IRS suffers another data breach

By Sally P. Schreiber, J.D.

The IRS revealed on Tuesday that it discovered and stopped an automated cyberattack on its e-filing personal identification number (PIN) system last month. According to the IRS, the cybercriminals used information stolen “elsewhere outside the IRS” to generate e-file PINs for stolen Social Security numbers (SSNs). E-file PINs are used by some taxpayers to electronically file their tax returns.

Although no personal taxpayer data were compromised or disclosed by the breach, the IRS noted that the cybercriminals succeeded in using 101,000 SSNs to access e-file PINs (out of 464,000 attempts).

The IRS is notifying the affected taxpayers and placing tax return identity theft markers on their accounts. It is also continuing to closely monitor the Electronic Filing PIN application against further breaches.

The IRS also said it is working with other agencies and the Treasury Inspector General for Tax Administration to assess the problem and has shared information with Security Summit state and industry partners. It said the breach was not related to last week’s e-filing shutdown.

The news follows closely on last summer’s announcement that a breach of the IRS Get Transcript system resulted in the theft of some 334,000 taxpayers’ tax data (see prior coverage here).

Sally P. Schreiber (sschreiber@aicpa.org) is a JofA senior editor. 

SPONSORED REPORT

Time to prepare for overtime changes

As an employer, trusted business adviser, or HR professional, you will need to be aware of exemption guidance, record requirements, advice for clients, and typical problems in applying overtime pay.

QUIZ

News quiz: Good news on pay and benefits for accountants

CPAs can find much to like in recent reports, including news that their expertise and skills are in such demand that pay is expected to rise and that their employers value professional certifications.

CHECKLIST

Bolster your data defenses

As you weather the dog days of summer, it’s a good time to make sure your cybersecurity structure can stand up to the heat of external and internal threats. Here are six steps to help shore up your systems.