Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries

Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries

Posted on October 10, 2025October 10, 2025 By CWS

Oct 10, 2025Ravie LakshmananSaaS Safety / Risk Intelligence
A menace actor referred to as Storm-2657 has been noticed hijacking worker accounts with the top aim of diverting wage funds to attacker-controlled accounts.
“Storm-2657 is actively concentrating on a spread of U.S.-based organizations, significantly workers in sectors like increased training, to achieve entry to third-party human assets (HR) software program as a service (SaaS) platforms like Workday,” the Microsoft Risk Intelligence workforce stated in a report.
Nevertheless, the tech big cautioned that any software-as-a-service (SaaS) platform storing HR or cost and checking account data could possibly be a goal of such financially motivated campaigns. Some features of the marketing campaign, codenamed Payroll Pirates, had been beforehand highlighted by Silent Push, Malwarebytes, and Hunt.io.

What makes the assaults notable is that they do not exploit any safety flaw within the companies themselves. Fairly, they leverage social engineering techniques and an absence of multi-factor authentication (MFA) protections to grab management of worker accounts and in the end modify cost data to route them to accounts managed by the menace actors.
In a single marketing campaign noticed by Microsoft within the first half of 2025, the attacker is alleged to have obtained preliminary entry via phishing emails which are designed to reap their credentials and MFA codes utilizing an adversary-in-the-middle (AitM) phishing hyperlink, thereby having access to their Alternate On-line accounts and taking on Workday profiles via single sign-on (SSO).

The menace actors have additionally been noticed creating inbox guidelines to delete incoming warning notification emails from Workday in order to cover the unauthorized adjustments made to profiles. This consists of altering the wage cost configuration to redirect future wage funds to accounts underneath their management.
To make sure persistent entry to the accounts, the attackers enroll their very own telephone numbers as MFA units for sufferer accounts. What’s extra, the compromised e-mail accounts are used to distribute additional phishing emails, each inside the group and to different universities.

Microsoft stated it noticed 11 efficiently compromised accounts at three universities since March 2025 that had been used to ship phishing emails to just about 6,000 e-mail accounts throughout 25 universities. The e-mail messages function lures associated to diseases or misconduct notices on campus, inducing a false sense of urgency and tricking recipients into clicking on the faux hyperlinks.
To mitigate the danger posed by Storm-2657, it is beneficial to undertake passwordless, phishing-resistant MFA strategies corresponding to FIDO2 safety keys, and evaluation accounts for indicators of suspicious exercise, corresponding to unknown MFA units and malicious inbox guidelines.

The Hacker News Tags:Accounts, Employee, Hijacking, Microsoft, Payroll, Pirates, SaaS, Salaries, Steal, Warns

Post navigation

Previous Post: RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers
Next Post: 175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Related Posts

CISA Highlights Four Actively Exploited Security Vulnerabilities CISA Highlights Four Actively Exploited Security Vulnerabilities The Hacker News
Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads The Hacker News
Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval The Hacker News
Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor The Hacker News
Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages The Hacker News
Google Patches 120 Flaws, Including Two Zero-Days Under Attack Google Patches 120 Flaws, Including Two Zero-Days Under Attack The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark