Microsoft: Canadian employees targeted in payroll pirate attacks
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,理解主要信息。 文章讲的是一个网络攻击者Storm-2755通过钓鱼和中间人攻击窃取加拿大员工的工资。他们使用恶意的Microsoft 365登录页面来获取认证令牌和会话cookie,绕过了多因素认证。然后,攻击者创建规则隐藏人力资源邮件,并发送邮件诱骗员工更新银行信息,甚至直接登录HR系统修改工资发放信息。 接下来,我需要提炼关键点:攻击者是谁?用了什么方法?目标是什么?结果如何?以及微软的建议措施。 然后,我要把这些信息浓缩成简洁的句子,确保不超过100字。可能需要合并一些细节,比如提到恶意登录页面、绕过MFA、窃取工资等。 最后,检查语言是否流畅,是否涵盖了所有重要信息,同时保持简洁明了。 </think> 网络攻击者Storm-2755通过钓鱼和中间人攻击窃取加拿大员工工资。利用恶意Microsoft 365登录页面获取认证令牌和会话cookie,绕过多因素认证。攻击者隐藏人力资源邮件并诱骗员工更新银行信息或直接修改工资发放信息。微软建议采用防钓鱼多因素认证加强防御。 2026-4-10 12:1:55 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

Canada hackers

A financially motivated threat actor tracked as Storm-2755 is stealing Canadian employees' salary payments after hijacking their accounts in payroll pirate attacks.

The attackers used malicious Microsoft 365 sign-in pages to steal victims' authentication tokens and session cookies by redirecting them to domains (e.g., bluegraintours[.]com) hosting malicious web pages (pushed to the top of search engine results through malvertising or SEO poisoning) that masqueraded as Microsoft 365 sign-in forms.

This allowed Storm-2755 to bypass multifactor authentication (MFA) in adversary‑in‑the‑middle (AiTM) attacks by replaying stolen session tokens rather than re-authenticating.

Wiz

"Rather than harvesting only usernames and passwords, AiTM frameworks proxy the entire authentication flow in real time, enabling the capture session cookies and OAuth access tokens issued upon successful authentication," Microsoft explained.

"Due to these tokens representing a fully authenticated session, threat actors can reuse them to gain access to Microsoft services without being prompted for credentials or MFA, effectively bypassing legacy MFA protections not designed to be phishing-resistant."

Storm-2755 attack flow
Storm-2755 attack flow (Microsoft)

After gaining access to an employee's account, the attacker created inbox rules that automatically moved messages from human resources staff containing the words "direct deposit" or "bank" to hidden folders, preventing the victim from seeing the correspondence.

In the next stage, they searched for "payroll," "HR," "direct deposit," and "finance," then sent emails to human resources staff with the subject line "Question about direct deposit" to trick staff into updating banking information.

​Where social engineering failed, the attacker logged directly into HR software platforms such as Workday, using the stolen session to manually update direct deposit details.

Storm-2755 emailing HR staff
Storm-2755 emailing HR staff (Microsoft)

To harden defenses against AiTM and payroll pirate attacks, Microsoft advises defenders to block legacy authentication protocols and implement phishing-resistant MFA.

If any signs of compromise are detected, they should also revoke compromised tokens and sessions immediately, remove malicious inbox rules, and reset MFA methods and credentials for all affected accounts.

In October, Microsoft disrupted another pirate payroll campaign targeting Workday accounts since March 2025, in which a cybercrime gang tracked as Storm-2657 targeted university employees across the United States to hijack their salary payments.

​In these attacks, Storm-2657 breached the targets' accounts via phishing emails and stole MFA codes using AITM tactics, which allowed the threat actors to compromise the victims' Exchange Online accounts.

Payroll pirate attacks are a variant of business email compromise (BEC) scams that target businesses and individuals who regularly make wire transfers. Last year, the FBI's Internet Crime Complaint Center (IC3) recorded over 24,000 BEC fraud complaints, resulting in losses exceeding $3 billion, making it the second most lucrative crime type behind investment scams.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/microsoft/microsoft-canadian-employees-targeted-in-payroll-pirate-attacks/
如有侵权请联系:admin#unsafe.sh