Payroll & Tax Fraud
- Payroll fraud goes far beyond the BEC payroll redirect scam - it includes payroll processor account takeover, W2 data theft, ghost employees, 1099 manipulation, and tax withholding fraud
- A single W2 breach compromises every employee's Social Security number, address, and income - fueling fraudulent tax returns at scale
- Payroll processor ATO (someone takes over your Gusto/ADP/Paychex admin account) is the highest-impact attack because it gives access to banking, tax data, and employee PII simultaneously
- Prevention requires MFA on your payroll platform, separation of duties, dual approval for banking changes, and quarterly payroll audits - most SMBs have none of these
Before reading this page, understand:
- BEC & Phishing - Covers payroll redirect (impersonating an employee to change direct deposit); this page covers everything else
- Account Takeover - ATO concepts apply directly to payroll platform compromise
- Fraud types overview - Where payroll fraud fits in the taxonomy
On this page
Most SMBs think "payroll fraud" means someone impersonating an employee to redirect a direct deposit. That's real, and it's covered on the BEC & Phishing page. But the payroll fraud landscape is much broader - and the other attack types are often more damaging. When someone takes over your payroll platform admin account, they don't just redirect one paycheck. They get access to every employee's SSN, every bank account on file, and the ability to create entirely fictitious people on your payroll. This page covers the attacks that most SMBs aren't thinking about.
How This Differs from BEC Payroll Redirect
The BEC payroll redirect is one specific social engineering attack. It's the tip of the iceberg. Here's how the broader payroll fraud landscape compares:
| Attack | Vector | Target | Impact | Detection Difficulty |
|---|---|---|---|---|
| BEC payroll redirect | Email impersonation of employee | HR/payroll staff | Single paycheck redirected ($3K-$15K) | Low - employee reports missing pay |
| Payroll processor ATO | Credential theft/phishing of admin | Gusto/ADP/Paychex account | Full access to all employee data, banking, tax info | Medium - changes may look legitimate |
| W2 data theft | Platform breach or insider access | Employee tax records | Mass identity theft, fraudulent tax returns | High - often not detected until tax season |
| Ghost employee scheme | Insider creates fictitious workers | Payroll itself | Ongoing theft per pay period | High - requires payroll-to-HR reconciliation |
| 1099 manipulation | Insider or ATO | Contractor payments | Diverted payments, false deductions | High - contractors may not notice for months |
| Tax withholding fraud | ATO or insider | Withholding settings | Redirected tax payments, employee tax debt | Very high - surfaces at year-end filing |
Key distinction: BEC payroll redirect exploits your people through social engineering. The attacks on this page exploit your systems, processes, and platform access. They require different defenses.
Payroll Processor Account Takeover
This is the highest-impact payroll attack for SMBs. If someone compromises your admin account on Gusto, ADP, Paychex, or whatever payroll platform you use, they have the keys to everything.
How They Get In
- Credential phishing - Fake login page for your payroll platform (the most common method)
- Credential stuffing - Your admin reused a password from a breached site
- Session hijacking - Malware on the admin's device captures an active session
- Social engineering the platform - Calling Gusto/ADP support pretending to be you
What They Do Once In
Once an attacker has admin access to your payroll platform, they can:
- Change employee bank accounts - Redirect direct deposits for multiple employees simultaneously
- Add ghost employees - Create fictitious workers and route their pay to attacker-controlled accounts
- Export W2/tax data - Download SSNs, addresses, and income data for every employee (current and former)
- Modify tax withholdings - Change federal/state withholding to maximize take-home pay they're stealing
- Change company banking - Redirect the funding source or modify the company's own bank account on file
- Add themselves as admin - Create a backdoor account for persistent access
Why this is worse than BEC: A BEC payroll redirect gets one paycheck. Payroll processor ATO gets everything - and the attacker can maintain access for weeks before anyone notices.
Real-World Pattern
The typical attack plays out over 3-7 days:
- Day 1: Attacker gains admin access, immediately exports employee data (SSNs, addresses)
- Day 2-3: Makes small changes to test (one bank account update, one withholding change)
- Day 4-5: If undetected, adds ghost employees or changes multiple bank accounts before the next pay run
- Day 6-7: Pay run executes with fraudulent changes; attacker removes their access or creates a hidden admin account
W2 & Tax Data Theft
W2 theft has a distinct seasonal pattern. Attacks spike between January and April - tax filing season - because stolen W2 data is immediately monetizable through fraudulent tax returns.
Why W2 Data Is So Valuable
A single W2 contains everything needed for identity theft:
- Full legal name and SSN
- Home address
- Total income (needed to file a convincing fake return)
- Employer EIN (makes the fake return look legitimate to the IRS)
One breach = every employee compromised. If your payroll platform is breached or an insider exports W2 data, every current and former employee in the system is at risk.
How Stolen W2 Data Gets Used
- Fraudulent tax returns - Filed early in tax season before the real employee files; average fraudulent refund is $5,000-$8,000 per return
- Identity theft - SSN + income data enables credit applications, loan fraud, and synthetic identity creation
- Sold on dark web - Complete W2 records sell for $20-$50 each; a company with 50 employees represents $1,000-$2,500 in immediate resale value
Seasonal Defense Calendar
| Month | Action |
|---|---|
| November | Audit payroll platform access; remove former employees and unnecessary admins |
| December | Enable MFA on all payroll accounts; verify admin contact info |
| January | Lock down W2 generation; restrict who can view/download |
| February-April | Monitor for unusual data exports; watch for employee reports of rejected tax returns |
| Year-round | Quarterly access reviews; log monitoring |
Ghost Employee & 1099 Schemes
Ghost employee fraud is almost always an insider threat. Someone with payroll access creates fictitious employees or contractors and routes their pay to accounts they control.
Ghost Employee Red Flags
- Employee has no corresponding record in HR system (payroll-only entry)
- Same bank account used for multiple employees
- Employee address matches another employee or the payroll admin
- No benefits enrollment, no training records, no badge/access card
- Round-number salaries or wages that don't match pay grades
- Employee was "hired" by the same person who runs payroll
1099 Contractor Manipulation
Fictitious contractors are harder to detect than ghost employees because contractors don't go through the same onboarding:
- Fake contractors - Created to siphon payments; often use real-sounding business names
- Inflated invoices - Real contractor, but amounts are padded with kickbacks to the approver
- Duplicate payments - Same invoice submitted and paid twice, with the second payment going to a different account
Detection Approach
| Check | Frequency | What You're Looking For |
|---|---|---|
| Payroll-to-HR reconciliation | Monthly | Employees on payroll but not in HR system |
| Bank account duplication scan | Each pay run | Multiple employees sharing a bank account |
| Address matching | Quarterly | Employee addresses matching admin or each other |
| 1099 vendor verification | Quarterly | Contractors with no contract, no deliverables, no contact info |
| Payroll variance analysis | Each pay run | Unexplained increases in total payroll amount |
Tax Withholding Manipulation
This is the quietest payroll fraud - it can go undetected for an entire tax year.
How It Works
- Reducing withholdings - Attacker changes W4 elections to claim maximum exemptions, increasing take-home pay on diverted checks
- Redirecting tax payments - In platforms that allow manual tax payment configuration, attacker redirects employer tax deposits
- Manipulating employer contributions - Changing 401(k) match settings, HSA contributions, or other pre-tax deductions
Why It's Hard to Detect
Withholding changes look like normal employee self-service activity. An employee can legitimately update their W4 at any time. The fraud only becomes apparent when:
- Employees get unexpected tax bills at year-end
- Quarterly tax deposits don't match expected amounts
- Year-end W2 amounts don't reconcile with payroll records
Prevention Controls
Platform Security
| Control | Why It Matters |
|---|---|
| MFA on all payroll accounts | Blocks credential stuffing and most phishing attacks |
| Role-based access | Not everyone needs admin; most need view-only or self-service |
| IP allowlisting | Restrict admin access to office network or VPN |
| Session timeout | 15-minute idle timeout for payroll admin sessions |
| Audit logging | Every change logged with who, what, when, and from where |
Process Controls
| Control | Why It Matters |
|---|---|
| Separation of duties | Person who adds employees should not be the person who approves payroll |
| Dual approval for banking changes | Any bank account change requires a second approver |
| 48-hour lock before pay run | No changes allowed within 48 hours of payroll processing |
| Quarterly payroll audit | Reconcile payroll roster against HR records, verify all bank accounts |
| Annual W2 access review | Restrict who can generate, view, or download W2s |
Monitoring
| Signal | Response |
|---|---|
| New admin account created | Verify immediately with company owner |
| Bulk data export (W2s, employee list) | Confirm business purpose within 1 hour |
| Multiple bank account changes before pay run | Hold payroll; verify each change |
| New employee added without HR ticket | Freeze until HR confirms |
| Withholding changes for multiple employees simultaneously | Review each change individually |
If You're Compromised
If you discover unauthorized access to your payroll platform or suspect payroll fraud, follow these steps in order:
Immediate (First 2 Hours)
- Lock the payroll platform - Change admin passwords, revoke all active sessions, disable any suspicious admin accounts
- Hold the next pay run - Do not process payroll until you've verified all settings
- Preserve evidence - Screenshot or export audit logs before making changes; note the timeline of unauthorized access
Within 24 Hours
- Notify affected employees - Tell them their personal data (SSN, bank info) may be compromised; be direct about what was exposed
- Advise employees to file IRS Form 14039 (Identity Theft Affidavit) - This flags their SSN with the IRS so fraudulent returns get scrutinized
- File a police report - You'll need this for insurance claims and regulatory compliance
Within 72 Hours
- Notify your state Attorney General - Most states require breach notification within 30-72 days; check your state's specific requirements
- Contact the IRS - If W2 data was exposed, email dataloss@irs.gov with "W2 Data Loss" in the subject line
- Offer credit monitoring - Industry standard is 12-24 months of free credit monitoring for affected employees
- Audit every payroll change - Go back through 90 days of changes and verify each one against legitimate requests
Ongoing
- Rebuild platform security - New admin accounts, MFA enforced, IP restrictions, reduced access levels
- Document everything - Maintain a timeline for law enforcement, insurance, and potential litigation
- Consider a forensic investigation - If the breach involved platform-level compromise, your payroll provider should be involved
Next Steps
Securing your payroll platform?
- Enable MFA on every payroll admin account today - this blocks the majority of ATO attacks
- Set up dual approval for bank account changes - prevents single-point-of-failure fraud
- Schedule your first quarterly payroll-to-HR reconciliation - catches ghost employees
Worried about tax season exposure?
- Lock down W2 access before January - restrict generation and download to one named individual
- Review the BEC & Phishing page for email-based payroll redirect prevention
- Set up audit alerts for bulk data exports from your payroll platform
Already dealing with a breach?
- Follow the If You're Compromised playbook above - platform lockdown first
- Read the Survive a Fraud Attack playbook for broader incident response
- Check the Business Banking ATO page if banking credentials were also exposed
Related Pages
- BEC & Phishing - Covers payroll redirect via email impersonation
- Account Takeover - ATO concepts that apply to payroll platform compromise
- Business Banking ATO - When attackers target your bank accounts directly
- Fraud Types Overview - Full fraud taxonomy
- Who Owns What - Operational roles and separation of duties
- Survive a Fraud Attack - Emergency response playbook
- Identity Verification - MFA and verification controls