Payroll Pirate Attacks: Storm-2657 Hijacks University Workday Accounts to Steal Salaries

Oct 10, 2025

Key Takeaways

  • A financially motivated gang tracked as Storm-2657 has run “payroll pirate” attacks against U.S. universities since March 2025, compromising HR/Workday access to redirect salary payments.

  • Attackers used adversary-in-the-middle (AITM) phishing links to steal MFA codes, enroll their own phone numbers, and create persistence via inbox rules and Workday single-sign-on access.

  • Microsoft observed 11 compromised accounts at three universities that were then used to phish nearly 6,000 email accounts across 25 universities — underscoring the scale and stealth of the campaign.

  • Root causes: targeted social engineering combined with lack of phishing-resistant MFA and weak account monitoring. Microsoft recommends implementing phishing-resistant MFA and investigating account enrollments and inbox rules.

What Happened

Microsoft Threat Intelligence uncovered a coordinated campaign in which Storm-2657 targeted university HR employees to seize control of Workday-linked accounts. Attack emails — tailored to each target — used plausible themes (illness alerts, faculty misconduct, compensation notices, even impersonating university leadership) to trick recipients into clicking AITM phishing links. Those links harvested MFA codes, enabling attackers to take over Exchange Online accounts, hide Workday notifications with inbox rules, and then change payroll configurations in Workday via SSO to reroute salary payments.

Who’s Involved

Actor

Role

Storm-2657

Financially motivated threat group running payroll-pirate attacks against higher-education targets.

Microsoft Threat Intelligence

Detector and reporter of the campaign; provided mitigation guidance.

Targets

HR employees and payroll administrators at multiple U.S. universities; secondary targets included faculty and staff whose addresses were abused to spread the campaign.

Workday & Exchange Online

Platforms abused for payroll changes and mail account takeover (SSO and Exchange were leveraged, not exploited for software flaws).

Exposed Capabilities & Techniques

  • Adversary-in-the-Middle (AITM) phishing links — used to intercept credentials and MFA codes.

  • Prompted social engineering — highly customized lures (fake HR docs, leadership impersonation, compensation notices) to increase click rates.

  • Account persistence — attackers enrolled their own phone numbers as MFA devices and set inbox rules to delete or hide notification emails.

  • Payroll manipulation via SSO — after gaining mailbox access, attackers accessed Workday through single-sign-on to change payment targets.

Broader Impact

These “payroll pirate” attacks are a sophisticated variant of business email compromise (BEC) that specifically target payroll workflows. Microsoft’s findings — 11 confirmed account compromises propagating phishing to thousands of recipients — highlight how quickly a breach of a few privileged HR accounts can cascade across institutions. The FBI’s IC3 has long warned that BEC remains one of the most costly cybercrime types, with tens of thousands of complaints and billions in losses in recent years; campaigns like this will likely continue to target organizations with payroll and SSO dependencies.

What’s Next (Mitigation & Detection)

  • Deploy phishing-resistant MFA (hardware keys or platform MFA that resists AITM interception) for HR and anyone with payroll access.

  • Harden SSO and Workday configurations: restrict who can change payroll, log and alert on profile/phone enrollment changes, and require secondary verification for payment changes.

  • Monitor and alert on inbox rules and mail forwarding: alert on creation of rules that delete or forward HR notifications.

  • Phishing awareness targeted at HR: tabletop exercises and simulated AITM scenarios for HR/payroll teams.

  • Incident playbooks: prepare rapid recovery procedures for payroll diversion — including rolling back Workday changes, revoking SSO sessions, and re-enrolling legitimate MFA devices.

Conclusion

Payroll workflows and HR systems are high-value targets for financially motivated attackers. When attackers combine bespoke social engineering, AITM phishing, and weaknesses in MFA/SSO, they can quietly redirect salaries and propagate further compromises across institutions. Universities and organizations that rely on SaaS HR platforms should treat HR accounts like crown jewels: enforce phishing-resistant MFA, tighten SSO change controls, log anomalous enrollment and rule changes, and train HR staff with realistic phishing simulations.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited
Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Microsoft January 2026 Patch Tuesday Fixes 114 Flaws, 3 Zero-Days Exploited

Jan 14, 2026

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

Jan 12, 2026

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Jan 8, 2026

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

Jan 6, 2026

Ledger Customers Impacted After Global-e Third-Party Data Breach
Ledger Customers Impacted After Global-e Third-Party Data Breach
Ledger Customers Impacted After Global-e Third-Party Data Breach
Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Jan 6, 2026

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems
ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems
ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems
ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

Jan 6, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.