CYBERSECURITY
Universities Hit by Sophisticated Payroll Phishing Scams
Microsoft details Storm-2657 cybercriminals' phishing campaign, targeting thousands at universities to steal payroll credentials and divert funds.
- Read time
- 6 min read
- Word count
- 1,204 words
- Date
- Oct 25, 2025
Summarize with AI
A sophisticated phishing campaign, dubbed Storm-2657 by Microsoft Threat Intelligence, is actively targeting universities across the United States. These cybercriminals employ highly convincing emails to trick staff into revealing their login credentials, primarily for human resources platforms like Workday. Once access is gained, attackers silently alter payroll settings and redirect salary payments to their own accounts. The campaign leverages compromised internal accounts to spread further, highlighting a significant threat from social engineering and the need for robust security measures, including strong multi-factor authentication and vigilant monitoring.

🌟 Non-members read here
Rising Threat: Payroll Phishing Attacks Target University Staff
A new wave of cyberattacks, identified as Storm-2657 by Microsoft Threat Intelligence, is specifically targeting universities across the United States. These financially motivated threat actors are employing sophisticated phishing techniques to compromise human resources and payroll systems, primarily focusing on platforms such as Workday, although other HR software could also be at risk. The attackers’ strategy leverages social engineering to gain unauthorized access to employee accounts, ultimately aiming to divert payroll funds.
The initial stage of these attacks involves carefully crafted phishing emails designed to appear highly legitimate and create a sense of urgency. Some messages falsely warn of campus-wide illness outbreaks, while others suggest a faculty member is under investigation, compelling recipients to review documents immediately. In other instances, emails impersonate high-ranking university officials, like the president or members of the human resources department, disseminating “important” updates about compensation and benefits to lull recipients into a false sense of security.
These deceptive emails contain malicious links that, when clicked, redirect users to fake login pages. These pages are designed to capture login credentials and multi-factor authentication (MFA) codes in real time using advanced adversary-in-the-middle techniques. Once an unsuspecting staff member enters their information, the attackers gain immediate access to the account, effectively mimicking the legitimate user. This allows them to bypass security measures and operate within the system undetected.
Upon gaining control of an account, the hackers swiftly establish inbox rules to automatically delete any Workday notifications. This ensures that the victims remain unaware of crucial alerts regarding changes to their profiles. With these stealth measures in place, the attackers proceed to modify payroll settings, adjusting salary payment instructions and redirecting funds to bank accounts under their control, all without immediate suspicion from the affected employee. This intricate method highlights the precision and planning involved in these sophisticated cyber operations.
The Broad Reach of Compromised Accounts and Persistent Access
The scope of these attacks extends beyond individual accounts. Once a single mailbox is compromised, the attackers leverage it as a launchpad to expand their campaign. Microsoft reports that from a mere 11 compromised accounts across three distinct universities, Storm-2657 was able to send phishing emails to nearly 6,000 email addresses spanning 25 different institutions. This demonstrates the rapid propagation potential when internal, trusted accounts are weaponized.
By originating emails from seemingly legitimate internal university accounts, the phishing messages gain a significant credibility boost, dramatically increasing the likelihood that recipients will engage with the malicious content. This internal propagation method exploits the trust inherent within organizational communication, making it harder for individuals to discern genuine messages from fraudulent ones. The attackers effectively use the university’s own infrastructure against its staff.
To maintain long-term access and control, the cybercriminals often enroll their own phone numbers as legitimate MFA devices. This can be achieved either through direct manipulation of Workday profiles or by exploiting vulnerabilities in existing Duo MFA setups. Such a tactic grants them persistent access to compromised accounts, enabling them to approve future malicious actions without needing to re-engage in further phishing attempts. This strategy, combined with the deceptive inbox rules that hide notifications, allows them to operate undetected for extended periods, maximizing their illicit gains.
Microsoft emphasizes that these attacks do not stem from a flaw or vulnerability within Workday’s software itself. Instead, the success of Storm-2657 relies heavily on social engineering tactics, the absence of robust phishing-resistant multi-factor authentication, and the clever manipulation of internal system configurations. Essentially, the primary threat emerges from human behavior and insufficient protective measures rather than inherent software bugs. This distinction is crucial for organizations seeking to bolster their defenses against such targeted campaigns.
Safeguarding Personal and Payroll Data from Cyber Threats
Protecting oneself from the pervasive threat of payroll and phishing scams requires a proactive and multi-faceted approach. By implementing a few diligent steps, individuals can significantly fortify their defenses against attackers attempting to infiltrate their accounts or steal sensitive personal information. Awareness and vigilance are key components in this ongoing battle against cybercrime.
One critical measure involves limiting the personal information readily available online. Scammers often scour the internet for data that helps them craft highly convincing and targeted phishing messages. Services designed to monitor and remove personal data from various online platforms can effectively reduce this exposure, making it considerably more challenging for attackers to create personalized and believable email scams. While no service can guarantee the complete erasure of all personal data from the internet, utilizing a reputable data removal service can provide a crucial layer of protection. These services often perform continuous monitoring and systematically work to delete personal details from hundreds of websites. By minimizing available information, the risk of scammers cross-referencing data from past breaches with publicly accessible information is greatly diminished, thereby hindering their ability to effectively target individuals.
Essential Security Practices for University Staff
Another fundamental step is to exercise extreme caution when encountering emails that appear to originate from human resources departments or university leadership, particularly those discussing payroll, benefits, or other urgent matters. It is imperative to refrain from clicking any links or downloading attachments unless absolute certainty of their legitimacy exists. Even minor errors in judgment can provide attackers with the opening they need to compromise accounts. To bolster this defense, installing comprehensive antivirus software across all devices is highly recommended. Such protection not only safeguards against malware but also provides alerts for potential phishing emails and ransomware schemes, ensuring the safety of personal information and digital assets.
For any email that references salary adjustments or demands immediate action, the safest course of action is to directly contact the human resources office or the sender through established and independently verified contact information. Phishing emails are expertly designed to induce panic and provoke hasty decisions. Taking a moment to verify the request through official channels can effectively neutralize these malicious attempts. This simple verification step can halt attackers in their tracks before they achieve their objectives.
Furthermore, it is paramount to avoid reusing passwords across multiple online accounts. Cybercriminals frequently attempt to exploit credentials stolen in one data breach to gain access to other accounts where the same password might have been used. A robust password manager can generate strong, unique passwords for each account and store them securely, eliminating the need to remember dozens of complex combinations. Many leading password managers also include built-in breach scanners that can check whether an email address or password has appeared in known data leaks. If a match is found, it is crucial to immediately change any compromised passwords and secure those accounts with new, distinct credentials.
Finally, adding an extra layer of security through two-factor authentication (2FA) on all supported accounts is highly advisable. With 2FA enabled, even if an attacker manages to steal a password, they will be unable to log in without the second verification step, such as a temporary code sent to a mobile phone. Despite adhering to all these precautions, it remains vital to regularly monitor all financial and online accounts for any unusual or unauthorized activity. Swiftly identifying and addressing suspicious transactions can prevent significant financial losses and alert individuals to potential scams before they escalate further, providing an early warning system against ongoing threats.