Company Details
irs
47,895
354,415
92
irs.gov
0
INT_1279664
In-progress

Internal Revenue Service Company CyberSecurity Posture
irs.govWelcome to the Internal Revenue Service’s official LinkedIn account. Here, you will find the latest and greatest news and updates for taxpayers to help them understand and meet their tax responsibilities. Also, this is a place to learn about a meaningful career with the IRS. Check out the tabs above to learn more about us and view job openings. The U.S. government does not promote or endorse any non-government or commercial content appearing on this page. This service is operated by a third party and not an official government website. The IRS strongly discourages you from providing personally identifiable information. Read our privacy policy at www.irs.gov/privacy
Company Details
irs
47,895
354,415
92
irs.gov
0
INT_1279664
In-progress
Between 750 and 799

IRS Global Score (TPRM)XXXX

Description: The hackers targeted the networks of Internal Revenue Services and breached the personal information of about 104,000 taxpayers. The stolen information included personal information like Social Security number, date of birth, address, and tax filing status of several years. IRS warned the taxpayers to be alerted of any suspicious activities.
Description: A cybercriminal exploited stolen taxpayer data to file fraudulent tax returns, targeting refunds under the victim’s identity. While the IRS has robust safeguards to detect such fraud, the breach exposed sensitive personal and financial information—including Social Security numbers, bank details, and tax records. The attackers primarily aimed to monetize the stolen data by opening unauthorized credit cards, selling the information on dark web marketplaces, or directly draining bank accounts via fraudulent transfers. Though the tax refund fraud itself had limited success due to IRS protections, the broader misuse of the compromised data led to financial losses for affected individuals, including unauthorized transactions, credit damage, and potential identity theft. The incident underscored vulnerabilities in third-party systems handling tax-related data, where cybercriminals leveraged phishing or database exploits to harvest credentials. While no large-scale systemic outage occurred, the reputational harm to the IRS and affected taxpayers was significant, eroding trust in digital tax filing security.


Internal Revenue Service has 53.85% more incidents than the average of same-industry companies with at least one recorded incident.
Internal Revenue Service has 56.25% more incidents than the average of all companies with at least one recorded incident.
Internal Revenue Service reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
IRS cyber incidents detection timeline including parent company and subsidiaries

Welcome to the Internal Revenue Service’s official LinkedIn account. Here, you will find the latest and greatest news and updates for taxpayers to help them understand and meet their tax responsibilities. Also, this is a place to learn about a meaningful career with the IRS. Check out the tabs above to learn more about us and view job openings. The U.S. government does not promote or endorse any non-government or commercial content appearing on this page. This service is operated by a third party and not an official government website. The IRS strongly discourages you from providing personally identifiable information. Read our privacy policy at www.irs.gov/privacy


We are working to provide excellent customs service in the field of legitimate trade according to the latest international practices that is characterized by quality, leadership, justice and satisfaction of customers and employees. We also work to make the necessary legislative amendments to achieve
Year after year, the Commonwealth of Massachusetts has continued to pioneer bold legislative actions and programs, some of which have been embraced on a national scale. We are always looking for talented individuals to help us maintain this momentum and improve the services that millions of people d

Le canton de Vaud, c’est plus de 800 000 personnes vivant dans plus de 300 communes ! Rejoindre l’Administration cantonale vaudoise, c’est s’engager aux côtés de près de 40’000 personnes unies dans un même but : servir la population. Pourquoi nous suivre ? Dédiez votre quart d’heure vaudois aux o

Help us achieve world-class education, training and care for everyone, whatever their background. Whether you're just starting out, or an experienced professional, we have what you are looking for. Jobs include administration, policy advisers, digital, finance, commercial specialists and many more

France Travail est un acteur majeur du marché de l’emploi en France où il s’investit pour faciliter le retour à l’emploi des demandeurs d’emploi et offrir aux entreprises des réponses adaptées à leurs besoins de recrutement. Les 55 000 collaborateurs de France Travail œuvrent au quotidien pour êtr

The government of Illinois, under the Constitution of Illinois, has three branches of government: executive, legislative and judicial. The executive branch is split into several statewide elected offices, with the Governor as chief executive, and has numerous departments, agencies, boards and commis

The Food and Drug Administration is an agency within the Department of Health and Human Services. The FDA is responsible for protecting the public health by ensuring the safety, efficacy, and security of human and veterinary drugs, biological products, and medical devices; and by ensuring the safet

Every day the contributions and achievements of State of Michigan employees have a direct impact on over 10 million Michiganders across the state. If you're looking for a fulfilling career in state government that can make a real difference in the lives of others, you can find your place working wit

Most people know that the National Park Service cares for national parks, a network of over 420 natural, cultural and recreational sites across the nation. The treasures in this system – the first of its kind in the world – have been set aside by the American people to preserve, protect, and share t
.png)
The Internal Revenue Service (IRS) hasn't implemented most of the Government Accountability Office's “priority recommendations” and is still...
The Executive Chairman, Ogun State Internal Revenue Service (OGIRS), Mr. Olugbenga Olaleye, has charged Directors, Zonal Controllers,...
WASHINGTON, Oct 10 (Reuters) - President Donald Trump on Friday blamed Democrats for his decision to lay off thousands of workers across the...
The Trump administration is moving ahead with mass layoffs of federal employees, something it has threatened to do since the start of the...
In three major hacks, Treasury didn't deploy cybersecurity measures that could have prevented the attacks or flagged the intruders sooner.
The cybersecurity program at the Internal Revenue Service does not meet federal standards, the Treasury Inspector General for Tax...
President Donald Trump's permanent pick to run the IRS is one step closer to taking office. The Senate Finance Committee advanced the nomination of former Rep....
Failures in cybersecurity practices at a software company that helps federal agencies manage investigations and FOIA requests allowed two...
While we have been busy building digital systems, we have neglected to secure them.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Internal Revenue Service is http://www.irs.gov.
According to Rankiteo, Internal Revenue Service’s AI-generated cybersecurity score is 757, reflecting their Fair security posture.
According to Rankiteo, Internal Revenue Service currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Internal Revenue Service is not certified under SOC 2 Type 1.
According to Rankiteo, Internal Revenue Service does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Internal Revenue Service is not listed as GDPR compliant.
According to Rankiteo, Internal Revenue Service does not currently maintain PCI DSS compliance.
According to Rankiteo, Internal Revenue Service is not compliant with HIPAA regulations.
According to Rankiteo,Internal Revenue Service is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Internal Revenue Service operates primarily in the Government Administration industry.
Internal Revenue Service employs approximately 47,895 people worldwide.
Internal Revenue Service presently has no subsidiaries across any sectors.
Internal Revenue Service’s official LinkedIn profile has approximately 354,415 followers.
Internal Revenue Service is classified under the NAICS code 92, which corresponds to Public Administration.
No, Internal Revenue Service does not have a profile on Crunchbase.
Yes, Internal Revenue Service maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/irs.
As of November 27, 2025, Rankiteo reports that Internal Revenue Service has experienced 2 cybersecurity incidents.
Internal Revenue Service has an estimated 11,106 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Cyber Attack.
Total Financial Loss: The total financial loss from these incidents is estimated to be $0.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with irs warned the taxpayers to be alerted of any suspicious activities, and law enforcement notified with potential involvement of irs criminal investigation (ci) unit, law enforcement notified with fbi for severe cases, and containment measures with irs safeguards to detect fraudulent filings, containment measures with identity verification protocols, and remediation measures with victim credit monitoring, remediation measures with fraud alerts on credit reports, remediation measures with irs identity protection pin (ip pin), and recovery measures with disputing fraudulent transactions, recovery measures with filing identity theft affidavits (e.g., irs form 14039), and communication strategy with irs public advisories on tax-related identity theft, communication strategy with victim notification protocols, and enhanced monitoring with credit monitoring services for victims, enhanced monitoring with irs fraud detection systems..
Title: IRS Data Breach
Description: The hackers targeted the networks of Internal Revenue Services and breached the personal information of about 104,000 taxpayers. The stolen information included personal information like Social Security number, date of birth, address, and tax filing status of several years. IRS warned the taxpayers to be alerted of any suspicious activities.
Type: Data Breach
Title: Tax Refund Fraud and Monetization of Stolen Personal Information
Description: Cybercriminals may use stolen personal information to conduct tax refund fraud by filing a tax return in the target’s name and claiming a refund. This scheme has a low probability of success due to IRS safeguards. More commonly, cybercriminals exploit stolen data year-round to monetize it—such as opening credit cards in the victim’s name, selling the data or access to other criminals, directly transferring funds from bank accounts, or making unauthorized online purchases.
Type: identity theft
Attack Vector: stolen personal informationphishingdata breach (unspecified)
Threat Actor: cybercriminalsfraudstersidentity thieves
Motivation: financial gain
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through phishing attacksdata breaches at third-party organizationsmalware infections.

Data Compromised: Social security number, Date of birth, Address, Tax filing status

Financial Loss: potential unauthorized bank transfersfraudulent tax refundsunauthorized credit card charges
Data Compromised: Personal identifiable information (pii), Tax-related data, Bank account details
Customer Complaints: ['potential increase due to identity theft or fraudulent activities']
Brand Reputation Impact: potential reputational damage to affected individuals or institutions
Legal Liabilities: potential liability for financial institutions or tax agencies if negligence is proven
Identity Theft Risk: high
Payment Information Risk: high
Average Financial Loss: The average financial loss per incident is $0.00.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, , Social Security Numbers (Ssn), Taxpayer Identification Numbers, Bank Account Details, Personal Identifiable Information (Pii) and .

Entity Name: Internal Revenue Services
Entity Type: Government Agency
Industry: Public Administration
Location: United States
Customers Affected: 104000

Entity Type: individuals, taxpayers
Location: United States (IRS jurisdiction)

Entity Name: Internal Revenue Service (IRS)
Entity Type: government agency
Industry: tax administration
Location: United States

Communication Strategy: IRS warned the taxpayers to be alerted of any suspicious activities

Law Enforcement Notified: potential involvement of IRS Criminal Investigation (CI) unit, FBI for severe cases,
Containment Measures: IRS safeguards to detect fraudulent filingsidentity verification protocols
Remediation Measures: victim credit monitoringfraud alerts on credit reportsIRS Identity Protection PIN (IP PIN)
Recovery Measures: disputing fraudulent transactionsfiling identity theft affidavits (e.g., IRS Form 14039)
Communication Strategy: IRS public advisories on tax-related identity theftvictim notification protocols
Enhanced Monitoring: credit monitoring services for victimsIRS fraud detection systems

Type of Data Compromised: Personal information
Number of Records Exposed: 104000
Personally Identifiable Information: Social Security numberdate of birthaddresstax filing status

Type of Data Compromised: Social security numbers (ssn), Taxpayer identification numbers, Bank account details, Personal identifiable information (pii)
Sensitivity of Data: high
Data Exfiltration: likely, if data was stolen from third-party breaches
Personally Identifiable Information: full nameaddressdate of birthSSNfinancial records
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: victim credit monitoring, fraud alerts on credit reports, IRS Identity Protection PIN (IP PIN), .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by irs safeguards to detect fraudulent filings, identity verification protocols and .
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through disputing fraudulent transactions, filing identity theft affidavits (e.g., IRS Form 14039), .

Regulations Violated: potential violations of IRS data protection policies, state-level data breach notification laws if PII is exposed,
Legal Actions: potential lawsuits against entities responsible for data leaks,
Regulatory Notifications: IRS may require notifications for confirmed identity theft cases
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through potential lawsuits against entities responsible for data leaks, .

Lessons Learned: Tax-related identity theft highlights the need for proactive monitoring of PII beyond tax season., Multi-factor authentication (MFA) and IP PINs can mitigate fraudulent tax filings., Public awareness campaigns are critical to educate taxpayers on recognizing and reporting identity theft.

Recommendations: Enable IRS IP PIN for tax filings to prevent fraudulent returns., Monitor credit reports and bank statements regularly for unauthorized activity., Use identity theft protection services, especially after known data breaches., Report suspected tax fraud to the IRS immediately via Form 14039., Organizations handling PII should implement robust encryption and access controls to prevent data exfiltration.Enable IRS IP PIN for tax filings to prevent fraudulent returns., Monitor credit reports and bank statements regularly for unauthorized activity., Use identity theft protection services, especially after known data breaches., Report suspected tax fraud to the IRS immediately via Form 14039., Organizations handling PII should implement robust encryption and access controls to prevent data exfiltration.Enable IRS IP PIN for tax filings to prevent fraudulent returns., Monitor credit reports and bank statements regularly for unauthorized activity., Use identity theft protection services, especially after known data breaches., Report suspected tax fraud to the IRS immediately via Form 14039., Organizations handling PII should implement robust encryption and access controls to prevent data exfiltration.Enable IRS IP PIN for tax filings to prevent fraudulent returns., Monitor credit reports and bank statements regularly for unauthorized activity., Use identity theft protection services, especially after known data breaches., Report suspected tax fraud to the IRS immediately via Form 14039., Organizations handling PII should implement robust encryption and access controls to prevent data exfiltration.Enable IRS IP PIN for tax filings to prevent fraudulent returns., Monitor credit reports and bank statements regularly for unauthorized activity., Use identity theft protection services, especially after known data breaches., Report suspected tax fraud to the IRS immediately via Form 14039., Organizations handling PII should implement robust encryption and access controls to prevent data exfiltration.
Key Lessons Learned: The key lessons learned from past incidents are Tax-related identity theft highlights the need for proactive monitoring of PII beyond tax season.,Multi-factor authentication (MFA) and IP PINs can mitigate fraudulent tax filings.,Public awareness campaigns are critical to educate taxpayers on recognizing and reporting identity theft.

Source: Internal Revenue Service (IRS)
URL: https://www.irs.gov/identity-theft-fraud-scams/identity-theft

Source: Federal Trade Commission (FTC) - Identity Theft Resources
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Internal Revenue Service (IRS)Url: https://www.irs.gov/identity-theft-fraud-scams/identity-theft, and Source: Federal Trade Commission (FTC) - Identity Theft ResourcesUrl: https://www.identitytheft.gov/.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Irs Warned The Taxpayers To Be Alerted Of Any Suspicious Activities, Irs Public Advisories On Tax-Related Identity Theft and Victim Notification Protocols.

Stakeholder Advisories: Irs Publishes Annual Warnings About Tax-Related Identity Theft During Filing Season..
Customer Advisories: Taxpayers are advised to file taxes early to reduce the window for fraudulent filings.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Irs Publishes Annual Warnings About Tax-Related Identity Theft During Filing Season., Taxpayers Are Advised To File Taxes Early To Reduce The Window For Fraudulent Filings. and .

Entry Point: Phishing Attacks, Data Breaches At Third-Party Organizations, Malware Infections,
High Value Targets: Taxpayer Pii, Financial Account Credentials,
Data Sold on Dark Web: Taxpayer Pii, Financial Account Credentials,

Root Causes: Weak Protection Of Pii By Third-Party Entities (E.G., Employers, Financial Institutions)., Lack Of Public Awareness About Tax-Related Identity Theft Risks., Delayed Detection Of Fraudulent Activities Due To Manual Review Processes.,
Corrective Actions: Strengthen Irs Fraud Detection Algorithms To Flag Suspicious Filings., Mandate Ip Pin Usage For High-Risk Taxpayers., Improve Collaboration Between Financial Institutions And Tax Agencies To Share Threat Intelligence.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Credit Monitoring Services For Victims, Irs Fraud Detection Systems, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Strengthen Irs Fraud Detection Algorithms To Flag Suspicious Filings., Mandate Ip Pin Usage For High-Risk Taxpayers., Improve Collaboration Between Financial Institutions And Tax Agencies To Share Threat Intelligence., .
Last Attacking Group: The attacking group in the last incident was an cybercriminalsfraudstersidentity thieves.
Highest Financial Loss: The highest financial loss from an incident was ['potential unauthorized bank transfers', 'fraudulent tax refunds', 'unauthorized credit card charges'].
Most Significant Data Compromised: The most significant data compromised in an incident were Social Security number, date of birth, address, tax filing status, , personal identifiable information (PII), tax-related data, bank account details and .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was IRS safeguards to detect fraudulent filingsidentity verification protocols.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were address, date of birth, personal identifiable information (PII), bank account details, Social Security number, tax-related data and tax filing status.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 104.0.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was potential lawsuits against entities responsible for data leaks, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Public awareness campaigns are critical to educate taxpayers on recognizing and reporting identity theft.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Use identity theft protection services, especially after known data breaches., Organizations handling PII should implement robust encryption and access controls to prevent data exfiltration., Monitor credit reports and bank statements regularly for unauthorized activity., Report suspected tax fraud to the IRS immediately via Form 14039. and Enable IRS IP PIN for tax filings to prevent fraudulent returns..
Most Recent Source: The most recent source of information about an incident are Internal Revenue Service (IRS) and Federal Trade Commission (FTC) - Identity Theft Resources.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.irs.gov/identity-theft-fraud-scams/identity-theft, https://www.identitytheft.gov/ .
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was IRS publishes annual warnings about tax-related identity theft during filing season., .
Most Recent Customer Advisory: The most recent customer advisory issued was an Taxpayers are advised to file taxes early to reduce the window for fraudulent filings.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.