Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Tax refund scam targets Californians

0
Medium
Published: Wed Sep 03 2025 (09/03/2025, 17:31:16 UTC)
Source: AlienVault OTX General

Description

The California Franchise Tax Board has issued a warning about a tax scam targeting taxpayers through text messages. The scam involves fraudulent links mimicking official FTB web pages to steal personal and banking information. The messages claim to be about approved tax refunds and request recipients to provide collection information before a specific deadline. Key indicators of the scam include suspicious domain names, urgent language, requests for sensitive data, promised instant rewards, odd link-opening instructions, and foreign phone numbers. To stay safe, individuals are advised to be cautious of these signs, keep devices updated, use anti-malware protection, and verify information through official channels.

AI-Powered Analysis

AILast updated: 09/03/2025, 20:18:30 UTC

Technical Analysis

This threat describes a phishing campaign targeting taxpayers in California through fraudulent text messages impersonating the California Franchise Tax Board (FTB). The attackers send SMS messages claiming that the recipient has an approved tax refund and urge them to provide personal and banking information before a specified deadline. The scam uses deceptive domain names that closely mimic official FTB web pages, such as ftb.ca-mg.cc, ftb.cagov-etu.cc, and others, to trick victims into believing the communication is legitimate. Key indicators of the scam include suspicious domain names, urgent and coercive language, requests for sensitive data (e.g., banking details, social security numbers), promises of instant rewards, unusual instructions for opening links, and originating from foreign phone numbers. The campaign leverages social engineering techniques to exploit trust in government institutions and induce victims to disclose confidential information. Although no software vulnerability is exploited, the campaign poses a significant risk of identity theft and financial fraud. The campaign is classified as medium severity due to its potential to cause financial loss and privacy breaches but requires user interaction and does not exploit technical vulnerabilities or widespread systems. No known exploits in the wild or CVEs are associated with this campaign. The primary attack vector is SMS phishing (smishing), leveraging domain spoofing and social engineering tactics.

Potential Impact

For European organizations, the direct impact of this campaign is limited because it specifically targets California taxpayers and uses domains mimicking California government websites. However, the underlying phishing techniques and domain spoofing tactics are globally relevant and could be adapted to target European tax authorities or financial institutions. European organizations, especially those involved in tax administration, financial services, or customer support, could face similar phishing campaigns exploiting local tax refund seasons or financial incentives. If such scams proliferate in Europe, they could lead to significant financial fraud, identity theft, and erosion of public trust in government communications. Additionally, European companies with employees or customers in California might be indirectly affected if their personnel fall victim, potentially leading to compromised credentials or financial data leakage. The campaign highlights the importance of vigilance against social engineering and phishing attacks, which remain a pervasive threat across all regions.

Mitigation Recommendations

1. Implement advanced SMS filtering solutions that can detect and block messages containing suspicious links or domains mimicking official entities. 2. Educate employees and the public about phishing indicators specific to tax refund scams, emphasizing verification through official government websites rather than links in unsolicited messages. 3. Monitor and block access to known malicious domains listed in the indicators to prevent users from reaching fraudulent sites. 4. Encourage multi-factor authentication (MFA) for accessing sensitive financial or tax-related accounts to reduce the risk of account compromise. 5. Collaborate with domain registrars and hosting providers to identify and take down fraudulent domains promptly. 6. Promote the use of endpoint protection with anti-malware capabilities on mobile devices, as SMS phishing often targets smartphones. 7. Establish clear communication channels for tax authorities to disseminate warnings and updates about ongoing scams to the public. 8. For organizations with California ties, implement internal phishing simulations and awareness campaigns tailored to this threat vector. These measures go beyond generic advice by focusing on domain blocking, user education specific to tax refund scams, and proactive collaboration with domain registrars.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.malwarebytes.com/blog/news/2025/09/tax-refund-scam-targets-californians"]
Adversary
null
Pulse Id
68b87b643f45e9b76af61208
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainftb.ca-mg.cc
domainftb.ca-nt.cc
domainftb.cagov-cg.cfd
domainftb.cagov-etu.cc
domainftb.cagov-ib.cc
domainftb.cagov-ibh.cc
domainftb.cagov-jme.cc
domainftb.cagov-onr.cc
domainftb.cagov-tqn.cc
domainftb.gov-ciehka.xmnsia.cc
domainftb.gov-qls.help

Threat ID: 68b89ee7ad5a09ad00f9f19a

Added to database: 9/3/2025, 8:02:47 PM

Last enriched: 9/3/2025, 8:18:30 PM

Last updated: 10/19/2025, 6:43:57 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats