Physical Address

Lesya Kurbasa 7B
03194 Kyiv, Kyivska obl, Ukraine

WeTransfer Tax Invoice Phishing Scam: Technical Analysis and Prevention Guide

A new phishing campaign impersonating WeTransfer file-sharing service is actively targeting users with fake “Tax Invoice and Contract Document” notifications. This sophisticated scam attempts to lure victims into clicking malicious links by exploiting trust in the legitimate WeTransfer brand and creating urgency through expiration dates. This technical analysis examines the attack vectors, identifies key warning signs, and provides guidance on protecting yourself from this and similar phishing attempts.

Key Facts

  • Threat Type: Phishing email, credential theft, potential malware delivery
  • Impersonated Service: WeTransfer file sharing platform
  • Subject Line: “WeTransfer Shared Tax Invoice (Documents)”
  • Sender Address: “WeTransfer <cadmasters1@fastermeet.net>” (fraudulent)
  • Message Content: Claims to deliver tax invoice and contract documents
  • Link Destination: IPFS gateway with malicious content
  • Target Information: Account credentials, personal information, potential malware infection
  • Distribution Period: Active as of April 2025
  • Geographic Targeting: Global, English-speaking users

Technical Analysis of the Phishing Email

The phishing email follows a typical template designed to create urgency while appearing legitimate. A detailed examination reveals several technical aspects that can help users identify this scam:

From: WeTransfer <cadmasters1@fastermeet.net> Subject: WeTransfer Shared Tax Invoice (Documents) Dear <name> You have just received TAX INVOICE AND CONTRACT DOCUMENT files via Wetransfer 2 files, 35 MB in total. Files will be deleted on 12/04/2025 5:29 pm Get your files https://ipfs[.]io/ipfs/bafkreiaad4jsv6672xleafusvnjytczbzjeica3lihq37b74zj347eksgu#<email>.com Non-WeTransfer domain Malicious button IPFS gateway URL (not WeTransfer)

Source: Analysis of WeTransfer Tax Invoice phishing email structure and suspicious elements

Email Header Analysis

The first red flag appears in the email header information:

Content Analysis

The email body contains several elements designed to appear legitimate while incorporating subtle signs of fraud:

  • Personalization: Uses a generic “<name>” placeholder or the recipient’s name harvested from the email address
  • Financial Context: References “TAX INVOICE AND CONTRACT DOCUMENT” to create urgency and importance
  • Size and Expiration: Specific details (“2 files, 35 MB in total. Files will be deleted on 12/04/2025 5:29 pm”) to create a sense of legitimacy and urgency
  • Call to Action: A prominent “Get your files” button that leads to the malicious link

URL Analysis

The most dangerous element is the malicious URL embedded in the email:

https://ipfs[.]io/ipfs/bafkreiaad4jsv6672xleafusvnjytczbzjeica3lihq37b74zj347eksgu#<email>.com

This URL reveals several significant security concerns:

  1. IPFS Gateway: The link uses the InterPlanetary File System (IPFS) gateway at ipfs.io, not WeTransfer’s domain. IPFS is a legitimate distributed file system, but in this case, it’s being abused to host malicious content.
  2. Content Hash: The long string (“bafkreiaad4jsv…”) is an IPFS content identifier that points to the malicious content.
  3. Email Tracking: The URL ends with “#<email>.com” which is likely a placeholder that would contain the victim’s actual email address, allowing attackers to track which recipients clicked the link.
  4. Destination: Clicking this link likely leads to a phishing page designed to steal credentials, potentially impersonating WeTransfer, a document viewer, or a login portal.

Attack Chain Analysis

This WeTransfer phishing campaign follows a sophisticated attack chain:

WeTransfer Phishing Attack Chain Delivery Phishing email impersonating WeTransfer Engagement User clicks on malicious “Get your files” link Redirection IPFS gateway loads malicious content Deception Fake login page or document viewer appears Compromise Credentials stolen and/or malware installed

Source: Security analysis of WeTransfer phishing attack methodology and progression

The attack likely has these potential outcomes:

  • Credential Theft: The phishing page may prompt users to enter WeTransfer, email, or Microsoft/Google credentials to “view the documents”
  • Malware Delivery: The page might attempt to download malware disguised as the promised documents
  • Personal Information Harvesting: The page could request additional personal details under the pretext of verifying identity
  • Secondary Phishing: After initial credential theft, attackers may attempt to compromise additional accounts

How to Identify Legitimate WeTransfer Emails

Authentic WeTransfer emails have several consistent characteristics that differentiate them from phishing attempts:

Element Legitimate WeTransfer Email This Phishing Email
Sender Domain Comes from wetransfer.com, we.tl, or transfer.wetransfer.com domains Comes from fastermeet.net (unrelated to WeTransfer)
Email Design Consistent, professional design with WeTransfer’s current branding May contain design inconsistencies or outdated branding
Link Destinations All links point to wetransfer.com or we.tl domains Links point to IPFS gateway (ipfs.io) or other non-WeTransfer domains
Sender Information Clearly states the name of the person who sent you files Generic reference to “TAX INVOICE AND CONTRACT DOCUMENT” without a sender name
Personalization Includes personalized message from the sender when available Generic, impersonal message focused on creating urgency
Security Protocols Passes SPF, DKIM, and DMARC email authentication Typically fails email authentication checks

Protection Measures

To protect yourself from this and similar phishing attempts, follow these security best practices:

Email Security Practices

  • Verify Sender Address: Always check the full email address of the sender, not just the display name
  • Inspect Links: Hover over links (without clicking) to see the actual destination URL
  • Be Skeptical of Urgency: Phishing often creates false urgency with expiration dates and financial implications
  • Check for Personalization: Legitimate service emails typically include personal details beyond just your email address
  • Verify Independently: Log in to WeTransfer directly through your browser, not through email links

Technical Protections

  • Email Filtering: Configure robust spam and phishing filters on your email service
  • Security Software: Use comprehensive anti-malware protection to identify and block phishing attempts
  • Multi-Factor Authentication: Enable MFA on all important accounts to prevent unauthorized access even if credentials are compromised
  • Email Authentication: For organizations, implement SPF, DKIM, and DMARC to reduce email spoofing

Recommended Security Tools

For comprehensive protection against phishing and other cyber threats, consider using specialized security software:

Trojan Killer interface showing phishing protection capabilities
Download Trojan Killer

Download the official version from GridinSoft’s website to ensure you get the authentic software

What to Do If You’ve Clicked the Link

If you’ve already interacted with this phishing email, take these immediate steps:

  1. Disconnect: If possible, disconnect the affected device from the internet to prevent further data exfiltration
  2. Change Passwords: Immediately change passwords for any accounts you may have entered credentials for, starting with the most sensitive accounts
  3. Enable MFA: Add multi-factor authentication to all accounts that support it
  4. Scan Your System: Run a full system scan with reliable anti-malware software to detect and remove any downloaded threats
  5. Monitor Accounts: Watch for suspicious activity in your financial accounts, email, and other sensitive services
  6. Report: Report the phishing attempt to your IT department, email provider, and the legitimate WeTransfer service

Similar Phishing Campaigns

This WeTransfer tax document phishing campaign is part of a broader trend of file-sharing impersonation scams. Similar phishing techniques have been observed in campaigns impersonating other popular services:

Frequently Asked Questions

How can I tell if a WeTransfer email is legitimate?

Legitimate WeTransfer emails always come from domains like wetransfer.com or we.tl. They include the name of the person sending you files, feature consistent branding, and don’t create false urgency. All links in authentic WeTransfer emails lead to wetransfer.com or we.tl domains. When in doubt, don’t click links in the email—instead, go directly to wetransfer.com and log in to check if you have any transfers waiting.

What makes this WeTransfer phishing scam technically sophisticated?

This scam demonstrates several advanced techniques: it uses IPFS (InterPlanetary File System) to host malicious content, making it harder to take down than traditional web hosting; it employs email tracking mechanisms to validate active email addresses; it creates convincing visual elements that mimic legitimate WeTransfer emails; and it exploits timely tax-related concerns to create urgency. The use of IPFS is particularly noteworthy as it leverages a decentralized file system to host phishing content, making it more resilient against traditional takedown methods.

Can email filters detect this type of phishing scam?

Modern email security solutions can detect many phishing attempts like this one based on several indicators: sender domain reputation (fastermeet.net is not associated with WeTransfer), URL analysis (detecting the suspicious IPFS link), email authentication failures (the email likely fails SPF/DKIM/DMARC checks), and content analysis (recognizing patterns common in phishing). However, phishing techniques continually evolve, and no filter is 100% effective. This is why user awareness remains a critical defense layer against increasingly sophisticated phishing attacks.

What information could attackers gain if I click the link?

If you click the link and interact with the resulting phishing page, attackers could potentially steal your WeTransfer credentials, email account login information, or other credentials requested by the fake login page. Additionally, the page might attempt to download malware to your device, which could lead to further compromise including keyloggers, ransomware, or remote access trojans. The link itself confirms your email address is active (through the tracking parameter), which makes you a target for future phishing attempts. Even without entering any information, visiting the link can reveal your IP address, browser type, and operating system to the attackers.

Conclusion

The WeTransfer Tax Invoice phishing campaign represents a sophisticated social engineering attack that exploits trust in a popular file-sharing service. By understanding the technical indicators and implementing proper security measures, users can protect themselves from this and similar phishing attempts.

Remember that legitimate services like WeTransfer will never send emails from unrelated domains or direct you to suspicious websites. When in doubt, always access services directly through their official websites rather than clicking email links. Maintaining a healthy skepticism toward unexpected emails—especially those concerning financial documents or creating artificial urgency—is your best defense against increasingly sophisticated phishing attacks.

For comprehensive protection against phishing and other cyber threats, consider using reliable security software like Trojan Killer that can detect and block malicious websites and alert you to potential phishing attempts before they compromise your security.

Gridinsoft Team
Gridinsoft Team

Founded in 2003, GridinSoft LLC is a Kyiv, Ukraine-based cybersecurity company committed to safeguarding users from the ever-growing threats in the digital landscape. With over two decades of experience, we have earned a reputation as a trusted provider of innovative security solutions, protecting millions of users worldwide.

Articles: 139

Leave a Reply

Your email address will not be published. Required fields are marked *