Payroll Pirate Attacks Target Microsoft Canada

Storm-2755 isn't just phishing passwords—they're replaying full sessions to siphon salaries straight from HR systems. Microsoft's wake-up call hits close to home for every tech worker.

Payroll Pirates Steal Microsoft Salaries in Canada: The AiTM Hijack Exposed — theAIcatchup

Key Takeaways

  • Storm-2755 uses AiTM to bypass MFA and hijack Microsoft Canadian salaries via session replay.
  • Microsoft recommends phishing-resistant MFA and legacy auth blocks to counter these payroll pirate attacks.
  • FBI reports $3B+ in BEC losses last year; expect escalation without enterprise-wide hardening.

Picture this: a Vancouver developer clicks a top Google search result for Microsoft 365 login, and just like that, his direct deposit vanishes into a pirate’s pocket.

Payroll pirate attacks have struck Microsoft Canada’s workforce, with financially motivated hackers—tracked as Storm-2755—hijacking employee accounts to redirect salaries. It’s not some vague threat; it’s precise, session-stealing malice pushed through malvertising and SEO poisoning.

These crooks craft fake Microsoft 365 sign-in pages on domains like bluegraintours[.]com, luring victims who end up handing over authentication tokens and session cookies. Boom—multifactor authentication? Bypassed. No password guessing required.

How Do Payroll Pirates Bypass Your MFA?

Here’s the tech breakdown, straight from Microsoft’s playbook. Attackers run adversary-in-the-middle (AiTM) frameworks that proxy the whole login flow live.

“Rather than harvesting only usernames and passwords, AiTM frameworks proxy the entire authentication flow in real time, enabling the capture session cookies and OAuth access tokens issued upon successful authentication,” Microsoft explained. “Due to these tokens representing a fully authenticated session, threat actors can reuse them to gain access to Microsoft services without being prompted for credentials or MFA, effectively bypassing legacy MFA protections not designed to be phishing-resistant.”

That quote nails it. Legacy MFA—think SMS codes or app push notifications—crumbles here. Pirates replay the stolen session, slipping into your inbox like ghosts.

Once inside, they don’t stop. Storm-2755 sets up inbox rules to bury HR emails with “direct deposit” or “bank” keywords into junk folders. Sneaky. Then they hunt for payroll threads, firing off phony emails to HR: “Question about direct deposit.” If that flops, they log into Workday themselves and tweak the bank details.

And it’s not isolated. Last October, Microsoft shut down Storm-2657, another crew hitting U.S. university staff since March 2025—same playbook, phishing to AiTM to paycheck theft.

Payroll pirates? They’re BEC scams on steroids, zeroing in on salary wires. FBI’s IC3 logged 24,000+ BEC complaints last year—$3 billion gone. Second only to investment fraud. Market signal: cybercrime pays, handsomely.

Why Microsoft’s Canada Hit Signals Bigger Trouble

Look, Microsoft’s no slouch in threat intel—they track these storms like meteorologists track hurricanes. But here’s my sharp take: this reeks of complacency in enterprise adoption. Companies tout MFA, yet stick with legacy setups vulnerable to AiTM. Stats bear it out—Proofpoint pegs AiTM phishing up 300% year-over-year. Storm-2755 exploits that gap.

Unique angle? Flashback to 2016’s BEC explosion—FBI losses hit $1.3 billion then. Pirates evolved from crude wires to session hijacks, mirroring how ransomware went from crypto-locks to data exfil. Prediction: if adoption of phishing-resistant MFA lags (only 20% of firms per Okta’s latest), we’ll see payroll losses double to $6 billion by 2026. Enterprises, your salaries are the new oil.

Microsoft’s fixes? Block legacy auth protocols. Roll out phishing-resistant MFA—think FIDO2 keys or certificate-based. Spot compromise? Nuke tokens, zap inbox rules, reset creds.

But—here’s the editorial bite—Microsoft’s PR spins this as a tidy disruption tale. Reality? Their own employees got pwned via search-engine tricks. If the mothership can’t fully harden, what hope for mid-market?

Short para for punch: Victims wake up broke.

Now, the market dynamics. Workday, Exchange Online—these are high-value targets because payroll’s automated, high-volume. One hijack nets thousands per employee; scale to dozens, it’s seven figures fast. Insurers are watching—cyber premiums spiked 25% post-BEC surges. Boards, take note: this isn’t IT’s problem; it’s cashflow Armageddon.

Storm-2755’s tactics scream professionalism. Malvertising bids top SERPs; SEO poisoning fakes legit domains. Victims: Canadian Microsoft staff, likely remote-heavy post-pandemic. Broader trend? Universities, tech firms—anywhere HR portals meet wire transfers.

Defenses evolve, sure. Microsoft’s token revocation tools shine here, but rollout’s uneven. BAS platforms—breach and attack simulation—test these paths, proving gaps where MFA fails.

Can Enterprises Stop Payroll Pirates Before They Strike?

Yes, but it demands action over announcements. Ditch SMS MFA yesterday. Enforce conditional access policies tying logins to device trust. Hunt inbox rules weekly—simple PowerShell script does it.

Train HR on spear-phish recognition, but don’t bet the farm on humans. Automate anomaly detection: flag logins from Toronto to Timbuktu.

And the data point sealing my skepticism? FBI’s $3B isn’t hype—it’s audited claims. Pirates don’t discriminate; they scale.

One-word warning: Accelerate.

Dense dive: Consider the chain. Step one, poisoned search—Google’s ad auction favors spenders, pirates bid big. Victim authenticates, tokens captured mid-flight. Replay to O365, rules deployed, social engineering or direct Workday edit. Exit with payday. Each link’s a market inefficiency—search giants profit from crime vectors; MFA vendors sell yesterday’s tech. Fix? Platform liability, maybe.

Historical parallel: Like the 419 Nigerian princes morphing to BEC pros. Storm groups are cartels now, specializing.


🧬 Related Insights

Frequently Asked Questions

What are payroll pirate attacks?

They’re BEC variants where hackers hijack employee or HR accounts to reroute direct deposits, often via AiTM phishing bypassing MFA.

How do AiTM attacks steal Microsoft 365 sessions?

Fake login pages proxy your real authentication, grabbing session cookies and tokens for replay without re-entering creds.

How can I protect my company from payroll pirates?

Switch to phishing-resistant MFA, block legacy auth, monitor inbox rules, and revoke sessions on any red flags.

James Kowalski
Written by

Investigative tech reporter focused on AI ethics, regulation, and societal impact.

Frequently asked questions

What are payroll pirate attacks?
They're BEC variants where hackers hijack employee or HR accounts to reroute direct deposits, often via AiTM phishing bypassing MFA.
How do AiTM attacks steal Microsoft 365 sessions?
Fake login pages proxy your real authentication, grabbing session cookies and tokens for replay without re-entering creds.
How can I protect my company from payroll pirates?
Switch to phishing-resistant MFA, block legacy auth, monitor inbox rules, and revoke sessions on any red flags.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.