Loading cryptocurrency prices...

Storm-2657 Targets US Universities, Diverts Payroll via SaaS Hacks

Storm-2657 targets U.S. higher education employee accounts via phishing to redirect salary payments, exploiting weak MFA and HR SaaS platforms like Workday.

  • A threat group named Storm-2657 targets employee accounts to redirect salary payments.
  • The attacks focus on U.S. organizations, especially higher education employees using HR SaaS platforms like Workday.
  • The group uses phishing and social engineering, not software vulnerabilities, exploiting weak multi-factor authentication (MFA).
  • The attackers maintain access by adding their own phone numbers to MFA and deleting warning emails from victims’ accounts.
  • Microsoft recommends adopting phishing-resistant MFA methods and monitoring accounts for suspicious activity to prevent these attacks.

A threat actor identified as Storm-2657 has been hijacking employee accounts in U.S. organizations since early 2025 to redirect salary payments to accounts they control. The group primarily targets employees in sectors such as higher education by compromising access to third-party human resources (HR) software-as-a-service (SaaS) platforms, including Workday.

- Advertisement -

According to the Microsoft Threat Intelligence team’s report, the attacks involve phishing campaigns that harvest employee credentials and multi-factor authentication (MFA) codes. One observed approach uses an adversary-in-the-middle (AitM) phishing link to gain access to Exchange Online accounts and then exploit single sign-on (SSO) to control Workday profiles.

The attackers create rules in compromised email accounts to delete warning notifications from Workday, hiding unauthorized changes like rerouting salary payments to their accounts. They also add their own phone numbers as MFA devices to maintain persistent access. The compromised accounts then send phishing emails internally and to other universities.

Microsoft reported 11 confirmed account compromises at three universities since March 2025, leading to nearly 6,000 phishing emails sent across 25 institutions. These emails often contain urgent lures involving health issues or disciplinary notices to trick recipients into clicking malicious links.

The security firm advises organizations to implement phishing-resistant MFA methods such as FIDO2 security keys and to monitor accounts for suspicious activity, including unknown MFA devices and malicious inbox rules. The attackers do not exploit software flaws but capitalize on social engineering and insufficient MFA protections in HR SaaS platforms that manage payment details. More details are available in the Microsoft report found here.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

AstraZeneca Nears Landmark Drug Price Deal With Trump: Report

AstraZeneca is expected to announce a drug pricing agreement with U.S. President Donald Trump. The...

Bitcoin Core v30 Release Raises ETF Power Concerns Amid Fork Fears

Bitcoin Core version 30 is scheduled for release this weekend, stirring debate about potential...

Hedera HBAR Slides as Institutional Selloff Drives Volatility

Hedera hashgraph's HBAR token experienced significant institutional selloffs on October 10, causing a sharp...

Major Global Banks Unite to Launch Joint Stablecoin Initiative

Ten major global banks are working together to explore launching joint stablecoins. The proposed stablecoins...

EU Prepares New Trade Deal Plan, Rejects Trump Regulatory Demands

The European Union is preparing a proposal to implement the next stage of its...
- Advertisement -

Must Read

How to Check The Rarity of An NFT

Whenever you invest in an NFT collection, you might have noticed that some NFTs are more expensive than others. NFT collections are often made...