Tax season is the busiest time of the year for taxpayers, but it is also the peak season for cybercriminals. As we ramp up our efforts to file on time here at Tangible Accounting, PLLC, fraudsters are simultaneously increasing their efforts to manipulate individuals into revealing sensitive personal data. These identity thieves use stolen information to file fraudulent tax returns and intercept refunds, creating a ripple effect of financial damage that can last for years.
We often emphasize the importance of identity protection because a compromised identity is a genuine financial nightmare. Untangling the mess left by a sophisticated scammer is a grueling process that often requires significant time and professional intervention. These criminals are relentless and highly adaptable, frequently updating their tactics to stay one step ahead. It only takes a single moment of distraction or a misplaced click for your identity to be compromised and the nightmare to begin.
Identity thieves are masters of disguise, often mimicking the IRS name, official logos, and even the visual layout of government websites. Their goal is to create a false sense of legitimacy, convincing you that their fraudulent communication is a formal mandate. Beyond the IRS, scammers may also pose as representatives from other federal agencies, such as the U.S. Department of the Treasury.
In these identity theft schemes, the fraudster typically poses as a trusted government official or a representative from a reputable financial institution. They aim to trick victims into disclosing high-value data, including Social Security numbers, bank account credentials, and credit card details. Once they have this information, they may drain bank accounts, open new lines of credit, or use your identity to secure benefits and file false tax returns in your name.

Scams are delivered through various channels, including physical letters, faxes, phone calls, and text messages. When criminals use email as their primary weapon to lure victims, it is known as a “phishing” scam.
Scammers frequently target individuals over age 65 or those approaching retirement. These criminals often use predatory tactics, and once a senior provides an initial payment, the demands for money usually escalate. When retirement funds are stolen through a scam, the financial blow is doubled: the lost funds may be treated as a taxable distribution. This means the victim could face ordinary income tax and, if they are under 59½, early withdrawal penalties. While a theft loss deduction might be possible if the scam was profit-motivated, the process is technically complex and recovery is rarely guaranteed.
At our West Palm Beach and Phoenix offices, we encourage clients to talk with their elderly family members about any suspicious messages. Regular conversations about the latest scam tactics can empower seniors to make informed decisions and protect their hard-earned wealth.
Phishing emails and “smishing” (SMS phishing) texts often follow a predictable pattern. They almost always create a sense of artificial urgency, pressuring you to act immediately without consulting an advisor. Whether they claim you are in legal trouble or that you have won a surprise prize, the goal is to bypass your critical thinking. Be skeptical of any unsolicited request for payment or personal info via phone, text, or email. If an offer seems too good to be true, it almost certainly is. Always verify communications through official channels before proceeding. Look for these red flags:
Requests for an unusual amount of personal data, such as security questions (mother’s maiden name) or full account numbers.
The use of “bait” to get you to respond, such as a fake tax refund or a paid survey from the IRS.
Threats of immediate consequences, such as account freezes or arrest for non-compliance.
Incorrect naming of federal agencies or the use of “Department of Internal Revenue.”
Poor grammar, odd phrasing, or awkward sentence structures often found in scams originating overseas.
Suspicious links that do not lead to the official www.irs.gov domain. Hover your mouse over any link to see the actual destination URL.
Sender addresses that slightly deviate from real domains, such as using misspellings or international extensions.

Criminals use email to install malware or steal credentials via fraudulent websites:
Text-based “smishing” scams are equally dangerous:
The best defense is a proactive one. Never click links or open attachments in unsolicited messages claiming to be from the IRS. It is important to remember that the IRS will never demand immediate payment over the phone, insist on a specific payment method like a gift card or wire transfer, or threaten you with deportation or arrest.
Verify any contact by calling official numbers listed on the IRS website or by logging into your secure IRS Online Account. If you receive a suspicious message, report it by forwarding the email to phishing@irs.gov. For suspicious texts, send the details to the same email with the word “Text” in the subject line.

We also recommend obtaining an Identity Protection PIN (IP PIN). This unique six-digit number prevents identity thieves from filing fraudulent returns using your Social Security number. The IRS will reject any return filed without the correct PIN. This PIN is valid for one calendar year and a new one is generated annually for your security. While victims of identity theft are often enrolled automatically, any taxpayer who can verify their identity can join the program voluntarily via the IRS Get an IP PIN tool.
Social media has become a breeding ground for tax misinformation. Influencers, often without any formal training or Enrolled Agent credentials, may suggest “hacks” to maximize refunds that actually involve falsifying information. These misleading posts often serve as gateways for scammers. Following this bad advice can lead to audits, heavy penalties, and criminal investigations. It is essential to rely on professional guidance for your tax strategy.
Remember that the IRS primarily communicates through official notices sent via the U.S. Postal Service. They will not reach out through social media, text, or email to request your sensitive financial data. If you have any concerns about a communication you have received or want to bolster your tax security, please contact Jaron J. Fulse, EA, and the team at Tangible Accounting, PLLC today.
Beyond the individual level, business owners in the West Palm Beach and Phoenix markets must also be vigilant regarding Business Email Compromise (BEC). This is a sophisticated scam where a fraudster hacks into a legitimate business email account to redirect payments or sensitive tax documents. For small business owners dealing with cash flow stress and the rush of back-to-back appointments, a seemingly routine request to change a vendor's bank account details for a 1099 payment can easily slip through the cracks. We always advise our clients at Tangible Accounting, PLLC to verify any changes to payment instructions through a secondary, offline channel, such as a direct phone call to a known contact.
Another significant risk during tax season is the presence of “ghost preparers.” Unlike an Enrolled Agent who is licensed by the federal government and required to sign every return they prepare, a ghost preparer will refuse to sign the tax return or provide their Preparer Tax Identification Number (PTIN). They may promise unusually large refunds based on fake deductions or claim a percentage of your refund as their fee. This is a massive red flag. By law, anyone who is paid to prepare or assist in preparing federal tax returns must have a valid PTIN and must sign the return.
Working with an unethical preparer can have devastating consequences. If the IRS discovers fraudulent claims on your return, you are the one legally responsible for the additional tax, interest, and penalties, even if you had no idea the preparer was acting dishonestly. This is why vetting your tax professional is vital. As an Enrolled Agent, Jaron J. Fulse is held to strict ethical standards and possesses unlimited representation rights before the IRS, providing a level of protection and accountability that a ghost preparer simply cannot offer.
If you discover that a fraudulent return has already been filed in your name, the road to recovery starts with IRS Form 14039, the Identity Theft Affidavit. This document is used to alert the IRS that your Social Security number has been compromised in a tax-related context. Filling out this form requires meticulous detail, as you must provide evidence of your identity and proof that you are the rightful owner of the SSN in question. At Tangible Accounting, PLLC, we often assist clients in navigating this complex paperwork to ensure that their records are corrected and their legitimate returns are eventually processed.
Once the affidavit is submitted, the IRS Identity Theft Tax Administration Service (IDTVA) begins an investigation. This process can be lengthy, often taking several months to resolve. During this time, your legitimate refund may be delayed, which is why we emphasize prevention through the Identity Protection PIN program. The goal is to stop the fraud before it ever enters the IRS system, rather than fighting to fix the damage after the fact.
Our presence in Florida and Arizona gives us a unique perspective on regional fraud trends. Florida, in particular, has historically seen some of the highest rates of identity theft in the country. This is partly due to the large population of retirees, who, as mentioned earlier, are primary targets for scammers. In the Phoenix area, we see a rise in scams targeting entrepreneurs and those in the tech and venture capital sectors, where high-value data is frequently exchanged. Fraudsters often use information found in public records, such as business filings or property deeds, to personalize their scams and make them more convincing.
For our clients in the Private Equity and Venture Capital practice, the stakes are even higher. Large-scale financial transactions can attract high-level cybercriminals who use social engineering to intercept wire transfers or steal K-1 data. We recommend that all business entities implement strict data handling protocols and use secure portals for the exchange of all tax-related documents. Standard email is rarely secure enough for the transmission of Social Security numbers or sensitive financial modeling data.
As technology evolves, so do the methods used by criminals. We are now seeing the emergence of AI-driven scams, including voice cloning and deepfake technology. A scammer might call a family member or a business associate using a voice that sounds exactly like yours, claiming you are in financial trouble or need immediate help with a tax bill. While this may sound like science fiction, it is a growing reality. It is more important than ever to have established protocols for financial decisions. If you receive a call that sounds like it is from a federal official or even a trusted advisor, take a moment to pause. Hang up and call the individual or agency back using a verified phone number you already have on file.
Protecting your financial footprint requires a combination of high-tech tools and old-fashioned common sense. Whether you are dealing with last-minute 1099 issues or managing a multi-million dollar project finance portfolio, your identity is your most valuable asset. By staying informed and working with a trusted partner who understands the local and federal tax landscape, you can navigate tax season with confidence and security. Our team is dedicated to providing the insight and protection necessary to safeguard your economic development and financial well-being in an increasingly digital world.
Sign up for our newsletter.