Storm-2657 Targets US Universities, Diverts Payroll via SaaS Hacks

Storm-2657 targets U.S. higher education employee accounts via phishing to redirect salary payments, exploiting weak MFA and HR SaaS platforms like Workday.

  • A threat group named Storm-2657 targets employee accounts to redirect salary payments.
  • The attacks focus on U.S. organizations, especially higher education employees using HR SaaS platforms like Workday.
  • The group uses phishing and social engineering, not software vulnerabilities, exploiting weak multi-factor authentication (MFA).
  • The attackers maintain access by adding their own phone numbers to MFA and deleting warning emails from victims’ accounts.
  • Microsoft recommends adopting phishing-resistant MFA methods and monitoring accounts for suspicious activity to prevent these attacks.

A threat actor identified as Storm-2657 has been hijacking employee accounts in U.S. organizations since early 2025 to redirect salary payments to accounts they control. The group primarily targets employees in sectors such as higher education by compromising access to third-party human resources (HR) software-as-a-service (SaaS) platforms, including Workday.

- Advertisement -

According to the Microsoft Threat Intelligence team’s report, the attacks involve phishing campaigns that harvest employee credentials and multi-factor authentication (MFA) codes. One observed approach uses an adversary-in-the-middle (AitM) phishing link to gain access to Exchange Online accounts and then exploit single sign-on (SSO) to control Workday profiles.

The attackers create rules in compromised email accounts to delete warning notifications from Workday, hiding unauthorized changes like rerouting salary payments to their accounts. They also add their own phone numbers as MFA devices to maintain persistent access. The compromised accounts then send phishing emails internally and to other universities.

Microsoft reported 11 confirmed account compromises at three universities since March 2025, leading to nearly 6,000 phishing emails sent across 25 institutions. These emails often contain urgent lures involving health issues or disciplinary notices to trick recipients into clicking malicious links.

The security firm advises organizations to implement phishing-resistant MFA methods such as FIDO2 security keys and to monitor accounts for suspicious activity, including unknown MFA devices and malicious inbox rules. The attackers do not exploit software flaws but capitalize on social engineering and insufficient MFA protections in HR SaaS platforms that manage payment details. More details are available in the Microsoft report found here.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Arthur Hayes Forecasts Hyperliquid Could Hit $150 by August

Hyperliquid's HYPE token could rally to $150 by August if it continues to capture...

DOJ seeks retrial for Tornado Cash dev on key charges

U.S. Attorney Jay Clayton has requested a retrial for Tornado Cash developer Roman Storm...

Ledger Integrates with Babylon Labs for Bitcoin Vaults

Bitcoin self-custody startup Babylon Labs has partnered with hardware wallet giant Ledger to secure...

Hackers Target AI Agent Security in New Attacks

AI Agents that automate tasks like sending emails or moving data are creating a...

Winklevoss Twins Shift $130M Bitcoin to Gemini Wallets

Gemini founders Tyler and Cameron Winklevoss transferred approximately $130 million in Bitcoin to the...

Must Read

A Beginner’s Guide To Cryptocurrency Mining

Cryptocurrency is considered one of the most popular forms of financial assets today. Many of these digital assets operate within blockchain technology which works...