Common Phishing Scams Targeting Tax Preparers

Drake Software Blog: Top Phishing Scams

By: Oscar Hernandez-Gutierrez, Security Operations Analyst, Drake Software

 In my current role as a Security Operations Analyst, I’ve seen firsthand how threat actors exploit this critical period to launch sophisticated phishing campaigns aimed at tax professionals. These attacks are often well-crafted, highly targeted, and capable of inflicting serious damage on both firms and their clients.

In an effort not to become a victim, here are three common phishing scams that tax preparers should watch for this season:

1. New Client Phishing Scams

How it works:

Attackers impersonate prospective clients seeking tax preparation services. These emails often appear completely legitimate, using professional language and even referencing real locations or client types. Once the preparer responds, the attacker sends a follow-up message containing a malicious file or link, typically disguised as a W-2, 1099, or prior return.

Red Flags to Watch:

  • Urgent requests to review documents immediately
  • Files hosted on file-sharing platforms like Dropbox or Google Drive that the attackers control
  • Slight misspellings in email addresses or domain names

Why it’s dangerous:

These attachments often contain credential-stealing malware or ransomware that can compromise your entire system.

Protective Steps:

  • Require secure document upload through your client portal
  • Verify all new client identities before opening any attachments
  • Use antivirus software to scan documents such as: 

2. EFIN Documentation & Credential Scams

How it works:

Cybercriminals impersonate tax software providers, the IRS, or even state agencies to request documentation “verifying” your Electronic Filing Identification Number (EFIN). These emails may use branding from legitimate companies and request uploads of your IRS-issued documents or login credentials.

Why it’s dangerous:

If scammers obtain your EFIN, they can impersonate your firm and file fraudulent tax returns — potentially leading to refund fraud, IRS scrutiny, and reputational damage. 

Social Engineering at Play:

Unlike technical exploits, this scam depends on manipulating trust. Victims often believe they are complying with IRS or vendor policies.

Protective Steps:

  • Never share EFIN documentation via email
  • Verify sender addresses and contact vendors directly
  • Educate staff on what legitimate EFIN requests look like (see: Protect Your EFIN)

3. TOAD Attacks (Telephone-Oriented Attack Delivery)

How it works:

This blended threat starts with a phishing email, often warning of suspicious activity or expired software licenses. Victims are urged to call a phone number for help. On the call, attackers impersonate the IRS, software support teams, or IT providers.

Once trust is established, they persuade the victim to:

  • Share account credentials
  • Disable security software
  • Install remote access tools like AnyDesk or TeamViewer

Why it’s dangerous:

This form of phishing leverages emotional manipulation and urgency. It’s especially effective against firms with limited IT support or non-technical staff.

Protective Steps:

  • Train staff to spot suspicious emails 
  • Require internal verification before acting on “urgent” IT issues
  • Use multi-factor authentication (MFA) to protect login credentials

Phishing Prevention Is a Year-Round Responsibility

While phishing scams persist throughout the year, they tend to spike during tax season. Tax preparers must stay vigilant, regularly update their cybersecurity training, and invest in secure client communication platforms.

To stay protected:

Disclaimer: This article is for informational purposes only and not legal or financial advice.