Article Details

Scrape Timestamp (UTC): 2025-10-10 13:32:30.529

Source: https://www.theregister.com/2025/10/10/microsoft_payroll_pirate/

Original Article Text

Click to Toggle View

Microsoft warns of 'payroll pirate' crew looting US university salaries. Crooks phish campus staff, slip into HR systems, and quietly reroute paychecks. Microsoft's Threat Intelligence team has sounded the alarm over a new financially-motivated cybercrime spree that is raiding US university payroll systems. In a blog post, Redmond said a cybercrime crew it tracks as Storm-2657 has been targeting university employees since March 2025, hijacking salaries by breaking into HR software such as Workday. The attack is as audacious as it is simple: compromise HR and email accounts, quietly change payroll settings, and redirect pay packets into attacker-controlled bank accounts. Microsoft has dubbed the operation "payroll pirate," a nod to the way crooks plunder staff wages without touching the employer's systems directly. Storm-2657's campaign begins with phishing emails designed to harvest multifactor authentication (MFA) codes using adversary-in-the-middle (AiTM) techniques. Once in, the attackers breach Exchange Online accounts and insert inbox rules to hide or delete HR messages. From there, they use stolen credentials and SSO integrations to access Workday and tweak direct deposit information, ensuring that future payments go straight to them. Microsoft stresses that the attacks don't exploit a flaw in Workday itself. The weak points are poor MFA hygiene and sloppy configurations, with Redmond warning that organizations still relying on legacy or easily-phished MFA are sitting ducks. "Since March 2025, we've observed 11 successfully compromised accounts at three universities that were used to send phishing emails to nearly 6,000 email accounts across 25 universities," Microsoft explained. It says these lures were crafted with academic precision: fake HR updates, reports of faculty misconduct, or notes about illness clusters, often linked through shared Google Docs to bypass filtering and appear routine. In one instance, a phishing message urging recipients to "check their illness exposure status" was sent to 500 people within a single university, and only about 10 percent flagged it as suspicious, according to Microsoft. After securing access, the attackers add their own phone numbers as MFA devices through compromised profiles or Duo settings, ensuring subsequent approvals land in their pockets. The entire process unfolds quietly because the victims never see the altered notifications. Detecting the scam requires cross-system visibility, something many universities lack. Microsoft advises correlating telemetry between Exchange Online and Workday, and says security teams should watch out for new inbox rules referencing "@myworkday.com," suspicious MFA enrollments, and Workday events like "Change My Account" or "Manage Payment Elections." According to Microsoft, defense starts with ditching passwords altogether and recommends adopting phishing-resistant methods such as FIDO2 keys, passkeys, or Windows Hello. When a compromise is suspected, immediate steps include resetting credentials, removing rogue MFA devices, purging malicious mail rules, and reverting any payroll changes. It's time for universities, and any large employer, to batten down their MFA hatches before the next payday walks the plank.

Daily Brief Summary

CYBERCRIME // Cybercriminals Exploit University Payroll Systems in Phishing Attacks

Microsoft's Threat Intelligence team reports a cybercrime group, Storm-2657, targeting US university payroll systems since March 2025, redirecting salaries to attacker-controlled accounts.

The attack involves phishing emails to harvest MFA codes using adversary-in-the-middle techniques, compromising HR and email accounts without exploiting Workday software flaws.

Once access is gained, attackers alter payroll settings in systems like Workday, rerouting paychecks while hiding or deleting HR-related emails to avoid detection.

The campaign has compromised 11 accounts across three universities, sending phishing emails to nearly 6,000 accounts at 25 universities, using fake HR updates and illness alerts.

Microsoft highlights the vulnerability of legacy MFA systems, advising the adoption of phishing-resistant methods such as FIDO2 keys and Windows Hello to bolster security.

Universities are urged to enhance cross-system visibility, correlating telemetry between Exchange Online and Workday to detect suspicious activities and prevent future breaches.

Immediate response actions include resetting compromised credentials, removing unauthorized MFA devices, and reverting fraudulent payroll changes to mitigate financial losses.