News: 1760102506

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Microsoft warns of 'payroll pirate' crew looting US university salaries

(2025/10/10)


Microsoft's Threat Intelligence team has sounded the alarm over a new financially-motivated cybercrime spree that is raiding US university payroll systems.

In a [1]blog post , Redmond said a cybercrime crew it tracks as Storm-2657 has been targeting university employees since March 2025, hijacking salaries by breaking into HR software such as Workday.

The attack is as audacious as it is simple: compromise HR and email accounts, quietly change payroll settings, and redirect pay packets into attacker-controlled bank accounts. Microsoft has dubbed the operation "payroll pirate," a nod to the way crooks plunder staff wages without touching the employer's systems directly.

[2]

Storm-2657's campaign begins with phishing emails designed to harvest multifactor authentication (MFA) codes using adversary-in-the-middle (AiTM) techniques. Once in, the attackers breach Exchange Online accounts and insert inbox rules to hide or delete HR messages. From there, they use stolen credentials and SSO integrations to access Workday and tweak direct deposit information, ensuring that future payments go straight to them.

[3]

[4]

Microsoft stresses that the attacks don't exploit a flaw in Workday itself. The weak points are poor MFA hygiene and sloppy configurations, with Redmond warning that organizations still relying on legacy or easily-phished MFA are sitting ducks.

"Since March 2025, we've observed 11 successfully compromised accounts at three universities that were used to send phishing emails to nearly 6,000 email accounts across 25 universities," Microsoft explained. It says these lures were crafted with academic precision: fake HR updates, reports of faculty misconduct, or notes about illness clusters, often linked through shared Google Docs to bypass filtering and appear routine.

[5]

In one instance, a phishing message urging recipients to "check their illness exposure status" was sent to 500 people within a single university, and only about 10 percent flagged it as suspicious, according to Microsoft.

After securing access, the attackers add their own phone numbers as MFA devices through compromised profiles or Duo settings, ensuring subsequent approvals land in their pockets. The entire process unfolds quietly because the victims never see the altered notifications.

[6]RondoDox botnet fires 'exploit shotgun' at nearly every router and internet-connected home device

[7]Ex-NSA bad-guy hunter listened to Scattered Spider's fake help-desk calls: 'Those guys are good'

[8]Air Force admits SharePoint privacy issue as reports trickle out of possible breach

[9]1,200 undergrads hung out to dry after jailbreak attack on laundry machines

Detecting the scam requires cross-system visibility, something many universities lack. Microsoft advises correlating telemetry between Exchange Online and Workday, and says security teams should watch out for new inbox rules referencing "@myworkday.com," suspicious MFA enrollments, and Workday events like "Change My Account" or "Manage Payment Elections."

According to Microsoft, defense starts with ditching passwords altogether and recommends adopting phishing-resistant methods such as FIDO2 keys, passkeys, or Windows Hello. When a compromise is suspected, immediate steps include resetting credentials, removing rogue MFA devices, purging malicious mail rules, and reverting any payroll changes.

It's time for universities, and any large employer, to batten down their MFA hatches before the next payday walks the plank. ®

Get our [10]Tech Resources



[1] https://www.microsoft.com/en-us/security/blog/2025/10/09/investigating-targeted-payroll-pirate-attacks-affecting-us-universities/

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aOktl19dI9tTcaz8QVpRAAAAAMo&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aOktl19dI9tTcaz8QVpRAAAAAMo&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aOktl19dI9tTcaz8QVpRAAAAAMo&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aOktl19dI9tTcaz8QVpRAAAAAMo&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://www.theregister.com/2025/10/09/rondodox_botnet_fires_exploit_shotgun/

[7] https://www.theregister.com/2025/05/18/ex_nsa_scattered_spider_call/

[8] https://www.theregister.com/2025/10/01/us_air_force_investigates_breach/

[9] https://www.theregister.com/2025/09/12/jailbroken_laundry_machines/

[10] https://whitepapers.theregister.com/



Exploiting adversary-in-the-middle (AITM) technique

Taliesinawen

“When employees entered credentials and MFA codes on these AITM phishing pages, attackers captured them in real time via a proxy.”

Good Grief :o

I'm not au fait with the innards MFA but would have thought a challenge-response mechanism. client to server, server to client and then client to server. Until the innovators come up with a better solution. Have the one computer account, the one mobile phone number and the one MFA dongle dedicated to business matters. Never use this for anything else. Boot a computer with no Hard drive from a bootable CD image to do your business with.

crew looting US university salaries

Yet Another Anonymous coward

It's difficult to defend against a national level actor targeting universities

Especially when they are your own government

While in Soviet Russia…

find users who cut cat tail

At a university on this side of the pond, you could phish as much as you like. Employees need to fill and sign a form and bring it to personal dept. to change anything related to the salary. In person. Antiquated? Maybe. But how often do you really need such changes? You probably change employers more frequently than that.

Re: While in Soviet Russia…

Yet Another Anonymous coward

But in Soviet Union you didn't have to login to your payroll everyday to find out why your family's last doctors visit didn't get covered.

Stayed in bed all morning just to pass the time,
There's something wrong here, there can be no more denying,
One of us is changing, or maybe we just stopped trying,

And it's too late, baby, now, it's too late,
Though we really did try to make it,
Something inside has died and I can't hide and I just can't fake it...

It used to be so easy living here with you,
You were light and breezy and I knew just what to do
Now you look so unhappy and I feel like a fool.

There'll be good times again for me and you,
But we just can't stay together, don't you feel it too?
But I'm glad for what we had and that I once loved you...

But it's too late baby...
It's too late, now darling, it's too late...
-- Carol King, "Tapestry"