Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Poisoned “Office 365” search results lead to stolen paychecks
    Cybersecurity

    Poisoned “Office 365” search results lead to stolen paychecks

    adminBy adminApril 10, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Poisoned "Office 365" search results lead to stolen paychecks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A financially motivated hacking group is targeting Canadian employees with a sophisticated campaign designed to covertly redirect their salary payments into attacker-controlled bank accounts, Microsoft researchers discovered.

    SEO poisoning and malvertising + phishing + AiTM

    The group, which Microsoft tracks as Storm-2755, begins by poisoning search engine results and running malicious ads against generic queries like “Office 365”, or even common misspellings like “Office 265.”

    Victims who click through land on a convincing but fake Microsoft 365 login page that both steals their login credentials and proxies the entire authentication session in real time, capturing the session token issued after login.

    “Storm-2755 leveraged version 1.7.9 of the Axios HTTP client to relay authentication tokens to the customer infrastructure which effectively bypassed non-phishing resistant MFA and preserved access without requiring repeated sign ins. This replay flow allowed Storm-2755 to maintain these active sessions and proxy legitimate user actions, effectively executing an AiTM attack,” Microsoft’s incident responders explained.

    For most victims, the attacker just maintained this quiet background access. But for a smaller number of accounts, they also changed the victim’s password and MFA settings. That way, even after the original stolen token expired or was revoked, they still “owned” the account.

    The real goal of the campaign

    Once inside the victim’s email account, the attackers search the compromised mailbox for references to payroll, HR, and finance, then send an email from the victim’s account to the organization’s HR staff requesting a “direct deposit” change.

    Because the email comes from the employee’s real address, HR has no reason for suspicion and if they comply and file the change, the employee’s next paycheck will go to the attacker’s bank account instead the victim’s-

    Before sending the email to HR or the finance department, the attackers create an inbox rule that silently buries any HR replies containing words like “bank” or “direct deposit” in a hidden folder, so the victim won’t see them and raise the alarm.

    “Where Storm-2755 was unable to successfully achieve changes to payroll information through user impersonation and social engineering of HR personnel, we observed a pivot to direct interaction and manual manipulation of HR software-as-a-service (SaaS) programs such as Workday,” Microsoft added.

    In one successful attack, Storm-2755 manually signed in to Workday as the victim to update banking information and that employee suffered direct financial loss.

    How to stymie “payroll pirate” attacks

    This particular campaign was focused on compromising employees in Canada, but similar campaigns are constantly mounted to target employees in other countries and/or working in companies operating in specific economic sectors.

    Microsoft recommends using FIDO2/WebAuthn passkeys as the second authentication factor, as they bind authentication to the legitimate origin site and cannot be intercepted by an AiTM proxy the way traditional push or OTP-based MFA can.

    Beyond that, organizations should monitor for the Axios user-agent appearing in sign-in logs, watch for non-interactive sign-ins to OfficeHome repeating on roughly 30-minute intervals, and alert on newly created inbox rules that filter on financial keywords.

    HR and payroll teams should also adopt out-of-band verification (e.g., a phone call or in-person confirmation) for any direct deposit change requests.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    Lead Office paychecks poisoned Results Search stolen
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleNotify for Amazfit & Zepp 21.8.6 APK Download by OneZeroBit
    Next Article This open-source Android journal app laid out my entire year on a timeline, and I love it
    admin
    • Website

    Related Posts

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    Why Your Search Data Doesn’t Agree (And What To Do About It)

    April 16, 2026

    GitHub lays out copyright liability changes and upcoming DMCA review for developers

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    4 reasons I use a 19-year-old app to copy and move files in Windows

    April 16, 2026

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    Why Your Search Data Doesn’t Agree (And What To Do About It)

    April 16, 2026

    Opera’s browsers just picked up a new AI feature that’s actually useful

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,342)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (822)
    • Tech Tools & Mobile / Apps (1,605)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    4 reasons I use a 19-year-old app to copy and move files in Windows

    April 16, 2026

    UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

    April 16, 2026

    Why Your Search Data Doesn’t Agree (And What To Do About It)

    April 16, 2026
    Most Popular
    • 4 reasons I use a 19-year-old app to copy and move files in Windows
    • UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
    • Why Your Search Data Doesn’t Agree (And What To Do About It)
    • Opera’s browsers just picked up a new AI feature that’s actually useful
    • GitHub lays out copyright liability changes and upcoming DMCA review for developers
    • Mi Browser 14.54.0-gn APK Download by Zhigu Corporation Limited
    • New AgingFly malware used in attacks on Ukraine govt, hospitals
    • Capsule Security Emerges From Stealth With $7 Million in Funding
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.