In March 2016, the
IRS issued an alert concerning a new type of
phishing email attack which attempts to lure human resources, accounting, or payroll staff into disclosing the W-2 information of all employees within a company, presumably intended for use in
tax-related identity theft, which the IRS defines as "...when someone uses your stolen Social Security number to file a tax return claiming a fraudulent refund." This may give a cybercriminal enough information to fraudulently file a
tax return on the victim's behalf and direct the
tax refund to the cybercriminal's bank account. This phishing scheme is particularly characterized by its use of
spear-phishing (emails
sent to specific individuals) and
email spoofing to pose as a company executive requesting the W-2 information, thereby increasing the urgency of the response and catching payroll staff off-guard: • "Can you send me the updated list of employees with full details (Name, Social Security Number, Date of Birth, Home Address, Salary)." • "Kindly send me the individual 2015 W-2 (PDF) and earnings summary of all W-2 of our company staff for a quick review." • "I want you to send me the list of W-2 copies of employees' wage and tax statements for 2015, I need them in PDF file type, you can send it as an attachment. Kindly prepare the lists and email them to me asap." Large companies such as
Snap Inc.,
Mansueto Ventures, and
Seagate fell victim to this phishing scheme in early March 2016. Those in the cybersecurity industry categorize this phishing scheme as a type of CEO Fraud, while the FBI's Criminal, Cyber, and International Operations Divisions classify it as a type of "
business email compromise" or BEC. ==Analogs in other countries==