Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Attackers Redirected Employee Paychecks Without Breaching a Single System

Posted on January 19, 2026January 19, 2026 By CWS

A seemingly easy cellphone name turned the gateway to a complicated assault that diverted worker paychecks with none malware or community breach.

A corporation found this fraud when staff reported lacking wage deposits. The attacker had modified direct-deposit data to funnel funds into accounts beneath their management.

This incident reveals a troubling pattern the place menace actors are abandoning complicated technical strategies and turning as a substitute to social engineering that targets human vulnerability.

The assault started with social engineering techniques, a technique more and more favored by menace actors. In keeping with Palo Alto Networks’ 2025 Unit 42 World Incident Response Report, 36 p.c of incidents examined began with social engineering campaigns.

The attacker impersonated staff and contacted a number of assist desk groups throughout payroll, IT, and HR departments.

By gathering publicly out there data from social media platforms, the attacker collected sufficient private particulars to reply verification questions.

They then satisfied assist desk workers to reset passwords and re-enroll multi-factor authentication gadgets.

The attacker even known as again repeatedly to establish which verification questions have been being requested, enhancing their probabilities of success on subsequent makes an attempt.

Palo Alto Networks analysts recognized the assault’s persistence mechanism as notably regarding. The menace actor registered an exterior electronic mail handle as an authentication technique inside the group’s Azure Lively Listing atmosphere.

This step demonstrated clear intent to keep up entry past the fast payroll theft. The attacker systematically compromised a number of worker accounts to entry delicate payroll knowledge.

As soon as authenticated, the attacker modified direct-deposit data for a number of staff, redirecting their wage funds to attacker-controlled financial institution accounts.

The fraudulent exercise went undetected for weeks as a result of the professional credentials and legitimate multi-factor authentication made the transactions seem regular.

The Assist Desk Vulnerability: A Essential Safety Hole

Assist desk operations signify some of the neglected safety weak factors in fashionable organizations.

Password resets and MFA re-enrollment procedures, when not correctly secured, grow to be high-impact vulnerabilities.

This incident demonstrates how human-driven workflows can bypass all technical safeguards.

Attackers perceive that social engineering requires no malware improvement, exploit discovery, or community intrusion abilities.

They merely want persuasive communication and publicly out there data.

The investigation ultimately contained the influence to a few worker accounts, however it revealed deeper systemic points all through the group’s safety infrastructure.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Breaching, Employee, Paychecks, Redirected, Single, System

Post navigation

Previous Post: Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
Next Post: Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins

Related Posts

Securing Legacy Systems Strategies for Modernizing Old Tech Cyber Security News
Microsoft Confirms Windows 11 24H2 Update Broken Multiple Core Features Cyber Security News
Cybersecurity Newsletter Weekly – AWS Outage, WSUS Exploitation, Chrome Flaws, and RDP Attacks Cyber Security News
Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges Cyber Security News
PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution Cyber Security News
New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins
  • Attackers Redirected Employee Paychecks Without Breaching a Single System
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
  • New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware
  • TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Impersonate as MalwareBytes to Attack Users and Steal Logins
  • Attackers Redirected Employee Paychecks Without Breaching a Single System
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
  • New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware
  • TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark