Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

At Starbase, SpaceX is doing its own firefighting.

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft warns of ‘payroll pirates’ who take over HR SaaS accounts to steal employee paychecks
Identity

Microsoft warns of ‘payroll pirates’ who take over HR SaaS accounts to steal employee paychecks

userBy userOctober 10, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 10, 2025Ravi LakshmananSaaS Security/Threat Intelligence

payroll pirates

A threat actor known as Storm-2657 has been observed hijacking employee accounts with the ultimate goal of diverting payroll payments to accounts controlled by the attacker.

“Storm-2657 is actively targeting employees of various US-based organizations, particularly in sectors such as higher education, and gaining access to third-party human resources (HR) software-as-a-service (SaaS) platforms like Workday,” the Microsoft Threat Intelligence Team said in a report.

However, the tech giant warned that any software-as-a-service (SaaS) platform that stores personnel, payment, or bank account information could be targeted by such financially motivated campaigns. Some aspects of the campaign, codenamed “Payroll Pirate,” have previously been covered by Silent Push, Malwarebytes, and Hunt.io.

DFIR retainer service

What makes this attack notable is that it does not exploit any security flaws in the service itself. Rather, they use social engineering tactics and a lack of multi-factor authentication (MFA) protection to seize control of employee accounts and ultimately modify and route payment information to accounts controlled by threat actors.

In one campaign observed by Microsoft in early 2025, attackers allegedly gained initial access through phishing emails designed to harvest credentials and MFA codes using man-in-the-middle (AitM) phishing links, thereby gaining access to Exchange Online accounts and taking over Workday profiles through single sign-on (SSO).

Threat actors have also been observed creating inbox rules that delete alert notification emails received from Workday in order to hide unauthorized changes made to profiles. This includes changing your payroll settings to redirect future payroll payments to your managed account.

To ensure permanent access to the account, the attacker registers his phone number as an MFA device for the victim account. Additionally, the compromised email account is used to distribute further phishing emails both within the organization and to other universities.

CIS build kit

Microsoft announced that it has confirmed that 11 accounts at three universities have been successfully compromised since March 2025, with phishing emails sent to approximately 6,000 email accounts at 25 universities. Email messages contain decoys related to notifications of illness or on-campus misconduct, creating a false sense of urgency and tricking recipients into clicking on a bogus link.

To reduce the risk posed by Storm-2657, we recommend adopting passwordless, phishing-resistant MFA methods, such as FIDO2 security keys, and checking accounts for signs of suspicious activity, such as unknown MFA devices or malicious inbox rules.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUK gives Google Search special market position, paving the way for tighter regulation
Next Article Investors are betting $21 billion that the energy transition will never end
user
  • Website

Related Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025

A single 8-byte write shatters AMD’s SEV-SNP Confidential Computing security

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

At Starbase, SpaceX is doing its own firefighting.

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Aquawise unveils AI-powered water quality technology at TechCrunch Disrupt 2025

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.