Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Canadian employees targeted in payroll pirate attacks
    Cybersecurity

    Canadian employees targeted in payroll pirate attacks

    adminBy adminApril 11, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Canada hackers
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Canada hackers

    A financially motivated threat actor tracked as Storm-2755 is stealing Canadian employees’ salary payments after hijacking their accounts in payroll redirection (also known as payroll pirate) attacks.

    The attackers used malicious Microsoft 365 sign-in pages to steal victims’ authentication tokens and session cookies by redirecting them to domains (e.g., bluegraintours[.]com) hosting malicious web pages (pushed to the top of search engine results through malvertising or SEO poisoning) that masqueraded as Microsoft 365 sign-in forms.

    This allowed Storm-2755 to bypass multifactor authentication (MFA) in adversary‑in‑the‑middle (AiTM) attacks by replaying stolen session tokens rather than re-authenticating.

    Wiz

    “Rather than harvesting only usernames and passwords, AiTM frameworks proxy the entire authentication flow in real time, enabling the capture session cookies and OAuth access tokens issued upon successful authentication,” Microsoft explained.

    “Due to these tokens representing a fully authenticated session, threat actors can reuse them to gain access to Microsoft services without being prompted for credentials or MFA, effectively bypassing legacy MFA protections not designed to be phishing-resistant.”

    Storm-2755 attack flow
    Storm-2755 attack flow (Microsoft)

    After gaining access to an employee’s account, the attacker created inbox rules that automatically moved messages from human resources staff containing the words “direct deposit” or “bank” to hidden folders, preventing the victim from seeing the correspondence.

    In the next stage, they searched for “payroll,” “HR,” “direct deposit,” and “finance,” then sent emails to human resources staff with the subject line “Question about direct deposit” to trick staff into updating banking information.

    ​Where social engineering failed, the attacker logged directly into HR software platforms such as Workday, using the stolen session to manually update direct deposit details.

    Storm-2755 emailing HR staff
    Storm-2755 emailing HR staff (Microsoft)

    To harden defenses against AiTM and payroll pirate attacks, Microsoft advises defenders to block legacy authentication protocols and implement phishing-resistant MFA.

    If any signs of compromise are detected, they should also revoke compromised tokens and sessions immediately, remove malicious inbox rules, and reset MFA methods and credentials for all affected accounts.

    In October, Microsoft disrupted another pirate payroll campaign targeting Workday accounts since March 2025, in which a cybercrime gang tracked as Storm-2657 targeted university employees across the United States to hijack their salary payments.

    ​In these attacks, Storm-2657 breached the targets’ accounts via phishing emails and stole MFA codes using AITM tactics, which allowed the threat actors to compromise the victims’ Exchange Online accounts.

    Payroll pirate attacks are a variant of business email compromise (BEC) scams that target businesses and individuals who regularly make wire transfers. Last year, the FBI’s Internet Crime Complaint Center (IC3) recorded over 24,000 BEC fraud complaints, resulting in losses exceeding $3 billion, making it the second most lucrative crime type behind investment scams.


    tines

    Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

    This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

    attacks Canadian Employees payroll pirate targeted
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleI replaced my NAS with Google Drive and barely noticed
    Next Article Forget Camera and AI tricks, this free productivity tool is my favorite part of Google Pixel
    admin
    • Website

    Related Posts

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Cisco says critical Webex Services flaw requires customer action

    April 16, 2026

    NIST Prioritizes NVD Enrichment for CVEs in CISA KEV, Critical Software

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    What Is Answer Engine Optimization? And How to Do It

    April 16, 2026

    Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger

    April 16, 2026

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,345)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (825)
    • Tech Tools & Mobile / Apps (1,610)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    What Is Answer Engine Optimization? And How to Do It

    April 16, 2026

    Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger

    April 16, 2026

    COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for

    April 16, 2026
    Most Popular
    • What Is Answer Engine Optimization? And How to Do It
    • Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger
    • COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for
    • Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
    • Search Ad Growth Slows As Social & Video Gain Faster
    • I’ve been using Android’s built-in focus modes wrong this whole time, and one setting fixed everything
    • Cisco says critical Webex Services flaw requires customer action
    • This one chart exposes how far Pixel has fallen behind in mobile gaming
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.