Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries

Posted on October 10, 2025October 10, 2025 By CWS

Oct 10, 2025Ravie LakshmananSaaS Safety / Risk Intelligence
A menace actor referred to as Storm-2657 has been noticed hijacking worker accounts with the top aim of diverting wage funds to attacker-controlled accounts.
“Storm-2657 is actively concentrating on a spread of U.S.-based organizations, significantly workers in sectors like increased training, to achieve entry to third-party human assets (HR) software program as a service (SaaS) platforms like Workday,” the Microsoft Risk Intelligence workforce stated in a report.
Nevertheless, the tech big cautioned that any software-as-a-service (SaaS) platform storing HR or cost and checking account data could possibly be a goal of such financially motivated campaigns. Some features of the marketing campaign, codenamed Payroll Pirates, had been beforehand highlighted by Silent Push, Malwarebytes, and Hunt.io.

What makes the assaults notable is that they do not exploit any safety flaw within the companies themselves. Fairly, they leverage social engineering techniques and an absence of multi-factor authentication (MFA) protections to grab management of worker accounts and in the end modify cost data to route them to accounts managed by the menace actors.
In a single marketing campaign noticed by Microsoft within the first half of 2025, the attacker is alleged to have obtained preliminary entry via phishing emails which are designed to reap their credentials and MFA codes utilizing an adversary-in-the-middle (AitM) phishing hyperlink, thereby having access to their Alternate On-line accounts and taking on Workday profiles via single sign-on (SSO).

The menace actors have additionally been noticed creating inbox guidelines to delete incoming warning notification emails from Workday in order to cover the unauthorized adjustments made to profiles. This consists of altering the wage cost configuration to redirect future wage funds to accounts underneath their management.
To make sure persistent entry to the accounts, the attackers enroll their very own telephone numbers as MFA units for sufferer accounts. What’s extra, the compromised e-mail accounts are used to distribute additional phishing emails, each inside the group and to different universities.

Microsoft stated it noticed 11 efficiently compromised accounts at three universities since March 2025 that had been used to ship phishing emails to just about 6,000 e-mail accounts throughout 25 universities. The e-mail messages function lures associated to diseases or misconduct notices on campus, inducing a false sense of urgency and tricking recipients into clicking on the faux hyperlinks.
To mitigate the danger posed by Storm-2657, it is beneficial to undertake passwordless, phishing-resistant MFA strategies corresponding to FIDO2 safety keys, and evaluation accounts for indicators of suspicious exercise, corresponding to unknown MFA units and malicious inbox guidelines.

The Hacker News Tags:Accounts, Employee, Hijacking, Microsoft, Payroll, Pirates, SaaS, Salaries, Steal, Warns

Post navigation

Previous Post: RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers
Next Post: 175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Related Posts

CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability The Hacker News
GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module The Hacker News
Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild The Hacker News
Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization The Hacker News
Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks The Hacker News
CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • HashiCorp Vault Vulnerability Allow Attackers to Authenticate to Vault Without Valid Credentials
  • Canon Says Subsidiary Impacted by Oracle EBS Hack 
  • CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
  • Top 10 Best Exposure Management Tools In 2026
  • ClickFix Attack Uses Steganography to Hide Malicious Code in Fake Windows Security Update Screen

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • HashiCorp Vault Vulnerability Allow Attackers to Authenticate to Vault Without Valid Credentials
  • Canon Says Subsidiary Impacted by Oracle EBS Hack 
  • CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
  • Top 10 Best Exposure Management Tools In 2026
  • ClickFix Attack Uses Steganography to Hide Malicious Code in Fake Windows Security Update Screen

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark