FBI Warns of Phishing Emails Impersonating City and County Officials: Inside the Permit Fee Scam

FBI warns of phishing emails impersonating city and county officials to demand fake permit fees. Learn red flags, key stats, and safer verification steps.

Train Teams to Spot Permit Fee Scams
  • March 11, 2026

What the FBI is Warning About and Who Gets Targeted

Recently, the Federal Bureau of Investigation warned about a phishing scheme tied to planning, zoning, and land-use permits in the United States. Criminals target individuals and businesses with active permit applications. 

Unlike generic spam, these emails arrive when an applicant expects updates. Therefore, the message feels relevant, and some recipients respond quickly. Attackers then push payment through wire transfer, peer-to-peer apps, or cryptocurrency using fake invoices. The FBI says it has identified victims nationwide. 

Why Public Permit Information Becomes a Perfect Phishing Ingredient

Permit workflows mix transparency with urgency. Applicants often see case numbers, addresses, hearing dates, and staff names in normal communications. Meanwhile, delays can stall work and raise costs. 

The FBI says attackers harvest publicly available permit data to “blend in.” As a result, a phishing email can cite the correct address or application number. Consequently, the message seems legitimate even when the sender is not. 

Process of Permit Fee Phishing Scam

Most often, criminals send an email to the victim, impersonating planning and zoning officials. The timing of this is usually around the same time as communication from the local office.

Some of the signs of this scam, as identified by the FBI, are:

  • Professional appearance and content, which is similar to legitimate government communication and includes actual processes and ordinances.
  • Use of sender email addresses similar to those used by government departments but with non-government domains and domains similar to those of government departments.
  • Use of PDF invoices with “fees” and details of these “fees,” and instructing victims to ask for payment details via email rather than phone.

Another tactic is to use urgency. For example, a contractor might receive an email with details of their correct address and case number. The next step is to send an email stating that failing to make payment will cause delays. The FBI also points out that the scam often comes from non-government domains that look legitimate at first glance, including “@usa.com.”

Another detail is the control of communication channels. The FBI identifies this as another tactic used by scammers. For example, there are instances where the invoice includes details of emailing them instead of contacting them via phone to ask for payment details. This means that scammers maintain control of communication via email and do not allow victims to call them via phone numbers found on public websites. This means that there is no “sanity check” as victims are only able to communicate via email.

Xcitium ThreatLabs
Threat Intelligence
Contextual Phishing in
Permit Workflows
Criminals leverage public land-use data to generate high-fidelity fraudulent invoices that match real application numbers and active permit timelines.
Critical Red Flags
Channel Control
Directing victims to email for “payment instructions” instead of phone verification.
Domain Impersonation
Communications from non-government domains like “@usa.com” using official logos.
$16.6B
Total Losses (IC3)
193,407
Phishing Incidents
+33%
Annual Growth

The Bigger Picture: Phishing and Impersonation Continue to Grow

This permit fee scam is part of an increased trend in cyber-enabled fraud. According to the FBI’s latest IC3 report, phishing and spoofing are still the most reported cybercrime in America, with 193,407 complaints in 2024.

Total cybercrime losses have also increased significantly. The FBI reported over 859,000 complaints and $16.6 billion in reported losses in 2024, marking a 33% increase from 2023 and a new record high in reported losses related to internet fraud.

Impersonation scams are still proving costly. The reported losses related to government impersonation scams amount to around $405.6 million, although it is believed many of these scams have also involved payment methods such as cryptocurrency, wire transfers, and peer-to-peer payment systems. These are often requested in fraud schemes, including permit fee phishing scams.

Practical Defenses for Applicants and Local Governments

Individuals and businesses should follow process discipline. If they are sent an unexpected permit fee notification, they should assume it is fraudulent.

Quick checklist:

  • Check the sender’s domain, not just the name.
  • Contact the office using the contact information on the official government website.
  • Make payments only through the official portal or your regular billing process.
  • Do not act on requests for wire transfers, peer-to-peer transfers, or cryptocurrencies.

If they have already clicked on something, replied to the message, or made payments, they should save the message and attachments, contact their bank, and file a complaint with the Internet Crime Complaint Center.

Individual local governments can also prevent these scams. CISA has recommended using SPF, DKIM, and DMARC for better email authentication. NIST has also included these as measures for detecting and reporting spoofing.

Another measure is operational clarity. CISA has recommended local governments to establish official channels for communications and reporting. If the official payment channel is clear, applicants will not fall for these scams.

Conclusion: When Public Records Become a Fraud Engine

This permit fee scam shows how attackers exploit a uniquely dangerous combination, public transparency and real-world urgency. By harvesting publicly available permit details, scammers can send high-fidelity emails that cite the correct address, case number, and timeline, then pressure victims into paying fake fees through irreversible methods like wire transfers, peer-to-peer apps, or cryptocurrency. 

Why This Threat Hits So Many Victims

This is contextual phishing, timed to moments when applicants expect updates and cannot afford delays.

  • Messages mimic legitimate government communication and ordinances
  • Sender domains look close to official addresses, but are not government domains
  • PDFs and invoices push victims to request payment details by email, not by phone
  • Urgency is used to prevent a simple verification call 

The FBI’s IC3 data reinforces the scale behind this pattern. In 2024, phishing and spoofing remained the most reported cybercrime category with 193,407 complaints, and total reported losses reached $16.6 billion

Where Xcitium Changes the Outcome

With Xcitium in place, this attack would NOT succeed.

  • Xcitium Cyber Awareness Education and Phishing Simulation conditions applicants and staff to verify the sender domain, distrust payment urgency, and validate fees through official portals and published phone numbers. 
  • If a click happens, faster reporting and stronger decision discipline reduce the chance that a message turns into a payment event.

The attacker loses at the decision point, because the payment workflow is verified through an independent channel.

Stop the Payment Before It Leaves the Bank

These scams succeed because victims act fast and pay outside normal processes. Slow the workflow down, verify through official sites, and train teams to treat unexpected fees as fraud by default.

Like what you see? Share with a friend.

Move Away From Detection With Patented Threat Prevention Built For Today's Challenges.

No one can stop zero-day malware from entering your network, but Xcitium can prevent if from causing any damage. Zero infection. Zero damage.

Book a Demo