Skip to main content

Analysis of Recent Phishing Attacks Masquerading as CRA & IRS Communications

Cybercriminals are impersonating the CRA and IRS in new phishing campaigns

Updated this week

🧾 Tax Time = Phish Time: 2025 Sees Spike in CRA & IRS Spoof Emails

It’s tax season—and for cybercriminals, that means prime phishing season.

In recent weeks, security analysts across North America have flagged an alarming increase in spoofed emails posing as the Canada Revenue Agency (CRA) and Internal Revenue Service (IRS). These aren’t the clumsy scams of the past. They’re well-designed, highly targeted, and increasingly convincing.

Whether you're a small business, enterprise, or individual taxpayer, these phishing attacks aim to steal your credentials, financial data, or even full control of your email account.

Let’s break down how they work—and more importantly, how DMARC enforcement could’ve blocked most of them cold.


📬 A Look Inside the Latest CRA & IRS Phishing Emails

These emails use social engineering to create urgency, fear, or reward—all hallmarks of classic phishing. But now they come with government branding, AI-polished writing, and often a cloned portal.

📧 Example 1: CRA Refund Notification (Canada)

Subject: “Immediate Action Required – CRA Refund Notification”

From: refunds@cra-gov-ca[.]net

Body Preview:
“You have an unclaimed tax refund of CAD $826.32. Please verify your identity through the secure CRA portal.”

Link: cra-refund-gov[.]ca (spoofed domain)

📧 Example 2: IRS Tax Filing Error (USA)

Subject: “IRS Notice CP2000 – Unreported Income”
From: [email protected][.]com
Body Preview:
“We have identified inconsistencies in your 2024 return. Review the attached PDF to avoid penalties.”

Attachment: IRS_Form_CP2000.pdf (malware-laced)


🎭 Common Tactics Used in These Phishing Attacks

Tactic

Description

Lookalike Domains

Domains like cra-gov-ca[.]net, irs-tax-refund[.]org mimic government websites.

Visual Cloning

Logos, typography, and layout match CRA or IRS web pages almost perfectly.

Urgency Triggers

Threats of audits, penalties, or missed refunds are used to force action.

PDF & Link Payloads

Users are tricked into downloading infected attachments or clicking malicious login portals.

Sender Spoofing

The email "from" address looks like it comes from a real .gov domain.


📉 Real Impact: 2025 Victims Across North America

1. ca Case: Ontario SMBs Targeted

Several Ontario-based small businesses reported receiving CRA impersonation emails. One business owner clicked on the refund link and entered credentials into a fake CRA portal. The attackers accessed:

  • Corporate CRA login

  • Linked payroll portal

  • Business banking accounts (via reused credentials)

Estimated financial impact: $42,000 lost before banking alerts kicked in.

2. 🇺🇸 Case: IRS Spoofing Hits Enterprise

An enterprise HR department in Ohio received a fake IRS email requesting “tax documentation for employee records.” It was sent from tax-docs@irs-services[.]org and appeared legit.

An HR staff member opened the PDF attachment and unknowingly executed ransomware. The entire payroll system was compromised.


🔐 Why These Phishing Attacks Are So Effective in 2025

  1. They Appear to Come from Trusted .gov Sources
    Without DMARC enforcement on receiving systems, attackers can spoof IRS or CRA emails directly.

  2. Humans Trust Authority Brands
    Government institutions carry implicit trust. People don’t second-guess IRS or CRA messages.

  3. Most Businesses Don’t Monitor Spoof Activity
    If your domain is being impersonated, you may not even know—until clients or partners report it.

  4. Email Gateways Don’t Catch Everything
    These emails often pass basic SPF/DKIM checks and appear "clean" to traditional spam filters.


🛡️ What YourDMARC Would Have Caught Instantly

At YourDMARC, we help businesses, nonprofits, and even public sector organizations enforce proper domain protection. Here's how YourDMARC could’ve stopped these attacks:

✅ 1. Blocked Spoofed Senders

→ Our system would reject emails from unverified domains like cra-gov-ca[.]net or irs.gov-secure[.]com.

✅ 2. Flagged Lookalike Domains

→ Real-time detection of domains with suspicious similarities to IRS/CRA—before they’re weaponized.

✅ 3. Sent Early Warnings to Security Teams

→ Alerts when attackers attempt to spoof your domain or use your email signature style.

✅ 4. Provided a Public DMARC Record

→ This helps ISPs, ESPs, and third parties verify your domain’s legitimacy—protecting your recipients from imposters.

DMARC isn’t just about your brand—it’s about protecting everyone your email reaches.


🧩 Recommended Actions for Tax Season 2025

For Businesses:

  • Run a DMARC audit on your domain (use our free YourDMARC Checker)

  • Enable “Reject” DMARC Policy after verifying alignment of SPF/DKIM

  • Monitor all subdomains, including billing, HR, and payroll systems

  • Educate employees on spotting CRA/IRS phishing red flags

  • Avoid clicking on links or opening PDFs from unexpected government emails

For Governments & Public Institutions:

  • Publish and enforce DMARC policies for all official domains (especially .gov.ca, .gov)

  • Enable BIMI with Verified Mark Certificates for visual authentication

  • Report phishing domains to domain registrars for takedown

  • Partner with email compliance solutions like YourDMARC to monitor impersonation risks


🚨 Final Thoughts: The Email Threat Isn’t Going Away

In 2025, phishing attacks are more convincing than ever—especially when they impersonate trusted public sector bodies like the CRA and IRS.

These attacks are increasingly automated, AI-enhanced, and commercially available via phishing-as-a-service kits. Email security can’t be reactive anymore—it has to be preventive.

If you’re not enforcing DMARC yet, you’re one spoofed email away from becoming the next victim.

Let’s Lock Down Your Domain Before Tax Season Peaks

📩 Book a Free 1-on-1 DMARC Risk Assessment
We’ll walk you through how exposed your business is to spoofing—and how quickly we can fix it.

Did this answer your question?