From pamella.johnson at state.or.us Wed Mar 1 14:43:22 2017 From: pamella.johnson at state.or.us (Pamella Johnson) Date: Wed, 1 Mar 2017 22:43:22 +0000 Subject: [OSSSA218] FW: IRS Warning of Phishing Scam In-Reply-To: <035965b6f1b8425493e36ee2ec6c06d9@v-exchdb01.a4590.pers.state.or.us> References: <035965b6f1b8425493e36ee2ec6c06d9@v-exchdb01.a4590.pers.state.or.us> Message-ID: <280f957d810440f7b1f1a1af615af7c7@v-exchdb01.a4590.pers.state.or.us> Good afternoon Section 218 Employers: Last week an Oregon public employer was the victim of the phishing scam outlined below which used the spoofing technique. Our IRS partners have asked that you continue to be vigilant in this matter. Thank you. Pamella From: OSSSA218 [mailto:osssa218-bounces at listsmart.osl.state.or.us] On Behalf Of Pamella Johnson Sent: Monday, February 06, 2017 3:21 PM To: 'osssa218 at listsmart.osl.state.or.us' (osssa218 at listsmart.osl.state.or.us) Subject: [OSSSA218] IRS Warning of Phishing Scam Good afternoon Section 218 Employers: Both the IRS and SSA have sent notification of an evolving scam. Details are found below. Thank you. Pamella Johnson Oregon State Social Security Administration Dangerous W-2 Phishing Scam Evolving; Targeting Schools, Restaurants, Hospitals, Tribal Groups and Others WASHINGTON - The Internal Revenue Service, state tax agencies and the tax industry issued an urgent alert today to all employers that the Form W-2 email phishing scam has evolved beyond the corporate world and is spreading to other sectors, including school districts, tribal organizations and nonprofits. In a related development, the W-2 scammers are coupling their efforts to steal employee W-2 information with an older scheme on wire transfers that is victimizing some organizations twice. "This is one of the most dangerous email phishing scams we've seen in a long time. It can result in the large-scale theft of sensitive data that criminals can use to commit various crimes, including filing fraudulent tax returns. We need everyone's help to turn the tide against this scheme,'' said IRS Commissioner John Koskinen. When employers report W-2 thefts immediately to the IRS, the agency can take steps to help protect employees from tax-related identity theft. The IRS, state tax agencies and the tax industry, working together as the Security Summit, have enacted numerous safeguards in 2016 and 2017 to identify fraudulent returns filed through scams like this. As the Summit partners make progress, cybercriminals need more data to mimic real tax returns. Here's how the scam works: Cybercriminals use various spoofing techniques to disguise an email to make it appear as if it is from an organization executive. The email is sent to an employee in the payroll or human resources departments, requesting a list of all employees and their Forms W-2. This scam is sometimes referred to as business email compromise (BEC) or business email spoofing (BES). The Security Summit partners urge all employers to be vigilant. The W-2 scam, which first appeared last year, is circulating earlier in the tax season and to a broader cross-section of organizations, including school districts, tribal casinos, chain restaurants, temporary staffing agencies, healthcare and shipping and freight. Those businesses that received the scam email last year also are reportedly receiving it again this year. Security Summit partners warned of this scam's reappearance last week but have seen an upswing in reports in recent days. New Twist to W-2 Scam: Companies Also Being Asked to Wire Money In the latest twist, the cybercriminal follows up with an "executive" email to the payroll or comptroller and asks that a wire transfer also be made to a certain account. Although not tax related, the wire transfer scam is being coupled with the W-2 scam email, and some companies have lost both employees' W-2s and thousands of dollars due to wire transfers. The IRS, states and tax industry urge all employers to share information with their payroll, finance and human resources employees about this W-2 and wire transfer scam. Employers should consider creating an internal policy, if one is lacking, on the distribution of employee W-2 information and conducting wire transfers. Steps Employers Can Take If They See the W-2 Scam Organizations receiving a W-2 scam email should forward it to phishing at irs.gov and place "W2 Scam" in the subject line. Organizations that receive the scams or fall victim to them should file a complaint with the Internet Crime Complaint Center (IC3,) operated by the Federal Bureau of Investigation. Employees whose Forms W-2 have been stolen should review the recommended actions by the Federal Trade Commission at www.identitytheft.gov or the IRS at www.irs.gov/identitytheft. Employees should file a Form 14039, Identity Theft Affidavit, if the employee's own tax return gets rejected because of a duplicate Social Security number or if instructed to do so by the IRS. The W-2 scam is just one of several new variations that have appeared in the past year that focus on the large-scale thefts of sensitive tax information from tax preparers, businesses and payroll companies. Individual taxpayers also can be targets of phishing scams, but cybercriminals seem to have evolved their tactics to focus on mass data thefts. Be Safe Online In addition to avoiding email scams during the tax season, taxpayers and tax preparers should be leery of using search engines to find technical help with taxes or tax software. Selecting the wrong "tech support" link could lead to a loss of data or an infected computer. Also, software "tech support" will not call users randomly. This is a scam. Taxpayers searching for a paid tax professional for tax help can use the IRS Choosing a Tax Professional lookup tool or if taxpayers need free help they can review the Free Tax Return Preparation Programs. Taxpayers searching for tax software can use Free File, which offers 12 brand-name products for free, at www.irs.gov/freefile. Taxpayer or tax preparers looking for tech support for their software products should go directly to the provider's web page. Tax professionals also should beware of ongoing scams related to IRS e-Services. Thieves are trying to use IRS efforts to make e-Services more secure to send emails asking e-Services users to update their accounts. Their objective is to steal e-Services users' credentials to access these important services -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- An embedded and charset-unspecified text was scrubbed... Name: ATT00001.txt URL: From pamella.johnson at state.or.us Mon Mar 27 15:50:19 2017 From: pamella.johnson at state.or.us (Pamella Johnson) Date: Mon, 27 Mar 2017 22:50:19 +0000 Subject: [OSSSA218] IRS Updated Data Breach Procedures and Links Message-ID: <84e90f8fa0ff4d82a95a0bbc3f86bdbd@v-exchdb01.a4590.pers.state.or.us> Good afternoon Section 218 Employers: The IRS has provided updated details and links for data breach procedures including W-2 data theft which is found below: The IRS has established a process that will allow businesses and payroll service providers to quickly report any data losses related to the W2 scam currently making the rounds. See details at Form W2/SSN Data Theft: Information for Businesses and Payroll Service Providers. If notified in time, the IRS can take steps to prevent employees from being victimized by identity thieves filing fraudulent returns in their names. There also is information about how to report receiving the scam email. https://www.irs.gov/individuals/form-w2-ssn-data-theft-information-for-businesses-and-payroll-service-providers. As a reminder, tax professionals who experience a data breach also should quickly report the incident to the IRS. Tax professionals may contact their local stakeholder liaison. See details at Data Theft Information for Tax Professionals. https://www.irs.gov/individuals/data-theft-information-for-tax-profesionals. With thanks, Pamella Pamella Johnson Oregon State Social Security Administration -------------- next part -------------- An HTML attachment was scrubbed... URL: