Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware
As Tax Day in the U.S. approaches, Microsoft has observed a surge in phishing campaigns leveraging tax-related themes to steal credentials and deploy malware. These campaigns utilize various redirection techniques—such as URL shorteners, QR codes in attachments, and legitimate services like file-hosting platforms and business profile pages—to evade detection. Microsoft identified that many of these phishing operations lead to payloads delivered via the RaccoonO365 phishing-as-a-service platform, along with malware such as Remcos, Latrodectus, Brute Ratel C4, AHKBot, and GuLoader.
On February 6, 2025, a campaign attributed to Storm-0249 targeted U.S. users with tax-themed emails distributing BRc4 and Latrodectus. These emails used PDF attachments with embedded redirect links that eventually led to fake DocuSign pages. Depending on the system and IP filtering rules, users were either delivered malware-laced MSI installers or benign decoy PDFs. Latrodectus, a loader with anti-analysis features and dynamic C2 configurations, was delivered alongside BRc4, a red-teaming tool abused for post-exploitation.
From February 12 to 28, threat actors targeted over 2,300 organizations—mainly in engineering, IT, and consulting—with emails containing PDFs that displayed QR codes. These codes redirected to unique RaccoonO365 phishing links, designed to steal Microsoft 365 credentials.
On February 13, an IRS-themed phishing email led users to download a malicious Excel file via a Google Business page redirector. Once macros were enabled, the Excel file executed an MSI that launched AHKBot, which used AutoHotKey scripts to exfiltrate screenshots from compromised systems.
On March 3, a more targeted campaign impersonated potential tax clients to build trust with accountants and CPAs. Once rapport was established, follow-up emails included a PDF that linked to a Dropbox-hosted ZIP file containing malicious .lnk files. These files triggered PowerShell scripts to download GuLoader, which then installed Remcos.
Security Officer Comments:
These campaigns highlight the continued effectiveness of social engineering during seasonal events like tax season, especially when combined with malware delivery infrastructure and phishing-as-a-service platforms. Threat actors are increasingly using multilayered approaches—combining social trust-building, obfuscated file attachments, redirect chains, and abuse of legitimate platforms—to bypass detection and increase user interaction. Security teams should remain vigilant for indicators of compromise related to Latrodectus, BRc4, AHKBot, Remcos, and GuLoader, and implement layered defenses including email filtering, endpoint detection, threat hunting, and user education to reduce the risk of credential theft and system compromise.
Suggested Corrections:
Microsoft recommends the following mitigations to reduce the impact of this threat.
Link(s):
https://thehackernews.com/2025/04/microsoft-warns-of-tax-themed-email.html