Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Payroll Pirates – Network of Criminal Groups Hijacking Payroll Systems

Posted on November 17, 2025November 18, 2025 By CWS

Cyber threats are altering how they attain victims. A financially motivated felony community known as Payroll Pirates has been quietly attacking payroll techniques, credit score unions, and buying and selling platforms throughout the USA since mid-2023.

Their weapon of selection is malvertising, the place pretend adverts seem on serps and trick customers into visiting phishing web sites. As soon as workers enter their login particulars on these pretend pages, attackers steal the data and redirect wage funds to their very own financial institution accounts.

This organized operation has grown over time, focusing on greater than 200 totally different platforms and trapping over 500,000 customers.

The marketing campaign began with Google Advertisements that promoted pretend payroll web sites. When workers searched for his or her firm’s HR portal, they noticed these sponsored adverts on the prime of search outcomes.

Clicking the advert took them to a phishing web site that regarded precisely like their actual payroll login web page. After getting into usernames and passwords, the stolen credentials have been despatched on to the attackers via hidden communication channels.

Test Level safety researchers recognized this community in Could 2023 after they seen a number of phishing websites copying payroll platforms.

The investigation revealed that totally different teams have been working collectively, sharing the identical assault instruments and strategies, however every had their very own domains and methods of gathering stolen data.

By November 2023, the assaults stopped quickly. Nevertheless, in June 2024, the criminals returned with higher instruments. The brand new phishing pages may now defeat two-factor authentication by utilizing Telegram bots that talked to victims in actual time.

Advert Cloaking Service Works (Supply – Test Level)

When a consumer entered their password, the bot would instantly ask for his or her verification code or safety questions. The up to date system additionally used redesigned backend scripts that made detection a lot tougher.

As an alternative of apparent knowledge assortment factors, the attackers now used hidden PHP scripts with easy names like xxx.php, examine.php, and analytics.php to ship stolen data with out being seen.

Actual-Time Credential Theft Mechanism

Probably the most harmful a part of this operation is how the attackers bypass safety measures. When a sufferer lands on the pretend login web page and enters their credentials, the data is instantly despatched to operators via a Telegram bot.

This bot acts because the management heart for the complete community, dealing with two-factor authentication requests throughout all various kinds of targets together with credit score unions, payroll techniques, healthcare advantages portals, and buying and selling platforms.

Assault circulation, infrastructure, and evolution (Supply – Test Level)

The bot sends notifications to operators who then work together with victims by requesting one-time codes and safety solutions in actual time.

This direct communication occurs inside seconds, making it virtually unattainable for victims to comprehend they’re being scammed till it’s too late.

The phishing kits use dynamic parts that change primarily based on what safety measures every goal platform makes use of. Pages adapt robotically by loading totally different kinds relying on whether or not the true web site asks for safety questions, e mail verification, or cell authentication.

The backend scripts talk silently with operators via encrypted channels, retaining all knowledge assortment hidden from community monitoring instruments.

This makes the infrastructure practically unattainable to disrupt as a result of there aren’t any uncovered endpoints that safety groups can simply block or take down.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Criminal, Groups, Hijacking, Network, Payroll, Pirates, Systems

Post navigation

Previous Post: Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered
Next Post: Threat Actors can Use Xanthorox AI Tool to Generate Different Malicious Code Based on Prompts

Related Posts

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique Cyber Security News
World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison Cyber Security News
Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games Cyber Security News
New RatOn Takes Control Over Bank Account and Initiates Automated Money Transfers Cyber Security News
20 Best Network Monitoring Tools in 2025 Cyber Security News
239 Malicious Android Apps on Google Play With Downloaded Over 40 Million Times Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment
  • Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
  • Tim Kosiba Named NSA Deputy Director
  • Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment
  • Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
  • Tim Kosiba Named NSA Deputy Director
  • Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark