Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit AiTM to Misdirect Employee Salaries

Hackers Exploit AiTM to Misdirect Employee Salaries

Posted on April 10, 2026 By CWS

A new wave of cyberattacks by a group identified as Storm-2755 is targeting Canadian employees by rerouting their salary payments to hacker-controlled bank accounts. This financially driven campaign employs adversary-in-the-middle (AiTM) tactics to hijack authenticated online sessions, effectively bypassing multi-factor authentication (MFA) measures.

Understanding Storm-2755’s Methodology

Storm-2755 initiates its attacks through SEO poisoning and malvertising, directing unsuspecting users to rogue websites like bluegraintours[.]com. These sites appear at the top of search results for terms like “Office 365” and its common misspelling “Office 265.” Victims who click these links are led to a counterfeit Microsoft 365 login page. Upon entering their credentials, the attackers capture both the password and active session token in real time, gaining full access without triggering MFA alerts.

Targeting Canadian Employees

Unlike other threat actors, Storm-2755 casts a wide net by targeting a broad range of Canadian employees, regardless of their industry. This strategy utilizes industry-neutral search phrases, making it difficult for standard threat intelligence systems to detect their operations. Once inside a compromised account, the group searches for payroll and HR keywords, sending deceptive emails to HR departments to alter direct deposit details.

Technical Sophistication of AiTM Attacks

What distinguishes Storm-2755 from previous phishing schemes is its sophisticated AiTM approach. By proxying the entire authentication process between the victim and Microsoft’s legitimate login service, the group can intercept session cookies and OAuth tokens. Utilizing the Axios HTTP client version 1.7.9, they maintain session activity without arousing suspicion. They exploit known vulnerabilities like CVE-2025-27152 for server-side request forgery within their relay framework.

In many cases, stolen tokens naturally expire after 30 days of inactivity. However, the attackers often reset account passwords and MFA settings long before expiration to maintain unauthorized access.

Recommendations for Organizations

Organizations are urged to act swiftly by revoking compromised tokens, removing malicious inbox rules, and resetting affected credentials and MFA methods. Implementing phishing-resistant MFA solutions like FIDO2 security keys can thwart AiTM-style token theft. It’s also crucial to configure Conditional Access policies to limit session durations and mandate reauthentication when risks arise. Continuous Access Evaluation (CAE) is recommended to quickly invalidate stolen tokens when risk conditions are detected. Additionally, security teams should monitor for suspicious inbox rule creation and audit HR platforms like Workday for unauthorized payment changes.

Stay informed by following our updates on Google News, LinkedIn, and X. Set CSN as your preferred news source on Google for more insights.

Cyber Security News Tags:AiTM, Canadian workforce, cyberattack prevention, Cybersecurity, employee security, Malvertising, Microsoft 365, multi-factor authentication, salary theft, Storm-2755

Post navigation

Previous Post: EngageSDK Flaw Puts Millions of Crypto Wallets at Risk
Next Post: France Adopts Linux for Government Workstations

Related Posts

Fake CAPTCHA Attack Leverages Microsoft Application Virtualization (App-V) to Deploy Malware Fake CAPTCHA Attack Leverages Microsoft Application Virtualization (App-V) to Deploy Malware Cyber Security News
Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks Palo Alto Networks Acknowledges SquareX Research on Limitations of SWGs Against Last Mile Reassembly Attacks Cyber Security News
Malware Defense 101 – Identifying and Removing Modern Threats Malware Defense 101 – Identifying and Removing Modern Threats Cyber Security News
New Attack Technique That Enables Attackers To Exfiltrate Git Credentials In Argocd New Attack Technique That Enables Attackers To Exfiltrate Git Credentials In Argocd Cyber Security News
Stryker Faces Major Cyberattack by Iran-Linked Group Stryker Faces Major Cyberattack by Iran-Linked Group Cyber Security News
McLaren Health Care Data Breach Exposes 743,000 People Personal Information McLaren Health Care Data Breach Exposes 743,000 People Personal Information Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • France Adopts Linux for Government Workstations
  • Hackers Exploit AiTM to Misdirect Employee Salaries
  • EngageSDK Flaw Puts Millions of Crypto Wallets at Risk
  • HPE Aruba 5G Vulnerability Allows Credential Theft
  • Exposed GitHub Copilot Flaw Risks Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • France Adopts Linux for Government Workstations
  • Hackers Exploit AiTM to Misdirect Employee Salaries
  • EngageSDK Flaw Puts Millions of Crypto Wallets at Risk
  • HPE Aruba 5G Vulnerability Allows Credential Theft
  • Exposed GitHub Copilot Flaw Risks Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark