{"id":127218,"date":"2023-04-13T10:00:00","date_gmt":"2023-04-13T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=127218"},"modified":"2024-07-03T08:12:15","modified_gmt":"2024-07-03T15:12:15","slug":"threat-actors-strive-to-cause-tax-day-headaches","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/13\/threat-actors-strive-to-cause-tax-day-headaches\/","title":{"rendered":"Threat actors strive to cause Tax Day headaches"},"content":{"rendered":"\n
Threat actors often take advantage of current events and major news headlines to align attacks and leverage social engineering when people could be more likely to be distracted or misled. Tax season is particularly appealing to threat actors because not only are people busy and under stress, but it is intrinsically tied to financial information. With U.S. Tax Day approaching, Microsoft has observed phishing attacks targeting accounting and tax return preparation firms to deliver the Remcos remote access trojan (RAT) and compromise target networks beginning in February of this year.<\/p>\n\n\n\n
Remcos, which stands for “Remote Control and Surveillance”, is a closed-source tool that allows threat actors to gain administrator privileges on Windows systems remotely. It was released in 2016 by BreakingSecurity, a European company that markets Remcos and other offensive security tools as legitimate software. In 2021, CISA listed Remcos<\/a> among its top malware strains, citing its use in mass phishing attacks using COVID-19<\/a> pandemic themes targeting businesses and individuals.<\/p>\n\n\n\n While social engineering lures like this one are common around Tax Day and other big topic current events, these campaigns are specific and targeted in a way that is uncommon. The targets for this threat are exclusively organizations that deal with tax preparation, financial services, CPA and accounting firms, and professional service firms dealing in bookkeeping and tax. This campaign can be detected in Microsoft Defender Antivirus, built into Windows and on by default, as well as Microsoft 365 Defender.<\/p>\n\n\n\n The campaign uses lures masquerading as tax documentation sent by a client, while the link in the email uses a legitimate click-tracking service to evade detection. The target is then redirected to a legitimate file hosting site, where the actor has uploaded Windows shortcut (.LNK) files.<\/p>\n\n\n\n