Poisoned Office 365 Searches Steal Paychecks

A single mistyped search for Office 365, and your paycheck could land in a hacker's pocket. Microsoft's Storm-2755 crew pulls off payroll heists with chilling precision.

Hackers Poison Office 365 Searches to Siphon Canadian Paychecks — theAIcatchup

Key Takeaways

  • Storm-2755 poisons Office 365 searches to proxy sessions and steal paychecks via HR emails.
  • AiTM bypasses standard MFA; switch to FIDO2 passkeys for real protection.
  • Monitor logs for Axios agents and inbox rules hiding financial keywords.

Picture this: it’s Friday afternoon in Toronto, you’re rushing to check that last email before payday, fingers flying over ‘Office 365 login’ — and bam, your direct deposit? Gone, rerouted to some thief in the shadows.

That’s no thriller plot. It’s the stark reality Microsoft just uncovered with Storm-2755, a crew so slick they’re turning everyday Google hunts into multimillion paycheck piracy.

And here’s the kicker — they’re not blasting phishing emails like it’s 2010. No, these guys poison search results and malvertise against typos like “Office 265.” Click. Fake Microsoft page. Boom.

How Does a Typo Become Theft?

Victims hit a mirror-site login that doesn’t just snag your password — it proxies your whole session, live. Grabs that precious token post-MFA. Stays glued, invisible.

Microsoft’s team nailed it: > “Storm-2755 use version 1.7.9 of the Axios HTTP client to relay authentication tokens to the customer infrastructure which effectively bypassed non-phishing resistant MFA and preserved access without requiring repeated sign ins. This replay flow allowed Storm-2755 to maintain these active sessions and proxy legitimate user actions, effectively executing an AiTM attack.”

AiTM. Adversary-in-the-Middle. Think man-in-the-middle, but evolved — a shadow puppeteer yanking your digital strings while you think you’re solo.

Most times, they lurk. Quiet access. But for prime targets? Password swap. MFA rewrite. Locked in forever.

Then the real magic — or nightmare. They rifle your inbox for ‘payroll,’ ‘HR,’ ‘finance.’ Craft an email from your account to bosses: “Hey, update my direct deposit to this new bank, please.” HR sees legit sender. Approves. Next check? Attacker’s wallet.

Sneaky twist: inbox rule drops HR replies — anything with ‘bank’ or ‘deposit’ — into oblivion. Victim clueless.

Failed social engineering? No sweat. They pivot to Workday logins, tweak banking direct. One Canadian employee learned that the hard way: actual cash lost.

Why Can’t MFA Stop These Payroll Pirates?

You’re thinking, “But I have MFA! App pushes! OTPs!” Yeah, about that.

Traditional MFA? Useless here. AiTM proxies snag the token after approval. It’s like handing your house keys to a locksmith who clones them mid-unlock — you’re none the wiser.

Storm-2755 loves Canada now, but tomorrow? Your zip code. Energy firms. Tech hubs. It’s a template, baby, ripe for copycats.

My hot take — and it’s one the original report misses: this echoes the 1920s check-kiting gangs in Chicago, forging payroll slips under bank noses. Back then, paper trails. Now? Cloud sessions. But the psychology’s identical — trust the familiar source, skip the double-check. In our AI-fueled future, expect these scams to morph with gen-AI phishing clones, personalizing lures at warp speed. Wake-up call: security’s the new platform war.

Spot the Storm Before It Hits Your Bank

Microsoft’s got playbook fixes. First, ditch push/OTP for FIDO2 passkeys — they glue auth to the real site. AiTM can’t proxy what won’t budge.

Hunt logs for Axios 1.7.9 user-agents. Flag 30-minute Office sign-in repeats. Alert on inbox rules hiding ‘direct deposit.’

HR? Mandate phone confirms for changes. Out-of-band. No exceptions.

Organizations, layer up. Train on search smarts — bookmark legit logins. Zero-trust everything. Because in this shift to AI-everywhere, one poisoned click’s your undoing.

But wait — wonder this: as AI platforms explode, imagine defenses flipping the script. AI sentinels sniffing anomalous sessions in real-time, auto-revoking tokens. We’re on the cusp. Storm-2755? Just the appetizer.

Energy surges here. Pace yourself — secure now, thrive later.

What Makes This Attack So Damn Clever?

Short answer: seamlessness.

No red flags. Legit-looking ads. Pixel-perfect fakes. Session hijacks that feel native.

They burrow, wait, strike surgically. Not spray-and-pray ransomware. Precision payroll jacking.

And when HR bites? Silent burial of replies. Victim silence till payday shock.

Pivot to SaaS like Workday? Genius escalation.

It’s cybercrime as high art — or low theft, depending on your bank balance.


🧬 Related Insights

Frequently Asked Questions

Will poisoned Office 365 searches affect me outside Canada?

Absolutely — tactics are portable. Any employee with email/payroll access is game.

How do I know if I’m hit by AiTM attacks?

Check sign-in logs for odd user-agents, repeated non-interactive logins, or mystery inbox rules.

Can passkeys really stop paycheck theft?

Yes — FIDO2 binds to legit sites, blocking proxies cold. Upgrade now.

James Kowalski
Written by

Investigative tech reporter focused on AI ethics, regulation, and societal impact.

Frequently asked questions

Will poisoned Office 365 searches affect me outside Canada?
Absolutely — tactics are portable. Any employee with email/payroll access is game.
How do I know if I'm hit by <a href="/tag/aitm-attacks/">AiTM attacks</a>?
Check sign-in logs for odd user-agents, repeated non-interactive logins, or mystery inbox rules.
Can passkeys really stop paycheck theft?
Yes — FIDO2 binds to legit sites, blocking proxies cold. Upgrade now.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by HelpNet Security

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.