Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Microsoft: Cyber gang hijacks university salaries via Workday accounts

The report explicitly clarifies that the successful breaches are not the result of a software vulnerability within the Workday platform itself.

byKerem Gülen
October 10, 2025
in Cybersecurity, News

A cybercrime group tracked as Storm-2657 has targeted U.S. university employees since March 2025, using “payroll pirate” attacks to compromise accounts and hijack salary payments through sophisticated social engineering tactics meant to bypass security measures.

Microsoft Threat Intelligence analysts who discovered the campaign observed that the threat actors are specifically targeting Workday accounts for payroll diversion. The analysts noted, however, that the attack methods are not exclusive to one platform, indicating that other third-party human resources (HR) software-as-a-service (SaaS) systems could also be vulnerable to similar infiltration techniques. The focus remains on platforms that handle sensitive employee data and financial transactions. According to a report from Microsoft, the scale of the operation has been significant. “We’ve observed 11 successfully compromised accounts at three universities that were used to send phishing emails to nearly 6,000 email accounts across 25 universities,” the company stated, detailing the widespread nature of the phishing effort.

The report explicitly clarifies that the successful breaches are not the result of a software vulnerability within the Workday platform itself. Instead, the attackers’ success hinges on a combination of advanced social engineering and security gaps at the targeted institutions. Microsoft emphasized this point, stating, “These attacks don’t represent any vulnerability in the Workday platform or products, but rather financially motivated threat actors using sophisticated social engineering tactics and taking advantage of the complete lack of multifactor authentication (MFA) or lack of phishing-resistant MFA to compromise accounts.”

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

To execute the attacks, Storm-2657 crafts phishing emails that are custom-tailored for each target to increase their believability and the likelihood of success. The themes of these emails are varied and designed to provoke an immediate response from the recipient. Examples of these deceptive communications include urgent warnings about campus illness outbreaks, sensitive reports concerning alleged faculty misconduct, and emails that impersonate the university president. Other lures involve messages purporting to be from HR, sharing information about employee compensation and benefits or linking to falsified HR documents that require the user’s credentials to access.

The technical method for the initial compromise involves the use of adversary-in-the-middle (AITM) links embedded within the phishing emails. When a victim clicks these links, they are directed to a fake sign-in page that intercepts their credentials, including any multifactor authentication codes they enter. This theft of MFA codes is what enables the threat actors to gain unauthorized access to the victim’s Exchange Online account, establishing the initial foothold within the university’s network.

Once inside a breached email account, the attackers take immediate steps to cover their tracks and facilitate the financial theft. They configure new inbox rules designed to automatically find and delete any warning notification emails sent from Workday. This action prevents the legitimate user from being alerted to subsequent unauthorized changes made to their profile. With this concealment in place, the attackers use single sign-on (SSO) to pivot from the compromised email account directly into the victim’s Workday profile. From there, they alter salary payment configurations, redirecting future payroll deposits to financial accounts under their control.

The compromised accounts also serve as a launchpad for expanding the attack. “Following the compromise of email accounts and the payroll modifications in Workday, the threat actor leveraged newly accessed accounts to distribute further phishing emails, both within the organization and externally to other universities,” Microsoft added. To maintain long-term access, the attackers established persistence by enrolling their own phone numbers as MFA devices for the compromised accounts. This was done through either the Workday profiles or associated Duo MFA settings, allowing them to approve future malicious actions and evade detection even if passwords were changed.

In response to the campaign, Microsoft has identified the affected customers and has reached out to some to provide assistance with mitigation. The company also released detailed guidance to help organizations investigate these attacks and implement phishing-resistant MFA, a key defense to protect user accounts from this type of compromise. These “payroll pirate” attacks are classified as a variant of business email compromise (BEC) scams, which broadly target businesses and individuals that regularly process wire transfer payments.


Featured image credit

Tags: Microsoftphishingworkday

Related Posts

Verizon down: Latest Verizon outage map for service issues

Verizon down: Latest Verizon outage map for service issues

October 10, 2025
A critical Oracle zero-day flaw is being actively abused by hackers

A critical Oracle zero-day flaw is being actively abused by hackers

October 10, 2025
Microsoft Copilot can now create documents and search your Gmail

Microsoft Copilot can now create documents and search your Gmail

October 10, 2025
Google Messages is about to get a lot smarter with this AI tool

Google Messages is about to get a lot smarter with this AI tool

October 10, 2025
Here is how WhatsApp will let you display your Facebook account

Here is how WhatsApp will let you display your Facebook account

October 10, 2025
The Windows 10 doomsday clock is ticking for 500 million users

The Windows 10 doomsday clock is ticking for 500 million users

October 10, 2025

LATEST NEWS

Verizon down: Latest Verizon outage map for service issues

A critical Oracle zero-day flaw is being actively abused by hackers

Microsoft Copilot can now create documents and search your Gmail

Google Messages is about to get a lot smarter with this AI tool

Here is how WhatsApp will let you display your Facebook account

The Windows 10 doomsday clock is ticking for 500 million users

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.