{"id":69588,"date":"2026-01-29T05:00:17","date_gmt":"2026-01-29T13:00:17","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=69588"},"modified":"2026-02-05T08:26:49","modified_gmt":"2026-02-05T16:26:49","slug":"tax-season-scams","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/","title":{"rendered":"W-2s Are Arriving. Here\u2019s How to Spot and Avoid Tax Scams"},"content":{"rendered":"<p data-start=\"137\" data-end=\"484\">W-2s are arriving, and tax season officially begins the moment they do.<\/p>\n<p data-start=\"137\" data-end=\"484\">That timing makes this a prime window for tax scams, especially phishing attempts designed to look like routine requests from employers or the IRS. Knowing how these scams work can help you protect your information before filing.<\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">What Is a W-2 Phishing Scam?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">A\u00a0W-2 phishing\u00a0scam\u00a0is a form of social engineering where scammers trick you into sharing your W-2 or other tax information.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These\u00a0scams\u00a0often impersonate:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">The IRS or a tax authority<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Your employer or HR department<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">A payroll provider or tax software company<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Modern phishing emails are often polished, correctly branded, and free of obvious spelling or grammar mistakes. Knowing how to spot phishing emails now requires paying attention to context and\u00a0behavior, not writing quality alone.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">How W-2 Phishing Scams Usually Work<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Most W-2\u00a0scams\u00a0follow a familiar pattern:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">A message arrives when you expect tax communication<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">It appears official or internal<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">You\u2019re\u00a0asked to upload, email, or confirm documents<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">A link or attachment leads to a fake portal or malware<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Modern phishing emails are often\u00a0well written, branded correctly, and free of obvious mistakes. Grammar alone is no longer a reliable warning sign.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Why W-2 Scams Are So Dangerous<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">A stolen W-2\u00a0isn\u2019t\u00a0just a tax problem.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Once scammers have access to your personal and income information, they can:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">File a fraudulent tax return and claim your refund<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Open new credit accounts<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Apply for loans or benefits<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Sell your identity data<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">According to the FBI\u2019s Internet Crime Complaint\u00a0Center, tax-related phishing spikes every filing season, and recovery can take months or longer once fraud occurs.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Tax Refund Scams and IRS Phishing Scams Explained<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">Tax refund fraud<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><b><span data-contrast=\"auto\">happens when scammers use stolen identity information<\/span><\/b><span data-contrast=\"auto\">,\u00a0<\/span><b><span data-contrast=\"auto\">often obtained through W-2 phishing,\u00a0to file a tax return before you do.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Many victims\u00a0don\u2019t\u00a0discover the fraud until:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Their return is rejected because one was already filed<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">The IRS\u00a0notifies them\u00a0of suspicious activity<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Their expected refund never arrives<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Scammers often follow up with fake messages claiming\u00a0there\u2019s\u00a0a \u201crefund issue\u201d that requires you to verify personal information, pushing victims deeper into the\u00a0scam.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Filing early is one of the most effective ways to reduce refund fraud risk.<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Other W-2 and Tax Season Scams to Watch For<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<h3 style=\"padding-left: 40px;\" aria-level=\"3\"><b><span data-contrast=\"none\">Fake Tax Preparation Websites<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h3>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Some scammers create lookalike tax filing sites or buy ads that redirect to fraudulent portals. These sites collect W-2s, Social Security numbers, and banking details.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Red flag:<\/span><\/b><span data-contrast=\"auto\">\u00a0Misspelled URLs, unfamiliar domains, or sites asking for excessive information up front.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 style=\"padding-left: 40px;\" aria-level=\"3\"><b><span data-contrast=\"none\">IRS Impersonation by Phone or Text<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h3>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Scammers call or text claiming to be IRS agents, sometimes spoofing caller ID.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Important:<\/span><\/b><span data-contrast=\"auto\">\u00a0The IRS does not\u00a0initiate\u00a0contact by phone, text, or social media demanding immediate action or payment.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 style=\"padding-left: 40px;\" aria-level=\"3\"><b><span data-contrast=\"none\">Workplace W-2 Requests<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/h3>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Employees may receive emails appearing to come from HR or payroll asking them to resend W-2s or verify information.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Red flag:<\/span><\/b><span data-contrast=\"auto\">\u00a0Requests that feel rushed or arrive outside normal company processes.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Practical Steps to Protect Your W-2 and Tax Information<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Verify before you share<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">If someone asks for your W-2 or tax documents, confirm the request through a separate channel before sending anything.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Use secure sharing methods<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Avoid emailing tax documents as attachments. Use secure portals or encrypted file-sharing tools whenever possible.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Protect your devices\u00a0and use a VPN<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Keep your devices updated and use security tools that can flag malicious links, fake sites, and suspicious messages across email, text, and social platforms.\u00a0Whether\u00a0you\u2019re\u00a0submitting\u00a0taxes on an unsecure network at a public coffee shop, or on your home&#8217;s private\u00a0Wi-Fi, a VPN adds an extra layer of security and protection as you file.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">File as soon as\u00a0you\u2019re\u00a0ready<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Early filing limits the window scammers\u00a0have to\u00a0file a fraudulent return in your name.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Watch for refund red flags<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Unexpected refund notices, verification requests, or delays should be checked directly through official IRS channels,\u00a0not links in messages.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">What to Do If\u00a0You\u2019re\u00a0a Victim of a W-2 Phishing Scam<\/span><\/b><b><span data-contrast=\"none\">\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">If you believe your tax information was exposed:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">Stop communicating with the sender<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Contact the IRS and file Form 14039 (Identity Theft Affidavit)<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Report the\u00a0scam\u00a0to the FTC at FTC.gov<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Monitor financial and credit accounts<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Consider a fraud alert or credit freeze<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Run a security scan on your device<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/free.html\"><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"> (check out our free trial)<\/span><\/a><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Taking action\u00a0early can significantly reduce long-term damage.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"none\">Frequently Asked Questions<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1696\" aria-rowcount=\"5\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"0\"><b><span data-contrast=\"auto\">Q: Does the IRS ever email or text about tax issues?<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A: No. The IRS does not request personal or financial information via email, text, or social media.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"0\"><b><span data-contrast=\"auto\">Q: Can someone file taxes using my W-2?<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A: Yes. With enough personal information, criminals can file a fraudulent return and claim your refund.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"0\"><b><span data-contrast=\"auto\">Q: What is tax refund fraud?<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A: Refund fraud occurs when scammers file a false tax return using stolen identity data and collect the refund before the real taxpayer files.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"0\"><b><span data-contrast=\"auto\">Q: How can I tell if a tax filing website is fake?<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A: Check the URL carefully, avoid ads that redirect unexpectedly, and use well-known, verified services.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td data-celllook=\"0\"><b><span data-contrast=\"auto\">Q: Is it safe to email my W-2 to my accountant?<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A: Email is not ideal. Secure portals or encrypted file-sharing tools are safer options.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>W-2 phishing scams often involve emails that appear to be from the IRS or another official source, requesting personal information. The goal is to trick the recipient into revealing confidential data, such as social security numbers and financial information, which the perpetrator can then use for fraudulent purposes.<\/p>\n","protected":false},"author":1440,"featured_media":210308,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,13,12],"tags":[76,4185],"coauthors":[16632],"class_list":["post-69588","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-privacy-identity-protection","category-family-safety","tag-cybercrime","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>W-2s Are Arriving. Here\u2019s How to Spot and Avoid Tax Scams | McAfee Blog<\/title>\n<meta name=\"description\" content=\"W-2 phishing scams often involve emails that appear to be from the IRS or another official source, requesting personal information. The goal is to trick the recipient into revealing confidential data, such as social security numbers and financial information, which the perpetrator can then use for fraudulent purposes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"W-2s Are Arriving. Here\u2019s How to Spot and Avoid Tax Scams | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"W-2 phishing scams often involve emails that appear to be from the IRS or another official source, requesting personal information. The goal is to trick the recipient into revealing confidential data, such as social security numbers and financial information, which the perpetrator can then use for fraudulent purposes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-29T13:00:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-05T16:26:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_Protect-Tax-Scams.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brooke Seipel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Seipel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"W-2s Are Arriving. Here\u2019s How to Spot and Avoid Tax Scams\",\"datePublished\":\"2026-01-29T13:00:17+00:00\",\"dateModified\":\"2026-02-05T16:26:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/\"},\"wordCount\":891,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Tax_Season_Thumb.jpeg\",\"keywords\":[\"cybercrime\",\"Phishing\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Privacy &amp; Identity Protection\",\"Family Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/\",\"name\":\"W-2s Are Arriving. Here\u2019s How to Spot and Avoid Tax Scams | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Tax_Season_Thumb.jpeg\",\"datePublished\":\"2026-01-29T13:00:17+00:00\",\"dateModified\":\"2026-02-05T16:26:49+00:00\",\"description\":\"W-2 phishing scams often involve emails that appear to be from the IRS or another official source, requesting personal information. The goal is to trick the recipient into revealing confidential data, such as social security numbers and financial information, which the perpetrator can then use for fraudulent purposes.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Tax_Season_Thumb.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Tax_Season_Thumb.jpeg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Phishing for W-2s: Keeping Your Financial Data Safe During Tax Season\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"W-2s Are Arriving. Here\u2019s How to Spot and Avoid Tax Scams | McAfee Blog","description":"W-2 phishing scams often involve emails that appear to be from the IRS or another official source, requesting personal information. The goal is to trick the recipient into revealing confidential data, such as social security numbers and financial information, which the perpetrator can then use for fraudulent purposes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"W-2s Are Arriving. Here\u2019s How to Spot and Avoid Tax Scams | McAfee Blog","og_description":"W-2 phishing scams often involve emails that appear to be from the IRS or another official source, requesting personal information. The goal is to trick the recipient into revealing confidential data, such as social security numbers and financial information, which the perpetrator can then use for fraudulent purposes.","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2026-01-29T13:00:17+00:00","article_modified_time":"2026-02-05T16:26:49+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/03\/300x200_Blog_Protect-Tax-Scams.png","type":"image\/png"}],"author":"Brooke Seipel","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Brooke Seipel","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"W-2s Are Arriving. Here\u2019s How to Spot and Avoid Tax Scams","datePublished":"2026-01-29T13:00:17+00:00","dateModified":"2026-02-05T16:26:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/"},"wordCount":891,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Tax_Season_Thumb.jpeg","keywords":["cybercrime","Phishing"],"articleSection":["How To Guides and Tutorials","Privacy &amp; Identity Protection","Family Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/","name":"W-2s Are Arriving. Here\u2019s How to Spot and Avoid Tax Scams | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Tax_Season_Thumb.jpeg","datePublished":"2026-01-29T13:00:17+00:00","dateModified":"2026-02-05T16:26:49+00:00","description":"W-2 phishing scams often involve emails that appear to be from the IRS or another official source, requesting personal information. The goal is to trick the recipient into revealing confidential data, such as social security numbers and financial information, which the perpetrator can then use for fraudulent purposes.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Tax_Season_Thumb.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Tax_Season_Thumb.jpeg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/tax-season-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Phishing for W-2s: Keeping Your Financial Data Safe During Tax Season"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/69588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=69588"}],"version-history":[{"count":21,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/69588\/revisions"}],"predecessor-version":[{"id":226572,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/69588\/revisions\/226572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/210308"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=69588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=69588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=69588"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=69588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}