Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Payroll Pirates – Network of Criminal Groups Hijacking Payroll Systems

Posted on November 17, 2025November 18, 2025 By CWS

Cyber threats are altering how they attain victims. A financially motivated felony community known as Payroll Pirates has been quietly attacking payroll techniques, credit score unions, and buying and selling platforms throughout the USA since mid-2023.

Their weapon of selection is malvertising, the place pretend adverts seem on serps and trick customers into visiting phishing web sites. As soon as workers enter their login particulars on these pretend pages, attackers steal the data and redirect wage funds to their very own financial institution accounts.

This organized operation has grown over time, focusing on greater than 200 totally different platforms and trapping over 500,000 customers.

The marketing campaign began with Google Advertisements that promoted pretend payroll web sites. When workers searched for his or her firm’s HR portal, they noticed these sponsored adverts on the prime of search outcomes.

Clicking the advert took them to a phishing web site that regarded precisely like their actual payroll login web page. After getting into usernames and passwords, the stolen credentials have been despatched on to the attackers via hidden communication channels.

Test Level safety researchers recognized this community in Could 2023 after they seen a number of phishing websites copying payroll platforms.

The investigation revealed that totally different teams have been working collectively, sharing the identical assault instruments and strategies, however every had their very own domains and methods of gathering stolen data.

By November 2023, the assaults stopped quickly. Nevertheless, in June 2024, the criminals returned with higher instruments. The brand new phishing pages may now defeat two-factor authentication by utilizing Telegram bots that talked to victims in actual time.

Advert Cloaking Service Works (Supply – Test Level)

When a consumer entered their password, the bot would instantly ask for his or her verification code or safety questions. The up to date system additionally used redesigned backend scripts that made detection a lot tougher.

As an alternative of apparent knowledge assortment factors, the attackers now used hidden PHP scripts with easy names like xxx.php, examine.php, and analytics.php to ship stolen data with out being seen.

Actual-Time Credential Theft Mechanism

Probably the most harmful a part of this operation is how the attackers bypass safety measures. When a sufferer lands on the pretend login web page and enters their credentials, the data is instantly despatched to operators via a Telegram bot.

This bot acts because the management heart for the complete community, dealing with two-factor authentication requests throughout all various kinds of targets together with credit score unions, payroll techniques, healthcare advantages portals, and buying and selling platforms.

Assault circulation, infrastructure, and evolution (Supply – Test Level)

The bot sends notifications to operators who then work together with victims by requesting one-time codes and safety solutions in actual time.

This direct communication occurs inside seconds, making it virtually unattainable for victims to comprehend they’re being scammed till it’s too late.

The phishing kits use dynamic parts that change primarily based on what safety measures every goal platform makes use of. Pages adapt robotically by loading totally different kinds relying on whether or not the true web site asks for safety questions, e mail verification, or cell authentication.

The backend scripts talk silently with operators via encrypted channels, retaining all knowledge assortment hidden from community monitoring instruments.

This makes the infrastructure practically unattainable to disrupt as a result of there aren’t any uncovered endpoints that safety groups can simply block or take down.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Criminal, Groups, Hijacking, Network, Payroll, Pirates, Systems

Post navigation

Previous Post: Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered
Next Post: Threat Actors can Use Xanthorox AI Tool to Generate Different Malicious Code Based on Prompts

Related Posts

DNN Vulnerability Let Attackers Steal NTLM Credentials via Unicode Normalization Bypass Cyber Security News
Cybersecurity Newsletter Weekly – Discord, Red Hat Data Breach, 7-Zip Vulnerabilities and Sonicwall Firewall Hack Cyber Security News
Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code Cyber Security News
New Linux EDR Evasion Tool Using io_uring Kernel Feature Cyber Security News
Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data Cyber Security News
Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News