Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
How a College Student Lost $10,000 to “The IRS”
Published:
June 3, 2021

How a College Student Lost $10,000 to “The IRS”

By:
Team Huntress
Share icon
Glitch effectGlitch effectGlitch effect

Back when I worked in the division of student affairs, I came across an unsettling report from our university’s police department. One of my students (let’s call them ‘Jamie’) became a victim of a long and convoluted scam where a hacker pretended to be from the IRS.

It involved phishing, vishing, Apple gift cards, Uber, a statehouse, a university police department, and… me. The total damage? Jamie was out $10,000 in the form of five, untraceable $2,000 gift cards.

How did Jamie fall victim to this phishing gift card scam?

It all began with an email Jamie received with the following subject: “IRS URGENT: IMMEDIATE ACTION REQUIRED”

Jamie read “the Internal Revenue Service” was threatening legal action and arrest against them unless they acted quickly to resolve the matter.

Now this is where many of us might say “Wait, the IRS cannot arrest me. This is a scam.” But Jamie was a first-year college student, whose parents had always filed taxes on their behalf. Let’s face it: parents handling their dependents’ taxes is rather common for college students.

The body of the email instructed Jamie to click on a hyperlink and begin filling out a webform. The email went on to read that once the form was completed, they should expect a phone call from an IRS agent to close the case.

Jamie received the phone call shortly after submitting the form, and it was “an IRS agent” on the other line. Cough, cough, scammer.

The scammer said they needed to collect more information–which amounted to Jamie revealing their current location and current address–and that Jamie had an outstanding debt owed to the IRS. The scammer explained Jamie could pay $20,000 via money order, or they can pay $10,000 in the form of Apple gift cards as ‘the IRS has an agreement in place with Apple’ where they cover overdue taxes in exchange for credit because it is a U.S. company.

…more lies…more lies…

Also, the scammer instructed Jamie to stay on the phone the entire time and said:

1. Take an Uber to the nearby Apple store [10 minutes from campus]

2. Purchase five, $2,000 Apple gift cards

3. Take an Uber to the statehouse downtown [40 minutes away]
Jamie followed the scammer’s instructions, purchased $10,000 in gift cards from the Apple store, and while in the Uber on the way to the statehouse, the scammer told Jamie to put the phone on speaker, begin reciting the gift card numbers, and scratching off the pin on the back of each card.

irs-gift-card-phishing-email-scam

Now remember, the Uber driver did not hear any of this conversation until Jamie turned the phone on speaker.

The Uber driver felt as though something bizarre was happening, then asked Jamie a few questions about why they were headed to the statehouse, probed with a few more questions, then told Jamie he thought they were being scammed. When the scammer heard this [the phone was still on speaker] the scammer ended the call.

The Uber driver kindly canceled the fare and returned to campus, and Jamie contacted the university police department. The responding officer contacted Apple to see if they could freeze the gift cards, to which Apple said the funds had already been spent.

That was it.

How was this bizarre and vile phishing scam so successful?

It wasn’t until I later sat down with Jamie that I learned the full context of this scam [read on to see our conversation]. But when I read the police report, I thought to myself: “How could a college student be so susceptible to such an elaborate scam?”

I had heard of scams where people end up going to a landing page and typing in personal and bank account information, but never anything like this one.

This scammer was successful because they created an environment of urgency, and made the first action in the scam so incredibly easy. They designed a low floor to engage Jamie, and placed Jamie in the driver’s seat as well.

Step 1: Get Jamie to click on a link. Pretty easy.

Step 2: Get Jamie to enter in some personal information. Also easy.

Once the scammer got Jamie on the phone, Jamie was hooked then tricked into seeing the issue through.

The aftermath & response

Once university police forwarded the case to student affairs, it became a closed case; there was nothing the police department could do. When I followed up with the reporting officer, he shared the extreme likelihood the assailant was in a region outside of the United States. When I asked why he seemed so convinced, his reply shocked me. The officer explained that the university police department sees a number of these scams where students are specifically targeted, and their hands are tied when they investigate and learn the IP address pings outside of the country.

So what could I do to help Jamie? Frankly, there wasn’t much I could do. They lost the $10,000, there was no way to getting that back. I asked Jamie what was on their mind and we unpacked how this happened. This is what Jamie shared:

“Well, I am kind of embarrassed, because I hear about those ‘Nigerian Prince’ scams all the time and laugh, thinking to myself how gullible someone must be to fall for something like that. But when I really think about my situation, I felt like it was a really important emergency. And felt like I needed to address it. And the first step was something easy, I just had to click the link and type in some of my information on a website. And after that, everything just felt required because I already began the process of ‘resolving’ the situation.”

It felt unreal to hear the full story, the full sequence of events in hindsight; from the web form to a phone call, to the Apple Store, to reciting the numbers and scratching of pins codes on the back of the gift cards–just unreal.

So what can you do to prevent a gift card scam from happening?

We all know those helicopter parents still see their college students as kids. Professionals in higher education acknowledge students as young adults, and it takes a village to help students develop competence and independence. Anyone can be a target of a cyber attack, even CEOs in the cybersecurity industry.

Young adults are a prime target for IRS phishing scams. It is rather unlikely that college students of today file their own taxes, usually due to parents typically filing on their behalf [lucky them]. So what happens when a scary email from an unwieldy and ubiquitous organization tells them they must take immediate action? Well, if you’ve made it this far, you know the result.

So where does this story leave us? Are we to let these students fail forward by falling victim to phishing scams? Or can we proactively educate them to defend themselves against hackers?

Even individuals who laugh at the absurdity of Nigerian princes can fall victim to scams when it feels so real, it’s the reason why so many people are impacted by phishing scams.

Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • How My StubHub Account Got Hacked

    If you have a StubHub account, you are open to a major vulnerability of having your StubHub hacked. Learn more about how you are at risk & how Huntress' Security Awareness Training can help.
  • What Is Business Email Compromise? BEC Defined

    A business email compromise (BEC) attack is a type of scam where bad actors impersonate a trusted source to obtain information from their targeted individual.
  • Exploring Package Tracking Smishing Scams

    Smishing (or SMS phishing) is far more frequent during the holidays. Learn to recognize the signs of a smish and how to avoid falling victim to one.
  • Protect Yourself from Political Donation Scams

    Don’t let fraud disrupt your civic duty. Learn how to spot and avoid political donation scams that target voters through robocalls, fake websites, and deepfakes.
  • One Order of Tips, Tricks & Hot Takes for Cybersecurity Awareness Month 2024

    Our hottest security tips, tricks, and opinions to kick this Cybersecurity Awareness Month off right.
  • Sector Spotlight: Threats Plaguing Education

    Threat actors are targeting the education sector with data breaches, phishing emails, ransomware hits, brute force RDP attacks, and more.
  • The State of the Dark Web

    Grab some popcorn and hold onto your seats: we’re headed back to the dark web.
  • A Parent's Guide to Securing Children's Tech Gifts

    Safeguard holiday tech gifts for kids this season—secure their devices, protect privacy, and build lifelong safety habits. Feat. resources from our exclusive Fireside Chat.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy