Tax refund scam targets Californians
The California Franchise Tax Board has issued a warning about a tax scam targeting taxpayers through text messages. The scam involves fraudulent links mimicking official FTB web pages to steal personal and banking information. The messages claim to be about approved tax refunds and request recipients to provide collection information before a specific deadline. Key indicators of the scam include suspicious domain names, urgent language, requests for sensitive data, promised instant rewards, odd link-opening instructions, and foreign phone numbers. To stay safe, individuals are advised to be cautious of these signs, keep devices updated, use anti-malware protection, and verify information through official channels.
AI Analysis
Technical Summary
This threat describes a phishing campaign targeting taxpayers in California through fraudulent text messages impersonating the California Franchise Tax Board (FTB). The attackers send SMS messages claiming that the recipient has an approved tax refund and urge them to provide personal and banking information before a specified deadline. The scam uses deceptive domain names that closely mimic official FTB web pages, such as ftb.ca-mg.cc, ftb.cagov-etu.cc, and others, to trick victims into believing the communication is legitimate. Key indicators of the scam include suspicious domain names, urgent and coercive language, requests for sensitive data (e.g., banking details, social security numbers), promises of instant rewards, unusual instructions for opening links, and originating from foreign phone numbers. The campaign leverages social engineering techniques to exploit trust in government institutions and induce victims to disclose confidential information. Although no software vulnerability is exploited, the campaign poses a significant risk of identity theft and financial fraud. The campaign is classified as medium severity due to its potential to cause financial loss and privacy breaches but requires user interaction and does not exploit technical vulnerabilities or widespread systems. No known exploits in the wild or CVEs are associated with this campaign. The primary attack vector is SMS phishing (smishing), leveraging domain spoofing and social engineering tactics.
Potential Impact
For European organizations, the direct impact of this campaign is limited because it specifically targets California taxpayers and uses domains mimicking California government websites. However, the underlying phishing techniques and domain spoofing tactics are globally relevant and could be adapted to target European tax authorities or financial institutions. European organizations, especially those involved in tax administration, financial services, or customer support, could face similar phishing campaigns exploiting local tax refund seasons or financial incentives. If such scams proliferate in Europe, they could lead to significant financial fraud, identity theft, and erosion of public trust in government communications. Additionally, European companies with employees or customers in California might be indirectly affected if their personnel fall victim, potentially leading to compromised credentials or financial data leakage. The campaign highlights the importance of vigilance against social engineering and phishing attacks, which remain a pervasive threat across all regions.
Mitigation Recommendations
1. Implement advanced SMS filtering solutions that can detect and block messages containing suspicious links or domains mimicking official entities. 2. Educate employees and the public about phishing indicators specific to tax refund scams, emphasizing verification through official government websites rather than links in unsolicited messages. 3. Monitor and block access to known malicious domains listed in the indicators to prevent users from reaching fraudulent sites. 4. Encourage multi-factor authentication (MFA) for accessing sensitive financial or tax-related accounts to reduce the risk of account compromise. 5. Collaborate with domain registrars and hosting providers to identify and take down fraudulent domains promptly. 6. Promote the use of endpoint protection with anti-malware capabilities on mobile devices, as SMS phishing often targets smartphones. 7. Establish clear communication channels for tax authorities to disseminate warnings and updates about ongoing scams to the public. 8. For organizations with California ties, implement internal phishing simulations and awareness campaigns tailored to this threat vector. These measures go beyond generic advice by focusing on domain blocking, user education specific to tax refund scams, and proactive collaboration with domain registrars.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain
Indicators of Compromise
- domain: ftb.ca-mg.cc
- domain: ftb.ca-nt.cc
- domain: ftb.cagov-cg.cfd
- domain: ftb.cagov-etu.cc
- domain: ftb.cagov-ib.cc
- domain: ftb.cagov-ibh.cc
- domain: ftb.cagov-jme.cc
- domain: ftb.cagov-onr.cc
- domain: ftb.cagov-tqn.cc
- domain: ftb.gov-ciehka.xmnsia.cc
- domain: ftb.gov-qls.help
Tax refund scam targets Californians
Description
The California Franchise Tax Board has issued a warning about a tax scam targeting taxpayers through text messages. The scam involves fraudulent links mimicking official FTB web pages to steal personal and banking information. The messages claim to be about approved tax refunds and request recipients to provide collection information before a specific deadline. Key indicators of the scam include suspicious domain names, urgent language, requests for sensitive data, promised instant rewards, odd link-opening instructions, and foreign phone numbers. To stay safe, individuals are advised to be cautious of these signs, keep devices updated, use anti-malware protection, and verify information through official channels.
AI-Powered Analysis
Technical Analysis
This threat describes a phishing campaign targeting taxpayers in California through fraudulent text messages impersonating the California Franchise Tax Board (FTB). The attackers send SMS messages claiming that the recipient has an approved tax refund and urge them to provide personal and banking information before a specified deadline. The scam uses deceptive domain names that closely mimic official FTB web pages, such as ftb.ca-mg.cc, ftb.cagov-etu.cc, and others, to trick victims into believing the communication is legitimate. Key indicators of the scam include suspicious domain names, urgent and coercive language, requests for sensitive data (e.g., banking details, social security numbers), promises of instant rewards, unusual instructions for opening links, and originating from foreign phone numbers. The campaign leverages social engineering techniques to exploit trust in government institutions and induce victims to disclose confidential information. Although no software vulnerability is exploited, the campaign poses a significant risk of identity theft and financial fraud. The campaign is classified as medium severity due to its potential to cause financial loss and privacy breaches but requires user interaction and does not exploit technical vulnerabilities or widespread systems. No known exploits in the wild or CVEs are associated with this campaign. The primary attack vector is SMS phishing (smishing), leveraging domain spoofing and social engineering tactics.
Potential Impact
For European organizations, the direct impact of this campaign is limited because it specifically targets California taxpayers and uses domains mimicking California government websites. However, the underlying phishing techniques and domain spoofing tactics are globally relevant and could be adapted to target European tax authorities or financial institutions. European organizations, especially those involved in tax administration, financial services, or customer support, could face similar phishing campaigns exploiting local tax refund seasons or financial incentives. If such scams proliferate in Europe, they could lead to significant financial fraud, identity theft, and erosion of public trust in government communications. Additionally, European companies with employees or customers in California might be indirectly affected if their personnel fall victim, potentially leading to compromised credentials or financial data leakage. The campaign highlights the importance of vigilance against social engineering and phishing attacks, which remain a pervasive threat across all regions.
Mitigation Recommendations
1. Implement advanced SMS filtering solutions that can detect and block messages containing suspicious links or domains mimicking official entities. 2. Educate employees and the public about phishing indicators specific to tax refund scams, emphasizing verification through official government websites rather than links in unsolicited messages. 3. Monitor and block access to known malicious domains listed in the indicators to prevent users from reaching fraudulent sites. 4. Encourage multi-factor authentication (MFA) for accessing sensitive financial or tax-related accounts to reduce the risk of account compromise. 5. Collaborate with domain registrars and hosting providers to identify and take down fraudulent domains promptly. 6. Promote the use of endpoint protection with anti-malware capabilities on mobile devices, as SMS phishing often targets smartphones. 7. Establish clear communication channels for tax authorities to disseminate warnings and updates about ongoing scams to the public. 8. For organizations with California ties, implement internal phishing simulations and awareness campaigns tailored to this threat vector. These measures go beyond generic advice by focusing on domain blocking, user education specific to tax refund scams, and proactive collaboration with domain registrars.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.malwarebytes.com/blog/news/2025/09/tax-refund-scam-targets-californians"]
- Adversary
- null
- Pulse Id
- 68b87b643f45e9b76af61208
- Threat Score
- null
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domainftb.ca-mg.cc | — | |
domainftb.ca-nt.cc | — | |
domainftb.cagov-cg.cfd | — | |
domainftb.cagov-etu.cc | — | |
domainftb.cagov-ib.cc | — | |
domainftb.cagov-ibh.cc | — | |
domainftb.cagov-jme.cc | — | |
domainftb.cagov-onr.cc | — | |
domainftb.cagov-tqn.cc | — | |
domainftb.gov-ciehka.xmnsia.cc | — | |
domainftb.gov-qls.help | — |
Threat ID: 68b89ee7ad5a09ad00f9f19a
Added to database: 9/3/2025, 8:02:47 PM
Last enriched: 9/3/2025, 8:18:30 PM
Last updated: 10/19/2025, 6:43:57 PM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hidden links: why your website traffic is declining
MediumCAPI Backdoor: .NET Stealer Targeting Russian Auto-Commerce
MediumRansomware attacks and how victims respond
MediumLastPass Warns Customers It Has Not Been Hacked Amid Phishing Emails
MediumOdyssey Stealer & AMOS Hit macOS Developers with Fake Homebrew Sites
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.