{"id":1243,"date":"2026-02-01T11:34:36","date_gmt":"2026-02-01T17:34:36","guid":{"rendered":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/?p=1243"},"modified":"2026-02-01T11:34:36","modified_gmt":"2026-02-01T17:34:36","slug":"irs-warning-fifth-wave-new-client-scam-2026","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/blog\/irs-warning-fifth-wave-new-client-scam-2026\/","title":{"rendered":"URGENT: IRS Warns of &#8220;Fifth Wave&#8221; AI Tax Scams Targeting CPAs"},"content":{"rendered":"<p>&nbsp;<\/p>\n<article><!-- Urgent Alert Header --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"40\" bgcolor=\"#ef3f37\">\n<tbody>\n<tr>\n<td>\n<h1 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 2.2em;font-weight: 900;margin: 0 0 20px 0;line-height: 1.3\">\ud83d\udea8 URGENT: IRS Issues &#8220;Fifth Wave&#8221; Warning for Tax Professionals<\/h1>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.3em;margin: 0;font-weight: 600;padding: 15px;border-radius: 5px\">AI-Powered Phishing Campaign Targets Las Vegas CPAs &amp; Accounting Firms | January 20, 2026<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Threat Level Indicator --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td align=\"center\">\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"background-color: #ef3f37;padding: 15px 30px;border-radius: 50px\">\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;font-weight: 900;color: white\">\u26a0\ufe0f CRITICAL TAX SEASON ALERT &#8211; PROTECT YOUR EFIN\/PTIN NOW<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Executive Summary --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">1. Executive Summary: The AI &#8220;New Client&#8221; Trap<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">On January 20, the <strong>IRS and the Security Summit<\/strong> issued a critical warning regarding a sophisticated new phishing campaign targeting tax professionals and CPAs. Dubbed the <strong style=\"color: #ef3f37\">&#8220;Fifth Wave,&#8221;<\/strong> this campaign utilizes <strong>Generative AI (ChatGPT-like technology)<\/strong> to craft hyper-realistic &#8220;new client&#8221; inquiries that bypass traditional spam filters.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- AI Threat Box --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<h3 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">\ud83e\udd16 The AI Difference<\/h3>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\">Unlike previous scams that were riddled with typos and obvious red flags, these emails are <strong style=\"color: #ef3f37\">grammatically perfect and contextually aware<\/strong>. They typically claim to be a high-net-worth individual moving to the Las Vegas area or a business owner needing urgent filing assistance. The goal? To trick your intake staff into opening a malicious attachment that deploys <strong style=\"color: #ef3f37\">Info-Stealer Malware<\/strong>.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Technical Details --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">2. The Technical Details: Anatomy of the Attack<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.8;color: #002f44\">This attack vector has evolved significantly from the standard &#8220;phishing&#8221; blast. Here is what your IT team and tax professionals need to look for:<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Attack Chain --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 20px 0\">Attack Chain Analysis:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37;padding: 20px;margin-bottom: 15px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83d\udce7 The Lure (Initial Contact)<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">An email from a generic but plausible domain (e.g., <code style=\"background-color: #f4f8fa;padding: 3px 8px;border-radius: 3px;color: #ef3f37\">john.doe@gmail.com<\/code> or a spoofed corporate domain) asking: <em>&#8220;Are you taking new clients? I have a complex K-1 situation and need help filing my Nevada partnership returns.&#8221;<\/em><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #ef9b37;padding: 20px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83d\udcce The Payload (Follow-up)<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">After you reply expressing interest, the attacker sends a follow-up email with a link to a fake <strong>Dropbox, Google Drive, or SharePoint<\/strong> file claiming to contain tax documents: <em>&#8220;Here are my W-2s and 1099s for review.&#8221;<\/em><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #2fb17e;padding: 20px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83d\udc80 The Malware (Execution)<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">The link downloads a ZIP file containing a disguised executable (often named <code style=\"background-color: #f4f8fa;padding: 3px 8px;border-radius: 3px;color: #ef3f37;font-weight: 600\">TaxDocs_2025.pdf.exe<\/code>). This is a <strong>Remote Access Trojan (RAT)<\/strong> designed to steal Session Tokens, allowing hackers to bypass your Multi-Factor Authentication (MFA).<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"15\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-left: 5px solid #ef3f37;padding: 20px\" bgcolor=\"white\"><strong style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin-bottom: 10px\">\ud83e\udd16 AI Utilization (Evasion)<\/strong><\/p>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;color: #002f44\">Attackers are using <strong>Large Language Models (LLMs)<\/strong> to generate unique, personalized email threads for each target. Every email is different, making detection by standard &#8220;signature-based&#8221; antivirus nearly impossible. The AI adapts to your responses, creating convincing multi-message conversations.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- The Risk Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">3. The Risk: Why This Matters NOW for Las Vegas CPAs<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">We are weeks away from the peak filing deadline. <strong style=\"color: #ef3f37\">A breach now is catastrophic.<\/strong><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Risk Blocks --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">\ud83d\udd13 Session Hijacking<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">Because the malware steals active session tokens, hackers can log into your <strong>Tax Software (ProSeries, Lacerte, Drake, UltraTax)<\/strong> or <strong>Email<\/strong> <em>as you<\/em> without needing your password or 2FA code. They have full access to client data, return preparation, and e-filing capabilities.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef9b37\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">\ud83d\udcc4 Fraudulent Returns<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">Attackers use your professional credentials (<strong style=\"color: #ef9b37\">EFIN\/PTIN<\/strong>) to file thousands of fraudulent refund claims to mule addresses. This triggers an <strong>IRS audit of your entire firm<\/strong>, potential license suspension, and criminal investigation. Your reputation and practice are destroyed.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #2fb17e\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">\ud83d\udd12 Ransomware Deployment<\/h3>\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7;color: #002f44\">In many cases, once the data is exfiltrated (client SSNs, bank account information, tax returns), the attackers deploy <strong>ransomware<\/strong> to lock your systems until a payment is made. You lose access to all client files during peak tax season.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Mitigation Plan --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">4. The 3-Step Mitigation Plan for Tax Professionals<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">Your <strong>&#8220;Human Firewall&#8221;<\/strong> is your best defense against AI social engineering. Implement these procedures immediately:<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 1 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #2fb17e\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #2fb17e;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">1<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">The &#8220;Voice Verification&#8221; Protocol<\/h3>\n<p style=\"margin: 0 0 15px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #2fb17e\">Policy:<\/strong> Never open a file link from a new client without a phone call.<\/p>\n<p style=\"margin: 0 0 15px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #2fb17e\">Action:<\/strong> If a &#8220;new client&#8221; sends a Dropbox link, reply: <em>&#8220;For security compliance, we require a quick 5-minute intake call before accepting documents. Please call our office at 702-XXX-XXXX to schedule.&#8221;<\/em><\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\">Bots and scammers will ghost you; real clients will appreciate the security. This single step eliminates 95% of phishing attempts.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 2 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef9b37\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #ef9b37;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">2<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">Isolate &#8220;Intake&#8221; Machines<\/h3>\n<p style=\"margin: 0 0 15px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef9b37\">Defense-in-Depth:<\/strong> Do not let intake staff open unknown attachments on a machine connected to your main server or tax software workstations.<\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef9b37\">Action:<\/strong> Use a &#8220;Sandboxed&#8221; browser (Chrome Incognito with extensions disabled) or a dedicated standalone laptop for reviewing new client files before moving them to your secure network. This contains the infection if malware executes.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Step 3 --><\/p>\n<table style=\"margin: 25px 0\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td style=\"border-left: 6px solid #ef3f37\">\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"80\">\n<div style=\"background-color: #ef3f37;color: white;width: 60px;height: 60px;border-radius: 50%;align-items: center;justify-content: center;font-family: 'Avenir', Arial, sans-serif;font-size: 2em;font-weight: 900;text-align: center;line-height: 60px\">3<\/div>\n<\/td>\n<td style=\"padding-left: 20px\">\n<h3 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.5em;font-weight: 900;margin: 0 0 15px 0\">Deploy Application Whitelisting<\/h3>\n<p style=\"margin: 0 0 15px 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef3f37\">Technical Control:<\/strong> Malware like <code style=\"background-color: #001b28;padding: 3px 8px;border-radius: 3px;color: #ef9b37\">.exe<\/code> files disguised as PDFs should never be able to run.<\/p>\n<p style=\"margin: 0;color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.05em;line-height: 1.7\"><strong style=\"color: #ef3f37\">Action:<\/strong> Configure your endpoint security (Microsoft Defender, ThreatLocker, or SentinelOne) to block any unauthorized executable files from launching in your &#8220;Downloads&#8221; or &#8220;Temp&#8221; folders. Only approved tax software and business applications should be whitelisted.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- CMIT Protection Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"25\">\n<tbody>\n<tr>\n<td>\n<h2 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.8em;font-weight: 900;margin: 0 0 20px 0;padding-bottom: 15px;border-bottom: 3px solid #ef3f37\">5. How CMIT Solutions Protects Las Vegas CPA Firms<\/h2>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 1.08em;line-height: 1.8;color: #002f44\">We specialize in securing <strong>Las Vegas accounting firms, tax professionals, and CPA practices<\/strong> during tax season. We don&#8217;t just guess; we enforce <strong style=\"color: #ef3f37\">Zero Trust<\/strong> security designed specifically for your industry.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><!-- Tax Season Shield --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#002f44\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #ef9b37;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 20px 0\">Our &#8220;Tax Season Shield&#8221; Includes:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"5%\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Email Sandboxing:<\/strong> We detonate attachments in a safe virtual environment before they reach your inbox. Malicious links and files are neutralized automatically<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">24\/7 SOC Monitoring:<\/strong> We watch for &#8220;Impossible Travel&#8221; logins (e.g., your account logging in from Russia while you&#8217;re in Summerlin) and block them instantly before damage occurs<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">EFIN\/PTIN Protection:<\/strong> Network segmentation isolates your e-filing credentials from general office systems, preventing credential theft even if endpoints are compromised<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Application Whitelisting:<\/strong> ThreatLocker deployment ensures only approved tax software (ProSeries, Lacerte, Drake, UltraTax) can execute &#8211; malware is blocked by default<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Tax Professional Training:<\/strong> Customized security awareness training specifically for CPAs, tax preparers, and accounting staff &#8211; including AI phishing simulations<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Immutable Backups:<\/strong> Daily encrypted backups of all client data with ransomware-proof storage &#8211; you never have to pay a ransom<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e;font-size: 1.4em\">\u2713<\/strong><\/td>\n<td style=\"color: white;font-family: 'Avenir', Arial, sans-serif;line-height: 1.7;padding: 8px 0\"><strong style=\"font-size: 1.15em\">Incident Response Plan:<\/strong> Pre-established breach response procedures compliant with IRS Publication 4557 requirements for tax professional data breaches<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Urgent Audit CTA --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"35\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td style=\"border: 3px solid #ef3f37\" align=\"center\">\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin: 0 0 15px 0\">\u26a0\ufe0f Got a Suspicious &#8220;New Client&#8221; Email?<\/h3>\n<p style=\"margin: 0 0 20px 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;line-height: 1.7;color: #002f44\">Worried about that email in your inbox? Don&#8217;t wait until client data is stolen. We can scan your network for infections in 24 hours.<\/p>\n<p style=\"margin: 0\"><a style=\"background-color: #ef3f37;color: white;padding: 18px 40px;text-decoration: none;border-radius: 50px;font-family: 'Avenir', Arial, sans-serif;font-weight: bold;font-size: 1.2em\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/contact-us\/\">Schedule Emergency Security Audit<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr style=\"border: none;border-top: 2px solid #d0dadf;margin: 50px 0\" \/>\n<p><!-- Main CTA Section --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"45\" bgcolor=\"#ef3f37\">\n<tbody>\n<tr>\n<td align=\"center\">\n<h2 style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 2.2em;font-weight: 900;margin: 0 0 20px 0\">Protect Your Practice Before April 15th<\/h2>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.2em;margin: 0 0 15px 0;line-height: 1.6\">Don&#8217;t become the next tax professional headline. Get enterprise-grade cybersecurity designed specifically for CPA firms.<\/p>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1.15em;margin: 0 0 25px 0;font-weight: 600\">CMIT Solutions Las Vegas: Protecting Accounting Firms Since 2001<\/p>\n<table style=\"margin: 25px auto\" border=\"0\" cellspacing=\"0\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"border-radius: 50px;padding: 5px 20px\" bgcolor=\"#002f44\">\n<p style=\"margin: 0;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: bold;color: white\">\ud83d\udcde <a style=\"color: white;text-decoration: none\" href=\"tel:702-725-2877\">702-725-2877<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"margin: 25px 0\"><a style=\"background-color: #002f44;color: white;padding: 18px 40px;text-decoration: none;border-radius: 50px;font-family: 'Avenir', Arial, sans-serif;font-weight: bold;font-size: 1.2em\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/contact-us\/\">Request Tax Season Security Assessment<\/a><\/p>\n<p style=\"color: white;font-family: 'Avenir', Arial, sans-serif;font-size: 1em;margin: 25px 0 0 0\"><a style=\"color: white;text-decoration: underline\" href=\"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\">cmitsolutions.com\/lasvegas-nv-1206<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Key Takeaways --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"30\" bgcolor=\"#f4f8fa\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.6em;font-weight: 900;margin-top: 0\">Key Takeaways for Tax Professionals:<\/h3>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"8\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"3%\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>IRS Fifth Wave phishing campaign<\/strong> uses AI to generate perfect &#8220;new client&#8221; emails that bypass spam filters<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Session hijacking threat<\/strong> &#8211; Malware steals active tokens to access tax software (ProSeries, Lacerte, Drake) without passwords<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #ef3f37\">\u26a0<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>EFIN\/PTIN at risk<\/strong> &#8211; Attackers use your credentials to file thousands of fraudulent returns, triggering IRS audits<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Voice verification protocol<\/strong> &#8211; NEVER open file links from new clients without a phone call first<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Isolate intake machines<\/strong> &#8211; Use sandboxed browsers or standalone laptops for reviewing unknown documents<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>Application whitelisting<\/strong> &#8211; Block unauthorized .exe files from launching in Downloads and Temp folders<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\"><strong style=\"color: #2fb17e\">\u2713<\/strong><\/td>\n<td style=\"font-family: 'Avenir', Arial, sans-serif;line-height: 1.8;color: #002f44\"><strong>CMIT Solutions Tax Season Shield<\/strong> &#8211; Email sandboxing, 24\/7 SOC, EFIN protection for Las Vegas CPA firms<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><!-- Source Attribution --><\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"20\">\n<tbody>\n<tr>\n<td>\n<h3 style=\"color: #002f44;font-family: 'Avenir', Arial, sans-serif;font-size: 1.3em;font-weight: 900;margin: 0 0 10px 0\">6. Official Sources &amp; Additional Resources<\/h3>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 0.95em;color: #9ba8b1;margin: 0;font-style: italic\">For more details on the IRS Fifth Wave &#8220;New Client&#8221; scam mechanics and official guidance, review the IRS warning here: <a style=\"color: #002f44;text-decoration: underline\" href=\"https:\/\/www.irs.gov\/newsroom\/tax-professionals-watch-out-for-new-client-email-scam\" target=\"_blank\" rel=\"noopener noreferrer\">IRS.gov: Tax Professionals Watch Out for New Client Email Scam<\/a><\/p>\n<p style=\"font-family: 'Avenir', Arial, sans-serif;font-size: 0.95em;color: #9ba8b1;margin: 10px 0 0 0;font-style: italic\">IRS Data Breach Response Guide: <a style=\"color: #002f44;text-decoration: underline\" href=\"https:\/\/www.irs.gov\/pub\/irs-pdf\/p4557.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Publication 4557 &#8211; Safeguarding Taxpayer Data<\/a><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/article>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The IRS Security Summit has dubbed this the &#8216;Fifth Wave&#8217;\u2014a highly coordinated campaign using AI-generated inquiries to trick tax professionals into downloading info-stealer malware.<\/p>\n","protected":false},"author":1008,"featured_media":1242,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/users\/1008"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/comments?post=1243"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/posts\/1243\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media\/1242"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/media?parent=1243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/categories?post=1243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/lasvegas-nv-1206\/wp-json\/wp\/v2\/tags?post=1243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}