/dqc/media/media_files/2026/02/19/seqrite-reveals-key-insights-into-the-rising-instances-of-income-tax-2026-02-19-12-34-11.jpg)
Seqrite Income Tax phishing campaign in India exposed
Seqrite, the enterprise security arm of Quick Heal Technologies Limited, has uncovered an Income Tax-themed phishing campaign targeting Indian businesses during the tax season. The Seqrite Income Tax phishing campaign in India uses fraudulent compliance notices to deliver remote access trojans and gain control over corporate systems.
The threat was identified by researchers at Seqrite Labs, which the company describes as India’s largest malware analysis facility. According to the findings, attackers are exploiting the urgency associated with tax deadlines to deceive employees and infiltrate enterprise environments.
How the campaign operates
The phishing attack begins with a spear-phishing email that appears to originate from the Income Tax Department. The message includes the Government of India emblem, official-looking letterheads and fabricated compliance deadlines.
However, the sender’s address originates from a public Outlook account, indicating it is not an official government communication. The email contains no written text, only an image designed to resemble an authentic tax notice. This tactic is intended to bypass email filters that scan for suspicious keywords.
Attached to the email is a PDF file titled “Review Annexure.pdf,” which claims the recipient has failed to comply with a tax review dated October 3, 2025. The document creates a sense of urgency, pressuring the recipient to take immediate action.
Opening the PDF redirects the victim to a fraudulent compliance portal. The site automatically triggers a forced download of a ZIP file named “Review Annexure.zip.” The portal also advises users to disable antivirus software, a common red flag in malicious campaigns.
Malware deployment and execution
Inside the ZIP archive is a 150MB executable file carrying a digitally signed certificate from “Hengshui Shenwei Technology Co., Ltd.” This certificate is used to create an appearance of legitimacy.
Once executed, the file runs a two-stage NSIS installer. The first stage deletes itself after unpacking the payload, leaving minimal traces. The second stage installs a remote access trojan along with a Windows Real-time Protection Service component.
After installation, the malware collects sensitive system data, including:
Operating system details
Installed applications
Running services
Hardware information
User activity logs
The stolen data is stored in an encrypted folder and transmitted to command-and-control servers located in China. The attackers use non-standard ports to reduce detection risks.
With remote access established, threat actors can exfiltrate files, monitor user activity, deploy additional malware or launch attacks deeper into the organisation’s network.
Broader threat landscape
The Seqrite Income Tax phishing campaign in India reflects patterns identified in the company’s India Cyber Threat Report 2026. Based on telemetry from more than 8 million endpoints, the report indicates that Trojans account for 43 percent of threats, followed by file infectors at 35 percent and potentially unwanted applications at 6 percent.
Researchers at Seqrite Labs state that such campaigns combine psychological manipulation with technical stealth. A single malicious click can expose an entire corporate network to espionage, data theft or operational disruption.
The report also highlights gaps in data privacy governance, including inadequate controls around data classification and leakage prevention. As enterprises shift toward cloud and hybrid environments, identity misuse and unauthorised data access are emerging as critical risk areas.
Recommended safeguards
Seqrite advises organisations to verify any compliance-related request directly with the Income Tax Department using official contact details from the incometaxindia.gov.in website. Users should avoid clicking on links or downloading attachments from unexpected emails and instead manually enter official URLs into browsers.
Additional recommendations include:
Enabling multi-factor authentication for critical accounts
Implementing strict email gateway controls
Scanning for embedded images and obfuscated code
Monitoring identity access and data usage continuously
The Seqrite Income Tax phishing campaign in India underscores how seasonal events can be exploited for targeted cyberattacks. As attackers refine both social engineering tactics and technical execution, enterprises must treat unsolicited compliance communications with caution and strengthen layered security controls across endpoints, identities and data access points.
Read More:
From AI action to AI impact: Enterprise India faces its moment of truth
AI Impact Summit 2026 in New Delhi: Getting there, the glitches, and the apology that followed
/dqc/media/agency_attachments/3bO5lX4bneNNijz3HbB7.jpg)
Follow Us