[OSSSA218] Form W-2 Phishing Scheme Reminder From the IRS

Pamella Johnson pamella.johnson at state.or.us
Thu Jan 18 12:59:24 PST 2018


Good afternoon Section 218 Employers:

Below is a timely reminder from the IRS related to Form W-2 scams which occur during the January tax season. Several Oregon public entities were victimized by this particular scam in 2017.

Thank you.

Pamella
Pamella Johnson
Oregon State Social Security Administration


*****CONFIDENTIALITY NOTICE*****
All information in this email, including attachments, is approved solely for delivery to and authorized use by its intended recipients. Use, dissemination, distribution, or reproduction of this message and/or any of its attachments by unintended recipients is not authorized and may be unlawful. If you are not an intended recipient of this message or an authorized assistant to an intended recipient, please notify the sender by replying to this message and then delete it from your system.





IRS, States and Tax Industry Warn Employers to Beware of Form W-2 Scam; Tax Season Could Bring New Surge in Phishing Scheme

WASHINGTON - The Internal Revenue Service, state tax agencies and the tax industry today urged all employers to educate their payroll personnel about a Form W-2 phishing scam that made victims of hundreds of organizations and thousands of employees last year.

The Form W-2 scam has emerged as one of the most dangerous phishing emails in the tax community. During the last two tax seasons, cybercriminals tricked payroll personnel or people with access to payroll information into disclosing sensitive information for entire workforces. The scam affected all types of employers, from small and large businesses to public schools and universities, hospitals, tribal governments and charities.

Reports to phishing at irs.gov<mailto:phishing at irs.gov> from victims and nonvictims about this scam jumped to approximately 900 in 2017, compared to slightly over 100 in 2016. Last year, more than 200 employers were victimized, which translated into hundreds of thousands of employees who had their identities compromised.

By alerting employers now, the IRS and its partners in the Security Summit effort<http://links.govdelivery.com:80/track?type=click&enid=ZWFzPTEmbWFpbGluZ2lkPTIwMTgwMTE3LjgzODUxMzcxJm1lc3NhZ2VpZD1NREItUFJELUJVTC0yMDE4MDExNy44Mzg1MTM3MSZkYXRhYmFzZWlkPTEwMDEmc2VyaWFsPTE3MTY4Njg2JmVtYWlsaWQ9cGFtZWxsYS5qb2huc29uQHN0YXRlLm9yLnVzJnVzZXJpZD1wYW1lbGxhLmpvaG5zb25Ac3RhdGUub3IudXMmZmw9JmV4dHJhPU11bHRpdmFyaWF0ZUlkPSYmJg==&&&127&&&https://www.irs.gov/privacy-disclosure/security-summit> hope to limit the success of this scam in 2018. The IRS last year also created a new process by which employers should report these scams. There are steps the IRS can take to protect employees, but only if the agency is notified immediately by employers about the theft.

Here's how the scam works: Cybercriminals do their homework, identifying chief operating officers, school executives or others in positions of authority. Using a technique known as business email compromise (BEC) or business email spoofing (BES), fraudsters posing as executives send emails to payroll personnel requesting copies of Forms W-2 for all employees.

The Form W-2 contains the employee's name, address, Social Security number, income and withholdings. Criminals use that information to file fraudulent tax returns, or they post it for sale on the Dark Net.

The initial email may be a friendly, "hi, are you working today" exchange before the fraudster asks for all Form W-2 information. In several reported cases, after the fraudsters acquired the workforce information, they immediately followed that up with a request for a wire transfer.

In addition to educating payroll or finance personnel, the IRS and Security Summit partners also urge employers to consider creating a policy to limit the number of employees who have authority to handle Form W-2 requests and that they require additional verification procedures to validate the actual request before emailing sensitive data such as employee Form W-2s.

If the business or organization victimized by these attacks notifies the IRS, the IRS can take steps to help prevent employees from being victims of tax-related identity theft. However, because of the nature of these scams, some businesses and organizations did not realize for days, weeks or months that they had been scammed.

The IRS established a special email notification address specifically for employers to report Form W-2 data thefts. Here's how Form W-2 scam victims can notify the IRS:

  *   Email dataloss at irs.gov<mailto:dataloss at irs.gov> to notify the IRS of a Form W-2 data loss and provide contact information, as listed below.
  *   In the subject line, type "W2 Data Loss" so that the email can be routed properly. Do not attach any employee personally identifiable information data.
  *   Include the following:
  *   Business name
  *   Business employer identification number (EIN) associated with the data loss
  *   Contact name
  *   Contact phone number
  *   Summary of how the data loss occurred
  *   Volume of employees impacted

Businesses and organizations that fall victim to the scam and/or organizations that only receive a suspect email but do not fall victim to the scam should send the full email headers to phishing at irs.gov<mailto:phishing at irs.gov> and use "W2 Scam" in the subject line.

Employers can learn more at Form W-2/SSN Data Theft: Information for Businesses and Payroll Service Providers<http://links.govdelivery.com:80/track?type=click&enid=ZWFzPTEmbWFpbGluZ2lkPTIwMTgwMTE3LjgzODUxMzcxJm1lc3NhZ2VpZD1NREItUFJELUJVTC0yMDE4MDExNy44Mzg1MTM3MSZkYXRhYmFzZWlkPTEwMDEmc2VyaWFsPTE3MTY4Njg2JmVtYWlsaWQ9cGFtZWxsYS5qb2huc29uQHN0YXRlLm9yLnVzJnVzZXJpZD1wYW1lbGxhLmpvaG5zb25Ac3RhdGUub3IudXMmZmw9JmV4dHJhPU11bHRpdmFyaWF0ZUlkPSYmJg==&&&128&&&https://www.irs.gov/individuals/form-w2-ssn-data-theft-information-for-businesses-and-payroll-service-providers>.

Employers should be aware that cybercriminals' scams constantly evolve. Finance and payroll personnel should be alert to any unusual requests for employee data.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://omls.oregon.gov/pipermail/osssa218/attachments/20180118/dc1e131b/attachment.html>


More information about the OSSSA218 mailing list