2 min read
Scammers impersonating city officials to target applicants, FBI warns
Farah Amod
March 24, 2026
Hackers are exploiting public permit records to trick applicants into sending fraudulent payments.
What happened
The Federal Bureau of Investigation issued a public warning about phishing campaigns in which criminals impersonate US city and county officials to target individuals and businesses applying for planning or zoning permits. According to Security Affairs, attackers use publicly available permit information to craft convincing emails referencing real details such as property addresses, case numbers, and the names of legitimate officials. Victims receive messages requesting payment for supposed permit fees and are instructed to send funds through wire transfers, peer-to-peer payment applications, or cryptocurrency. The campaign has affected permit applicants nationwide and relies on legitimate-looking communications to persuade recipients that the requests originate from local government offices.
Going deeper
The phishing scheme relies heavily on open source information and timing. Public permit databases often contain detailed application information that attackers can use to tailor their messages and increase credibility. Emails commonly include attached PDF invoices listing itemized charges and professional formatting that resembles government correspondence. Victims are often instructed to request payment instructions by email rather than contacting the relevant office directly, which discourages verification. Attackers also create urgency by warning that failure to pay quickly could delay the permit process or cause administrative problems. Although the emails reference real permit details, the sender addresses usually come from non-government domains that closely resemble official ones.
What was said
In the alert, the agency said, “The FBI is warning the public about an emerging phishing scheme by criminals impersonating city and county officials to solicit fraudulent payments for city and county planning and zoning permits.” The agency said the emails often contain accurate information such as property addresses, case numbers, and the real names of officials, while using professional formatting and language similar to genuine government communications. Attackers also send messages from email addresses that resemble local government departments however originate from non-government domains such as “@usa.com.” Messages may arrive during active permit discussions with local authorities and often include attached PDF invoices with itemized fees that instruct applicants to request payment instructions by email rather than phone. The FBI noted that the emails also stress urgency, warning that the permitting process could be delayed if payment is not made immediately.
The big picture
Business email compromise and impersonation scams generate major financial losses across sectors that rely on administrative processes such as licensing, procurement, and permitting. According to the FBI’s Internet Crime Complaint Center, the agency received 21,442 business email compromise complaints in 2024, resulting in about $2.77 billion in losses. The report states that these schemes typically involve criminals “compromising legitimate business email accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.” Attackers often combine publicly available information with social engineering to create convincing payment requests tied to legitimate transactions or regulatory processes, which makes sectors that rely on permits, invoices, and administrative approvals particularly vulnerable.
FAQs
Why are zoning and planning permit applicants being targeted?
Permit applications often contain publicly accessible information such as property details, application numbers, and official contacts. Attackers use this information to craft convincing phishing emails that appear tied to legitimate permit processes.
What signs indicate the message may be fraudulent?
Common warning signs include sender addresses from non-government domains, requests for payment through unusual methods, and instructions discouraging verification by phone.
Why do scammers include real permit information in their emails?
Using authentic application details increases credibility and makes victims more likely to believe the message came from a legitimate government office.
What payment methods are typically requested in these scams?
Victims are often asked to pay through wire transfers, peer-to-peer payment applications, or cryptocurrency, which are difficult to reverse once the funds are sent.
What should victims do if they receive or respond to one of these emails?
Individuals should verify any fee requests directly with the relevant city or county office using contact information from official websites and report suspected fraud to the FBI’s Internet Crime Complaint Center at ic3.gov.
Subscribe to Paubox Weekly
Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.
