Below is a message from the IRS.
Jim Erviti
IRS warns of "Tax Transcript" email scam; dangers to business networks
<https://myatx.blogspot.com/2018/11/irs-warns-of-tax-transcript-email-scam.html>
The Internal Revenue Service and Security Summit partners today warned
the public of a surge of fraudulent emails impersonating the IRS and
using tax transcripts as bait to entice users to open documents
containing malware.
The scam is especially problematic for businesses whose employees might
open the malware because this malware can spread throughout the network
and potentially take months to successfully remove.
This well-known malware, known as Emotet, generally poses as specific
banks and financial institutions in its effort to trick people into
opening infected documents. The Summit partnership of the IRS, state tax
agencies and the nation’s tax industry remind taxpayers to watch out for
this scam.
However, in the past few weeks, the scam masqueraded as the IRS,
pretending to be from “IRS Online.” The scam email carries an attachment
labeled “Tax Account Transcript” or something similar, and the subject
line uses some variation of the phrase “tax transcript.”
These clues can change with each version of the malware. Scores of these
malicious Emotet emails were forwarded to phishing@xxxxxxx
<mailto:phishing@xxxxxxx> recently.
The IRS reminds taxpayers it does not send unsolicited emails to the
public, nor would it email a sensitive document such as a tax
transcript, which is a summary of a tax return. The IRS urges taxpayers
not to open the email or the attachment. If using a personal computer,
delete or forward the scam email to phishing@xxxxxxx
<mailto:phishing@xxxxxxx>. If you see these using an employer’s
computer, notify the company’s technology professionals.
The United States Computer Emergency Readiness Team (US-CERT) issued a
warning in July about earlier versions of the Emotet in Alert
(TA18-201A) Emotet Malware
<https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Flinks.govdelivery.com%3A80%2Ftrack%3Ftype%3Dclick%26enid%3DZWFzPTEmbWFpbGluZ2lkPTIwMTgxMTE5Ljk3ODUwMTcxJm1lc3NhZ2VpZD1NREItUFJELUJVTC0yMDE4MTExOS45Nzg1MDE3MSZkYXRhYmFzZWlkPTEwMDEmc2VyaWFsPTE3MjE2OTU3JmVtYWlsaWQ9am9obi50dWNrZXJAY2Noc2ZzLmNvbSZ1c2VyaWQ9am9obi50dWNrZXJAY2Noc2ZzLmNvbSZmbD0mZXh0cmE9TXVsdGl2YXJpYXRlSWQ9JiYm%26%26%26127%26%26%26https%3A%2F%2Fwww.us-cert.gov%2Fncas%2Falerts%2FTA18-201A&data=02%7C01%7CJohn.Tucker%40wolterskluwer.com%7Cd38827a5221b40585ed508d64e4d260f%7C8ac76c91e7f141ffa89c3553b2da2c17%7C0%7C0%7C636782490626781414&sdata=Bn9T7gpe5otaqFnu3u5jO7yDPfNCfaA2fxR6jil6EIE%3D&reserved=0>.
US-CERT has labeled the Emotet Malware “among the most costly and
destructive malware affecting state, local, tribal, and territorial
(SLTT) governments, and the private and public sectors.”
---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus