Microsoft Warns Of ‘payroll Pirate’ Crew Looting Us University Salaries
Microsoft’s Threat Intelligence team has sounded the alarm over a new financially-motivated cybercrime spree that is raiding US university payroll systems.
In a blog post, Redmond said a cybercrime crew it tracks as Storm-2657 has been targeting university employees since March 2025, hijacking salaries by breaking into HR software such as Workday.
The attack is as audacious as it is simple: compromise HR and email accounts, quietly change payroll settings, and redirect pay packets into attacker-controlled bank accounts. Microsoft has dubbed the operation “payroll pirate,” a nod to the way crooks plunder staff wages without touching the employer’s systems directly.
Storm-2657’s campaign begins with phishing emails designed to harvest multifactor authentication (MFA) codes using adversary-in-the-middle (AiTM) techniques. Once in, the attackers breach Exchange Online accounts and insert inbox rules to hide or delete HR messages. From there, they use stolen credentials and SSO integrations to access Workday and tweak direct deposit information, ensuring that future payments go straight to them.
Microsoft stresses that the attacks don’t exploit a flaw in Workday itself. The weak points are poor MFA hygiene and sloppy configurations, with Redmond warning that organizations still relying on legacy or easily-phished MFA are sitting ducks.
“Since March 2025, we’ve observed 11 successfully compromised accounts at three universities that were used to send phishing emails to nearly 6,000 email accounts across 25 universities,” Microsoft explained. It says these lures were crafted with academic precision: fake HR updates, reports of faculty misconduct, or notes about illness clusters, often linked through shared Google Docs to bypass filtering and appear routine.
In one instance, a phishing message urging recipients to “check their illness exposure status” was sent to 500 people within a single university, and only about 10 percent flagged it as suspicious, according to Microsoft.
After securing access, the attackers add their own phone numbers as MFA devices through compromised profiles or Duo settings, ensuring subsequent approvals land in their pockets. The entire process unfolds quietly because the victims never see the altered notifications.
Detecting the scam requires cross-system visibility, something many universities lack. Microsoft advises correlating telemetry between Exchange Online and Workday, and says security teams should watch out for new inbox rules referencing “@myworkday.com,” suspicious MFA enrollments, and Workday events like “Change My Account” or “Manage Payment Elections.”
According to Microsoft, defense starts with ditching passwords altogether and recommends adopting phishing-resistant methods such as FIDO2 keys, passkeys, or Windows Hello. When a compromise is suspected, immediate steps include resetting credentials, removing rogue MFA devices, purging malicious mail rules, and reverting any payroll changes.
It’s time for universities, and any large employer, to batten down their MFA hatches before the next payday walks the plank. ®
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.