Why Criminals Love April 15
The April 15 tax deadline creates a perfect storm for social engineering attacks.
Youβre under pressure. Deadlines make people click without thinking. A refund notice or an urgent βaction requiredβ from the IRS feels like something you need to handle now β not something to carefully scrutinize.
The emails look legitimate. Tax forms, IRS notices, TurboTax alerts, and W-2 correction notices are documents most people have received at least once. Criminals exploit that familiarity.
The stakes feel high. Nobody wants to miss a filing deadline or lose a refund. That anxiety is a feature, not a bug, for attackers.
The volume is enormous. The IRS consistently ranks phishing and impersonation as the #1 threat on their annual βDirty Dozenβ scams list β and 2026 is no exception. Researchers at Microsoft have tracked multiple simultaneous campaigns this tax season, targeting financial services, technology companies, healthcare, and retail β not just individuals.
The FBI reports that tax-related fraud losses run into the hundreds of millions every year. And thatβs only what gets reported.
This year, though, the scams have evolved. Itβs no longer just about stealing your Social Security number or your refund. The new target is your security software itself.
What Is EDR? (And Why Attackers Need to Kill It)
If youβre not deep into tech, you may have heard terms like βantivirus,β βendpoint security,β or βEDRβ and assumed theyβre all the same thing. Theyβre not β but the distinction matters here.
Antivirus is the older concept. It works like a bouncer with a list β if a file matches a known bad signature, it gets blocked. Simple, but easy to fool with new or slightly modified malware.
EDR β Endpoint Detection and Response β is the modern replacement. Think of it as a security camera that watches everything your computer does, not just files. It monitors behavior: what processes are running, what files are being opened, what network connections are being made, whatβs being written to memory. Itβs looking for suspicious patterns, not just known signatures.
Tools like CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, and Carbon Black are EDR solutions. Theyβre used by businesses of all sizes. When something starts behaving like malware β even if itβs never been seen before β EDR notices and raises an alarm.
This is a problem for attackers. Because if EDR is watching, their tools get caught.
So now, their first move is to blind it.
βLiving Off the Landβ and the Driver Trick β In Plain English
Modern attackers have two clever tricks that make them nearly invisible to security software.
Living Off the Land (LOLBins)
Imagine a burglar who breaks into your house but only uses tools already in your kitchen β your knives, your rope, your extension cords. They brought nothing that would show up on a security scan because everything theyβre using belongs to you.
Thatβs what βLiving Off the Landβ means in cybersecurity. Attackers use legitimate tools that are already on your computer β Windows PowerShell, the command prompt, built-in system utilities β to do their dirty work. Because these tools are legitimate, security software often doesnβt flag them.
Spreading malicious code using tools that are supposed to be there is much harder for defenders to catch.
Bring Your Own Vulnerable Driver (BYOVD)
This one is more technical but the concept is simple once you understand it.
Your operating system has a strict hierarchy. Most programs run in βuser modeβ β they can do things, but the operating system has limits on what they can touch. The deepest layer of the system β the kernel β is where the real control lives. Security software like EDR runs with special privileges, some even at the kernel level, so it can monitor everything.
But hereβs the catch: device drivers β software that helps hardware like printers, sound cards, and graphics cards communicate with Windows β are allowed to operate at the kernel level. And some older drivers have vulnerabilities that were never patched.
In the 2026 tax scam attacks documented by Huntress, attackers used a signed, legitimate Huawei audio driver with a known vulnerability. Since itβs signed by a real manufacturer, Windows loads it without complaint. Then the malware exploits the vulnerability in that driver to reach into the kernel β and from there, it can terminate EDR processes directly.
This tool was called HwAudKiller. It doesnβt need to hack your antivirus. It reaches around it, to a level where antivirus canβt protect itself, and turns it off like a light switch.
Once your EDR is dead, there are no more alerts. No more detections. The attacker has free run of your system.
The Full Attack Chain: Step by Step
Hereβs exactly how the 2026 tax-season EDR kill chain works, from the moment youβre targeted to the moment the attacker owns your machine:
Step 1: The Malicious Search Ad
You search for something completely routine β βW-2 form download,β βW-9 tax forms 2026,β βTurboTax download.β A sponsored result appears at the top. It looks like a real site. You click it.
This is malvertising β malicious advertising. Attackers paid for a Google Ad (or similar platform) that appears when you search for tax-related terms. The ad directs you to a convincing fake site like βbringetax[.]comβ or similar.
The cloaking trick: The fake sites detected in this campaign used two layers of cloaking software β one called Adspect and one called JustCloakIt. When Googleβs automated security scanners check the site, they see a clean, normal page. When a real person visits it, they see the malicious payload. This is why Googleβs ad review doesnβt catch it.
Step 2: The Fake Installer
The site prompts you to download something. In the detected campaign, it was a fake installer for ConnectWise ScreenConnect β a legitimate remote access tool used by IT departments everywhere. Because it looks like something real and familiar, people download it.
This is the βTrojanizedβ version: it looks like ScreenConnect but itβs carrying extra cargo.
Step 3: Multiple Remote Access Tools Are Installed
The fake installer deploys the real ScreenConnect software (so it looks legitimate) plus additional remote monitoring tools for redundancy β in this case, a tool called FleetDeck Agent. Now the attacker has multiple ways to maintain access even if one gets removed.
Over 60 malicious ScreenConnect sessions were identified in this campaign alone.
Step 4: The EDR Killer Activates
Through the ScreenConnect session, the attacker drops a multi-stage file that eventually installs HwAudKiller β the Huawei driver-based EDR killer. It exploits the vulnerable signed driver to reach kernel level and terminates your endpoint security processes.
Your antivirus is now off. Your EDR is now blind. No alerts will fire.
Step 5: Harvest and Move
With defenses down, the attacker gets to work:
- Credential dumping: They target LSASS (Local Security Authority Subsystem Service) β a Windows process that holds cached passwords and authentication tokens. Dumping this is like stealing your entire keychain.
- Network reconnaissance: Tools like NetExec are used to map your network β what other machines are connected, what shares exist, what servers are accessible.
- Lateral movement: They move from your machine to others on the network.
- Endgame: Ransomware deployment, data exfiltration for sale, or the access itself gets sold to another criminal group (called an βinitial access brokerβ).
Huntress researchers noted this behavior is consistent with pre-ransomware staging β everything theyβre doing is preparation for a bigger payload.
Tax Phishing Beyond the Malvertising Campaign
The BYOVD/malvertising attack is the sophisticated version. But the broader threat landscape includes dozens of other active campaigns this season.
Microsoft Threat Intelligence documented multiple simultaneous campaigns in early 2026:
- Energy365 PhaaS kit deployed via fake CPA emails, using real accountantsβ names and Excel/OneNote attachments to trick victims into credential harvesting pages
- SneakyLog phishing kit delivered via QR codes in W-2 lures, sent to over 100 organizations
- Datto RMM abuse β the remote monitoring and management tool used by MSPs weaponized as malware delivery
- A single campaign on February 10 targeted 29,000 users across 10,000 organizations in financial services (19%), tech (18%), and retail (15%)
The IRSβs own 2026 βDirty Dozenβ scams list puts IRS impersonation via email and text (phishing and smishing) as the #1 threat this tax season. Itβs been #1 for years. Itβs still working because people are still clicking.
How to Spot a Fake IRS Communication
This is one of the most important things to know, so letβs be direct about it.
The IRS Will NEVER:
- Email you first. The IRS initiates contact by mail β physical letters sent to your address on file. If you got an email out of the blue claiming to be from the IRS, itβs fake.
- Text you. Unsolicited texts from βIRSβ are scams. Period.
- Call you and threaten arrest. The IRS sends letters before calling. They do not call threatening immediate arrest, deportation, or police action.
- Demand payment via gift cards, wire transfers, or cryptocurrency. Real tax debt is paid through IRS.gov or by check to the U.S. Treasury. Anyone demanding another payment method is a scammer.
- Ask for your password or full credit card number. The IRS has no reason to ask for these things.
Signs a Tax Email Is Fake:
- The sender address doesnβt end in
@irs.gov(but be careful β scammers can spoof display names) - The email creates urgency (βrespond within 24 hours or face penaltiesβ)
- Thereβs an attachment you didnβt expect β especially .zip, .exe, .docm, or .xlsm files
- The link in the email doesnβt point to
irs.govwhen you hover over it - Generic greetings like βDear Taxpayerβ instead of your name
- Poor grammar or formatting (though AI-written phishing has improved this significantly in 2026)
When in doubt: Go directly to IRS.gov by typing it in your browser β never click a link in an email. Call the IRS directly at 1-800-829-1040 to verify any correspondence.
5 Things to Do Right Now
With three weeks until April 15, hereβs your action checklist:
1. Donβt Click Sponsored Results for Tax Software or Forms
Official tax forms are available directly from IRS.gov. Download TurboTax, H&R Block, or TaxAct directly from their official sites β not from search ads. Bookmark the URLs you trust. This single habit would have prevented the primary attack vector in the 2026 campaigns.
2. Verify Your Endpoint Security Is Actually Running
Donβt assume your antivirus or security software is working. Open it. Check the dashboard. Look for a green status, a current update timestamp, and confirmation that real-time protection is on.
If youβre on Windows, open Windows Security (search for it in the Start menu) and verify that all protections show green checkmarks. If something is off, investigate β donβt ignore it.
3. Enable Tamper Protection
Most modern security software has a feature called βtamper protectionβ that prevents other programs from turning it off without explicit permission. On Windows Defender, this is in Windows Security β Virus & Threat Protection β Manage Settings β Tamper Protection.
Turn it on if it isnβt already. Itβs not bulletproof against kernel-level attacks, but it raises the bar significantly.
4. Update Windows and Your Drivers
The BYOVD attack works by exploiting old drivers. Keep Windows up to date β this allows Microsoft to add vulnerable drivers to its blocklist. Patches for vulnerable driver versions can prevent kernel-level attacks even when you donβt know the specific exploit.
Go to Settings β Windows Update β Check for Updates. Do it now.
5. Use Multi-Factor Authentication (MFA) on Your Tax Accounts
If an attacker gets into your IRS Online Account, your TurboTax, or your state tax portal, they can redirect refunds or steal your filing information. Enable MFA (also called two-step verification or two-factor authentication) on every financial account you have β especially anything tax-related.
The IRSβs own online services support MFA at IRS.gov. Use it.
What to Do If You Clicked Something Suspicious
If youβve already clicked a suspicious link or downloaded a file youβre not sure about:
- Disconnect from the internet immediately β unplug the Ethernet cable or turn off Wi-Fi. This cuts off attacker access.
- Donβt turn off the computer if you want forensic evidence β but if youβre worried about ongoing damage, shut down.
- Call your IT department if this happened on a work computer. Donβt wait and hope itβs fine.
- Run a full scan with your security software once youβre isolated.
- Change passwords from a different, clean device β not from the potentially compromised computer.
- Check your credit and monitor for new account activity β if your credentials were dumped, attackers may try to use them within hours.
If youβre a small business owner and you think a work machine was compromised, treat it as a confirmed incident, not a βprobably fine.β The cost of a ransomware recovery vastly exceeds the cost of a 30-minute call with an IT professional.
Bonus: For IT Admins β Netscaler and gRPC-Go Vulnerabilities
The same SANS Stormcast episode (March 24, 2026) that flagged the tax scam kill chain also highlighted two other active threats that deserve attention from anyone managing infrastructure:
Netscaler (Citrix ADC/Gateway) β Patch Immediately
Citrix/Broadcom released patches for active vulnerabilities in Netscaler ADC and Gateway. These products are widely deployed as remote access gateways and load balancers. Active exploitation is ongoing β meaning attackers are using these vulnerabilities right now, not waiting for defenders to catch up.
Action: Check Citrix/Broadcomβs security bulletins immediately. If your Netscaler deployment is internet-facing and unpatched, itβs a priority-one item. The tax scam timing is not coincidental β attackers work on multiple fronts, and unpatched network perimeter devices are a separate but equally valid entry point.
gRPC-Go Authorization Bypass β Check Your APIs
A CVE has been filed for an authorization bypass vulnerability in gRPC-Go, the Go language implementation of the gRPC framework. gRPC is widely used in microservices architectures and internal APIs. The vulnerability involves an issue with auth middleware that, under certain conditions, can be bypassed β meaning requests that should be rejected could be processed.
Whoβs affected: Applications built using gRPC-Go with authentication middleware. This is particularly relevant for cloud-native, containerized, or Kubernetes-based deployments.
Action: Check GitHub advisories and the NVD (National Vulnerability Database) for the specific CVE. Review your gRPC-Go version and apply patches. Even if you think youβre not exposed, verify β gRPC-Go is often pulled in as a dependency without developers knowing itβs there.
The Bottom Line
The threat this tax season isnβt just a phishing email trying to steal your Social Security number. Itβs an attack chain designed to surgically remove your defenses before you have a chance to notice.
Attackers are using search ads to find you, legitimate-looking software to get in, and kernel-level driver exploits to kill your security tools β all before the real attack begins.
The good news: most of this is preventable. Go directly to official sites. Skip the sponsored ads. Keep your security software updated and verify itβs actually running. Enable MFA everywhere.
You have three weeks until April 15. The attackers know that. Now you know what theyβre doing with that window.
Donβt hand it to them.
Sources: Huntress Threat Intelligence (March 2026), SANS Internet Storm Center Stormcast March 24, 2026 (Episode 9862), Microsoft Threat Intelligence Blog March 19, 2026, IRS βDirty Dozenβ 2026 Tax Scams List. Information in this article is current as of March 25, 2026.



