“Free Money” Phishing: Training Your Team to Spot the “Tariff Dividend” Scam
For security awareness professionals, few things are as challenging to combat as the “Free Money” hook. Currently, scammers are capitalizing on headlines regarding a proposed $2,000 “tariff dividend.” While the political discussion is ongoing, no such government program actually exists yet. This creates a perfect vacuum for social engineering: high public interest, vague official details, and an emotional “reward” trigger.
When employees see a text or email claiming they are “eligible” for a government payout, their critical thinking often takes a backseat to excitement. To protect your organization from the resulting identity theft and credential harvesting, your training should pivot toward these specific current-event defenses.
Guidance to Encourage Among Employees
When updating your awareness materials or “Security Tip of the Week,” prioritize these four actionable areas:
-
The “Wait for the Rollout” Rule: Instruct users that legitimate government programs—especially those involving mass payments—will be announced through official news cycles and official .gov websites long before they arrive via text message. If they haven’t seen it on the evening news or a major (.gov) portal, any “eligibility” notice is a scam.
-
Identify the “Pay to Play” Red Flag: A primary tactic in this scam is asking for a “processing fee” or “verification tax” to unlock the dividend. Remind your team: The government will never ask you to pay money to receive a stimulus or dividend.
-
The URL Gut Check: Scammers often use convincing but fake domains like
tariffchecks-gov.com. Teach your employees to look past the branding and inspect the top-level domain. If it doesn’t end in .gov, it isn’t the government. -
Verify, Don’t Reply: Encourage employees to use “out-of-band” verification. If they receive a suspicious message, they should go directly to IRS.gov or the Treasury Department website rather than clicking any link provided in the message.
-
MFA as the Ultimate Safety Net: As always, emphasize that Multi-Factor Authentication (MFA) is the final line of defense. If a user is tricked into entering their banking credentials on a fake “dividend portal,” MFA can prevent the attacker from actually accessing the account.
By using these “in the news” examples, you make security awareness feel relevant and immediate, helping your team stay sharp against the latest wave of financial fraud.
![]() | Read the full breakdown of the “Tariff Dividend” scam here:“$2,000 Tariff Dividend?” How Scammers are Cashing In |


No responses yet