Approaches to Reliability, Resiliency, and Recoverability

Reference: How to design reliable, resilient, and recoverable workloads on Azure Meeting the expectations of today’s digital business landscape requires more than promises of uptime. Over the years, I’ve seen organisations struggle with the nuances of reliability, often conflating it with high availability or disaster recovery. The distinction is not academic—it shapes the fabric of… Continue Reading →

New options for AI-powered innovation, resiliency, and control with Microsoft Azure

New options for AI-powered innovation, resiliency, and control with Microsoft Azure

The cloud landscape is shifting. As I see it, the demands facing organisations with mission-critical workloads—whether in manufacturing, healthcare, or government—have grown well beyond simple scalability. The latest updates from Microsoft Azure underscore a strategic pivot towards adaptive infrastructure, offering new pathways to balance innovation, resilience, and operational autonomy. In this analysis, I’ll break down… Continue Reading →

When the Cloud Goes Dark: Keeping the Lights On

When the Cloud Goes Dark: Keeping the Lights On

In this week’s newsletter: a deep dive into the recent AWS and Microsoft cloud outages, what caused them, their ripple effects on businesses, and how (theoretically) to keep the lights on next time. As usual I also attempt to cover key Microsoft product updates (Azure, M365, Copilot) and a brief recap on our fortnightly (or… Continue Reading →

Practical discussions on cloud engineering, architecture, and the reality behind the diagrams.

Bi-weekly reflections on cloud architecture, Azure, and the decisions teams wrestle with in practice.