WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – Emotet Threat Actors Exploiting Tax Season to Compromise Victims
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Emotet Threat Actors Exploiting Tax Season to Compromise Victims

Author: Alec Davison

Created: Tuesday, March 28, 2023 - 19:19

Categories: Cybersecurity

A new Emotet phishing campaign is exploiting tax season by purporting to be the Internal Revenue Service to compromise unsuspecting victims and conduct further malicious activity, according to security researchers at Malwarebytes and Palo Alto Networks Unit42.

In one of the campaigns, the threat actors send emails with the subject “IRS Tax Forms W-9,” while purporting to be an “Inspector” from the IRS. The phishing email contains a ZIP archive named “W-9 form.zip” that contains a malicious Word document, that when interacted with ultimately leads to the delivery of Emotet. Another campaign leverages OneNote to infect users with Emotet using a similar “W-9” theme. Members are encouraged to remind users of the tax-related scams that are prevalent this time of year. Read more at BleepingComputer here.

Additionally, as Emotet and IcedID threat actors are believed to be partnering to expand their capability, it should be noted that researchers have recently identified two new IcedID variants that may be leveraging existing Emotet infections to test functionality. While IcedID malware was historically used for banking fraud, in recent months threat actors have been using new variants, tracked as “Lite” (first seen in November 2022) and “Forked” (first observed in February 2023) to gain initial access to victim networks. Read more at BleepingComputer here.

Additional WaterISAC Reporting on Emotet and IcedID:

  • Threat Awareness – Keep Our Eyes on Emotet
  • Emotet Employing New Tactics to Evade Detection and Infect more Victims
  • Threat Awareness – Emotet Malware Being Distributed Via Microsoft OneNote
  • Threat Awareness – IcedID Banking Trojan Changes Strategy to Zoom Phishing Sites
  • DHS Report on Threat Actors Exploiting OneNote to Deliver Qakbot and IcedID Malware

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar