Cyber crime

14 AI-driven tax scams CFOs need to watch this season

Catherine Chipeta
4 Min
Finance Leaders Beware: 6 Construction BEC Scams That Happened Across the Globe

From sophisticated phishing to deepfake impersonations and mobile-first attacks, AI is helping scammers scale and personalize their efforts in ways that traditional defenses may not catch. And for those responsible for protecting company funds, it’s no longer just an IT problem—it’s a finance one, too.

What are AI scams? If you’re just catching up on how AI is being used by threat actors, check out our AI scams explainer for finance.

Here are 14 tactics finance leaders need to understand—and how to help your team avoid them.

1. AI-written phishing emails

AI-powered language tools allow scammers to craft highly convincing emails that mimic IRS tone and branding. These emails often contain attachments disguised as tax documents or refund claims, and aim to extract sensitive information or trigger fraudulent payments.

According to the FBI’s Internet Crime Report, phishing alone accounted for over $2.7 billion in reported losses last year.

2. Fake “AI tax assistants”

Cybercriminals are deploying bogus AI bots that pretend to offer tax support, but instead collect login credentials or redirect users to malicious websites. They mimic the look and feel of real AI-powered platforms.

See how scammers are using AI tools in finance fraud.

3. Deepfake IRS agents or family members

Voice and video deepfakes are used to impersonate familiar figures—from IRS agents to executives or family members. One finance worker was recently tricked into transferring $39 million after a deepfake video call impersonated their boss.

Read the full story here.

4. Malware-laced PDFs

Tax-themed attachments—like W-9s or vendor onboarding forms—are increasingly being used to deliver malware. Once opened, these files can provide access to internal finance systems or steal user credentials.

5. SMS phishing (“mishing”)

Scams delivered via text message appear to come from the IRS or trusted tax platforms. They often link to spoofed websites asking for login credentials or payment details.

6. QR code phishing (“quishing”)

Scammers now send malicious QR codes by email or print. When scanned, they lead users to phishing pages disguised as tax portals or invoice platforms—an evolution explored in this Proofpoint analysis.

7. Fake mobile tax apps

On unofficial app stores, fake IRS-themed tax apps have been discovered harvesting user credentials and sensitive payment data.

8. Device-adaptive scam websites

Modern scam sites adjust their layout depending on the device used. They may look different on mobile versus desktop to better mimic legitimate platforms and reduce suspicion.

9. Cloud-hosted malicious files

Links to files hosted on Google Drive or OneDrive are often trusted by default. Scammers exploit this trust to deliver malware via cloud-based PDFs and forms.

10. Spoofed IRS or tax software domains

Scammers register domains like irs-gov.com or secure-tax.net that closely resemble official sites, tricking users into logging in or uploading sensitive documents.

11. Typosquatting

By registering domains with subtle misspellings (e.g. irs.giv), scammers lure users into trusting fraudulent websites. There was a surge in IRS-themed phishing domains last tax season, including subtle lookalikes like irs-gov.com.

12. Expired domain hijacking

When legitimate business domains expire, scammers sometimes re-register them to rebuild a façade of trust. These domains are then used to deliver phishing emails or malware under the guise of a known entity.

13. SEO poisoning

Some scammers use search engine optimization (SEO) techniques to push fake tax help or refund sites to the top of Google search results—especially during peak filing periods.

14. AI-generated scam websites

LLM tools are being used to create scam websites that include realistic FAQs, customer reviews, chatbots, and even refund calculators—all designed to appear credible to busy users.

See how scammers are using AI to rewrite invoice details.

What finance teams can do

You don’t need a cybersecurity background to help protect your company from these risks. A few practical steps:

  • Educate your team: Train AP staff to spot red flags like urgent payment changes, unknown QR codes, or unexpected account updates.
  • Verify vendor changes: Use phone callbacks or secure portals—not just email—for confirming payment information.
  • Use our supplier onboarding checklist to build more secure verification practices.
  • Implement layered controls: Separate duties so that no single person can process a payment unilaterally, especially during tax season.
  • Coordinate with IT/security: Know what anti-phishing tools and domain monitoring are in place, and how your team can escalate concerns.

A final line of defense: payment verification

Even if a phishing email slips through, it doesn’t have to end in fraud. Tools like Eftsure offer real-time verification of supplier bank details, helping finance teams avoid sending money to the wrong people. With over $288 billion in B2B payments safeguarded last year, Eftsure helps bridge the gap between cyber threats and financial controls—especially during high-risk periods like tax season.

Want to see how it works? Book a demo and learn how Eftsure can help your team protect every payment.

A final line of defence: payment verification
Book a demo and learn how Eftsure can help your team protect every payment.

Related articles

Cyber crime

What Is an AI Voice Scam?

AI voice scams are targeting finance teams—using deepfake tech to mimic executives and authorise payments. Learn how they work—and how to stop them.

Read more

The new security standard for business payments

Eftsure provides continuous control monitoring to protect your eft payments. Our multi-factor verification approach protects your organisation from financial loss due to cybercrime, fraud and error.