Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Microsoft: Cyber gang hijacks university salaries via Workday accounts

The report explicitly clarifies that the successful breaches are not the result of a software vulnerability within the Workday platform itself.

byKerem Gülen
October 10, 2025
in Cybersecurity, News

A cybercrime group tracked as Storm-2657 has targeted U.S. university employees since March 2025, using “payroll pirate” attacks to compromise accounts and hijack salary payments through sophisticated social engineering tactics meant to bypass security measures.

Microsoft Threat Intelligence analysts who discovered the campaign observed that the threat actors are specifically targeting Workday accounts for payroll diversion. The analysts noted, however, that the attack methods are not exclusive to one platform, indicating that other third-party human resources (HR) software-as-a-service (SaaS) systems could also be vulnerable to similar infiltration techniques. The focus remains on platforms that handle sensitive employee data and financial transactions. According to a report from Microsoft, the scale of the operation has been significant. “We’ve observed 11 successfully compromised accounts at three universities that were used to send phishing emails to nearly 6,000 email accounts across 25 universities,” the company stated, detailing the widespread nature of the phishing effort.

The report explicitly clarifies that the successful breaches are not the result of a software vulnerability within the Workday platform itself. Instead, the attackers’ success hinges on a combination of advanced social engineering and security gaps at the targeted institutions. Microsoft emphasized this point, stating, “These attacks don’t represent any vulnerability in the Workday platform or products, but rather financially motivated threat actors using sophisticated social engineering tactics and taking advantage of the complete lack of multifactor authentication (MFA) or lack of phishing-resistant MFA to compromise accounts.”

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

To execute the attacks, Storm-2657 crafts phishing emails that are custom-tailored for each target to increase their believability and the likelihood of success. The themes of these emails are varied and designed to provoke an immediate response from the recipient. Examples of these deceptive communications include urgent warnings about campus illness outbreaks, sensitive reports concerning alleged faculty misconduct, and emails that impersonate the university president. Other lures involve messages purporting to be from HR, sharing information about employee compensation and benefits or linking to falsified HR documents that require the user’s credentials to access.

The technical method for the initial compromise involves the use of adversary-in-the-middle (AITM) links embedded within the phishing emails. When a victim clicks these links, they are directed to a fake sign-in page that intercepts their credentials, including any multifactor authentication codes they enter. This theft of MFA codes is what enables the threat actors to gain unauthorized access to the victim’s Exchange Online account, establishing the initial foothold within the university’s network.

Once inside a breached email account, the attackers take immediate steps to cover their tracks and facilitate the financial theft. They configure new inbox rules designed to automatically find and delete any warning notification emails sent from Workday. This action prevents the legitimate user from being alerted to subsequent unauthorized changes made to their profile. With this concealment in place, the attackers use single sign-on (SSO) to pivot from the compromised email account directly into the victim’s Workday profile. From there, they alter salary payment configurations, redirecting future payroll deposits to financial accounts under their control.

The compromised accounts also serve as a launchpad for expanding the attack. “Following the compromise of email accounts and the payroll modifications in Workday, the threat actor leveraged newly accessed accounts to distribute further phishing emails, both within the organization and externally to other universities,” Microsoft added. To maintain long-term access, the attackers established persistence by enrolling their own phone numbers as MFA devices for the compromised accounts. This was done through either the Workday profiles or associated Duo MFA settings, allowing them to approve future malicious actions and evade detection even if passwords were changed.

In response to the campaign, Microsoft has identified the affected customers and has reached out to some to provide assistance with mitigation. The company also released detailed guidance to help organizations investigate these attacks and implement phishing-resistant MFA, a key defense to protect user accounts from this type of compromise. These “payroll pirate” attacks are classified as a variant of business email compromise (BEC) scams, which broadly target businesses and individuals that regularly process wire transfer payments.


Featured image credit

Tags: Microsoftphishingworkday

Related Posts

Tech News Today: Sora’s video tricks and the invisible bug that defines Android’s power

Tech News Today: Sora’s video tricks and the invisible bug that defines Android’s power

November 7, 2025
OpenAI’s Sora hits 470,000 Android installs on day one

OpenAI’s Sora hits 470,000 Android installs on day one

November 7, 2025
Mastodon adds quote posts in major 4.5 update with built-in safeguards

Mastodon adds quote posts in major 4.5 update with built-in safeguards

November 7, 2025
Elon Musk says Tesla may need a “gigantic” chip factory for its AI ambitions

Elon Musk says Tesla may need a “gigantic” chip factory for its AI ambitions

November 7, 2025
BMW integrates Alexa+ for true in-car conversations

BMW integrates Alexa+ for true in-car conversations

November 7, 2025
This Samsung Galaxy phone needs and immediate update

This Samsung Galaxy phone needs and immediate update

November 7, 2025

LATEST NEWS

Tech News Today: Sora’s video tricks and the invisible bug that defines Android’s power

OpenAI’s Sora hits 470,000 Android installs on day one

Mastodon adds quote posts in major 4.5 update with built-in safeguards

Elon Musk says Tesla may need a “gigantic” chip factory for its AI ambitions

BMW integrates Alexa+ for true in-car conversations

This Samsung Galaxy phone needs and immediate update

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.