Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Attackers Redirected Employee Paychecks Without Breaching a Single System

Attackers Redirected Employee Paychecks Without Breaching a Single System

Posted on January 19, 2026January 19, 2026 By CWS

A seemingly easy cellphone name turned the gateway to a complicated assault that diverted worker paychecks with none malware or community breach.

A corporation found this fraud when staff reported lacking wage deposits. The attacker had modified direct-deposit data to funnel funds into accounts beneath their management.

This incident reveals a troubling pattern the place menace actors are abandoning complicated technical strategies and turning as a substitute to social engineering that targets human vulnerability.

The assault started with social engineering techniques, a technique more and more favored by menace actors. In keeping with Palo Alto Networks’ 2025 Unit 42 World Incident Response Report, 36 p.c of incidents examined began with social engineering campaigns.

The attacker impersonated staff and contacted a number of assist desk groups throughout payroll, IT, and HR departments.

By gathering publicly out there data from social media platforms, the attacker collected sufficient private particulars to reply verification questions.

They then satisfied assist desk workers to reset passwords and re-enroll multi-factor authentication gadgets.

The attacker even known as again repeatedly to establish which verification questions have been being requested, enhancing their probabilities of success on subsequent makes an attempt.

Palo Alto Networks analysts recognized the assault’s persistence mechanism as notably regarding. The menace actor registered an exterior electronic mail handle as an authentication technique inside the group’s Azure Lively Listing atmosphere.

This step demonstrated clear intent to keep up entry past the fast payroll theft. The attacker systematically compromised a number of worker accounts to entry delicate payroll knowledge.

As soon as authenticated, the attacker modified direct-deposit data for a number of staff, redirecting their wage funds to attacker-controlled financial institution accounts.

The fraudulent exercise went undetected for weeks as a result of the professional credentials and legitimate multi-factor authentication made the transactions seem regular.

The Assist Desk Vulnerability: A Essential Safety Hole

Assist desk operations signify some of the neglected safety weak factors in fashionable organizations.

Password resets and MFA re-enrollment procedures, when not correctly secured, grow to be high-impact vulnerabilities.

This incident demonstrates how human-driven workflows can bypass all technical safeguards.

Attackers perceive that social engineering requires no malware improvement, exploit discovery, or community intrusion abilities.

They merely want persuasive communication and publicly out there data.

The investigation ultimately contained the influence to a few worker accounts, however it revealed deeper systemic points all through the group’s safety infrastructure.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Breaching, Employee, Paychecks, Redirected, Single, System

Post navigation

Previous Post: Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
Next Post: Attackers are Using WSL2 as a Stealthy Hideout Inside Windows Systems

Related Posts

Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure Chinese APT Hackers Using Proxy and VPN Service to Anonymize Infrastructure Cyber Security News
New ClickFix Campaign Hijacks Facebook Sessions Using Fake Verification Pages New ClickFix Campaign Hijacks Facebook Sessions Using Fake Verification Pages Cyber Security News
17K+ SharePoint Servers Exposed to Internet 17K+ SharePoint Servers Exposed to Internet Cyber Security News
Rising Cyber Threats Challenge Defense Sector Security Rising Cyber Threats Challenge Defense Sector Security Cyber Security News
Ferocious Kitten APT Deploying MarkiRAT to Capture Keystroke and Clipboard Logging Ferocious Kitten APT Deploying MarkiRAT to Capture Keystroke and Clipboard Logging Cyber Security News
Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News