Is that really a federal agency contacting you?

 

Watch out: Several scams are going around that target Payroll pros and the forms you use every day.

 

And these scammers are more sophisticated than ever before, posing as federal officials and top execs in an attempt to steal confidential info.

 

New I-9 scheme

 

In the latest scam, employers are receiving emails from a sender claiming to U.S. Citizenship and Immigration Services (USCIS) requesting information typically reported on Form i-9.

 

Since employers aren’t required to submit Forms I-9 to USCIS, this request might raise eyebrows under normal circumstances However, the emails are designed to look authentic enough to fool recipients. Not only do they come from an uscis.gov address, they also contain labels from both USCIS and the Office of Inspector General.

 

The email messages may contain other details that make them look legitimate, like your company’s actual mailing address.

 

However, USCIS has made it clear it’s not sending any email correspondence to companies about Form I-9, and the agency warns recipients not to click on any links in the message or respond to the sender.

 

Additionally, companies that receive these emails should forward them to the Federal Trade Commission via ftccomplaintassistant.gov.

 

 

If you receive an email from USCIS and you aren’t sure if it’s authentic, you can double-check by forwarding it to uscis.webmaster@uscis.dhs.gov.

 

W-2 fraud rising

 

Along with I-9 email scams, Payroll pros must continue to watch for scams involving Form W-2, since the risks are even higher if this info is compromised.

 

According to the IRS, there was a significant increase in fraud-related incidents involving W-2s during the 2017 filing season. That means criminals will likely be out in full force as you’re getting W-2s ready for the Jan 31, 2018, deadline.

 

Be on the lookout for emails from execs asking for a list of workers and the W-2s. Confirm any requests for this info in person or by phone first.

 

More info: bit.ly/i9scam544, bit.ly/w2scam544