Alert: 'Payroll Pirate' Hackers Target Universities - Protect Your Salary! (2025)

Imagine waking up to find your paycheck has been stolen, not by a masked thief, but by a sophisticated cybercriminal hiding behind a screen. This is the chilling reality for university employees across the United States, who are falling victim to a cunning new wave of cyberattacks dubbed "payroll pirate" scams. Since March 2025, a cybercrime gang known as Storm-2657 has been hijacking salary payments, leaving institutions and individuals reeling.

But here's where it gets even more alarming: Microsoft Threat Intelligence analysts have uncovered that these attackers are specifically targeting Workday accounts, a popular human resources (HR) platform used by many universities. However, the threat doesn't stop there. Other third-party HR software-as-a-service (SaaS) platforms could also be vulnerable to these attacks. And this is the part most people miss: it's not a flaw in the software itself, but rather the attackers' clever use of social engineering and the lack of robust security measures like multifactor authentication (MFA) that's enabling these heists.

In a recent report, Microsoft revealed that they've identified 11 compromised accounts across three universities, which were used to launch phishing campaigns targeting nearly 6,000 email accounts at 25 institutions (https://www.microsoft.com/en-us/security/blog/2025/10/09/investigating-targeted-payroll-pirate-attacks-affecting-us-universities/). The attackers employ a variety of tactics, from fake warnings about campus health crises to fabricated reports of faculty misconduct, all designed to trick recipients into clicking malicious links.

Here's the controversial part: while universities are often seen as bastions of knowledge and security, these attacks expose a glaring vulnerability in their digital defenses. Are institutions doing enough to protect their employees' financial well-being? The attackers don't just stop at stealing paychecks; they also manipulate email rules to delete warning notifications, alter salary payment configurations, and even enroll their own phone numbers as MFA devices to maintain access. This level of sophistication raises questions about the effectiveness of current cybersecurity measures.

Once inside, the threat actors use the compromised accounts to spread their phishing campaigns further, both within the affected organizations and to other universities. Microsoft has been working to identify and assist affected customers, providing guidance on investigating these attacks and implementing phishing-resistant MFA to bolster defenses.

These "payroll pirate" attacks are a sinister twist on the well-known business email compromise (BEC) scams (https://www.bleepingcomputer.com/tag/bec/), which have already caused billions in losses. In 2024 alone, the FBI's Internet Crime Complaint Center (IC3) recorded over 21,000 BEC fraud complaints, resulting in losses exceeding $2.7 billion (https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf). However, these figures likely only scratch the surface, as many cases go unreported.

As the cybersecurity landscape evolves, events like the Picus BAS Summit (https://hubs.li/Q03LvVKm0) are more crucial than ever. This summit offers a unique opportunity to learn from top experts and explore how AI-powered breach and attack simulation (BAS) is revolutionizing security validation. Don't miss this chance to future-proof your security strategy and stay one step ahead of cybercriminals.

So, what do you think? Are universities doing enough to protect their employees from these sophisticated attacks? Or is it time for a radical rethink of cybersecurity measures in the education sector? Share your thoughts in the comments below and let's spark a conversation about how we can collectively combat this growing threat.

Alert: 'Payroll Pirate' Hackers Target Universities - Protect Your Salary! (2025)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Van Hayes

Last Updated:

Views: 5645

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Van Hayes

Birthday: 1994-06-07

Address: 2004 Kling Rapid, New Destiny, MT 64658-2367

Phone: +512425013758

Job: National Farming Director

Hobby: Reading, Polo, Genealogy, amateur radio, Scouting, Stand-up comedy, Cryptography

Introduction: My name is Van Hayes, I am a thankful, friendly, smiling, calm, powerful, fine, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.