New Malware Campaign Mimic Tax Agencies Attacking Financial Organizations

Cybersecurity researchers have uncovered a sophisticated malware campaign exploiting tax season to target financial organizations and individuals globally.

The campaign involves phishing emails impersonating tax agencies and financial institutions, delivering malware and harvesting sensitive credentials.

The malicious actors behind this campaign are leveraging tax-related themes, such as account updates, overdue payments, or tax refunds, to lure victims.

New Malware Campaign Mimic Tax Agencies Attacking Financial Organizations

Emails often appear to come from legitimate entities like HM Revenue & Customs (HMRC) in the UK, Intuit in the US, or myGov in Australia.

Security analysts at ProofPoint noted that all these emails include links to phishing websites or attachments containing malware.

New Malware Campaign Mimic Tax Agencies Attacking Financial Organizations

Fake HMRC login page used for credential harvesting (Source – ProofPoint)

For instance, some phishing emails claim that recipients’ business tax accounts need urgent updates and direct them to fake HMRC login pages designed to steal credentials.

New Malware Campaign Mimic Tax Agencies Attacking Financial Organizations

HMRC lure impersonating the agency and distributing credential phishing (Source – ProofPoint)

Other emails impersonate Intuit by notifying users of rejected tax forms and leading them to credential-harvesting websites with suspicious URLs.

New Malware Campaign Mimic Tax Agencies Attacking Financial Organizations

Email impersonating Intuit (left), credential phishing landing page (right) (Source – ProofPoint)

Additionally, messages mimicking the Australian Taxation Office impersonate myGov, urging users to resolve pending tax issues via phishing sites.

New Malware Campaign Mimic Tax Agencies Attacking Financial Organizations

Phishing email impersonating myGov (left), phishing landing page (right) (Source – ProofPoint)

Malware Payloads

Beyond phishing, the campaign delivers advanced malware payloads. Notable examples include:-

Rhadamanthys Malware: Distributed via fake tax software emails containing malicious JavaScript files hosted on Microsoft Azure. The script executes PowerShell commands to download and install Rhadamanthys.

    Example URL:
    hxxps://drakesoftware[.]blob[.]core[.]windows[.]net/drakesoftware/Invoice%2352223.html

    Voldemort Malware: A backdoor that uses Google Sheets for command-and-control communication. It disguises itself as a PDF file linked in phishing emails from fake tax agencies.

      Attack chain: Phishing email → Fake PDF → Python script execution → DLL download → System compromise.

      This campaign has affected thousands of organizations across multiple countries. In the UK, HMRC-themed phishing attacks targeted businesses with credential-stealing websites.

      In the US, over 40,000 Intuit-themed phishing emails were sent in January 2025 alone.

      Meanwhile, in Switzerland, fraud campaigns impersonated federal tax authorities, requesting bogus payments to adversary-controlled Revolut accounts.

      Tax-themed cyberattacks are particularly effective due to their timing and perceived urgency. Recipients are often compelled to act quickly on such communications, making them vulnerable to scams.

      Financial organizations are prime targets because of their critical role in processing sensitive data and transactions.

      To mitigate these threats, organizations should educate employees about recognizing phishing attempts, implement multi-factor authentication for all accounts, and deploy advanced email filtering systems to detect malicious attachments and links.

      Additionally, regularly updating antivirus software and monitoring for indicators of compromise (IoCs) are crucial steps to ensure robust security.

      Organizations must strengthen defenses against evolving threats like this campaign that exploits trust in authoritative entities to deliver destructive malware payloads.

      Indicators of Compromise (IOCs)

      Security teams should monitor for these IOCs:-

      Indicator Description First Seen
      hxxps://clearlivate[.]com/xxx/rest.html Phishing URL January 16, 2025
      hxxps://drakesoftware[.]blob[.]core.windows.net/… Malware-hosting URL January 16, 2025
      hxxps://revolut[.]me/swisstaxadm Fraudulent payment URL December 18, 2024

      LEAVE A REPLY

      Please enter your comment!
      Please enter your name here

      More like this

      Detecting Cyber Attack Patterns by Analyzing Threats Actors Infrastructure

      Routers Under Attack – Attacks Scanning for IoT &...