Security

Storm-2755 Payroll Attacks Hit Canadian Employees

3 min read

Summary

Microsoft has detailed a financially motivated Storm-2755 campaign targeting Canadian employees with payroll diversion attacks. The threat actor used SEO poisoning, malvertising, and adversary-in-the-middle techniques to steal sessions, bypass legacy MFA, and alter direct deposit details, making phishing-resistant MFA and session monitoring critical defenses.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Storm-2755 payroll attacks target Canadian employees

Introduction

Microsoft Incident Response has published new findings on Storm-2755, a threat actor running so-called payroll pirate attacks against Canadian users. For IT and security teams, this campaign is notable because it combines SEO poisoning, malvertising, and adversary-in-the-middle (AiTM) phishing to hijack authenticated sessions and redirect employee salary payments.

This matters beyond Canada: the tradecraft can be reused against any organization that relies on Microsoft 365 and online HR or payroll platforms.

What’s new

Microsoft says Storm-2755 used a distinct attack chain focused on broad geographic targeting of Canadian users, rather than a single industry.

Key techniques observed

  • SEO poisoning and malvertising pushed victims to attacker-controlled domains from searches like “Office 365” and similar misspellings.
  • Victims were sent to a fake Microsoft 365 sign-in page designed to steal credentials and session tokens.
  • The actor used AiTM techniques to capture session cookies and OAuth tokens, allowing them to bypass non-phishing-resistant MFA.
  • Microsoft observed suspicious Axios 1.7.9 user-agent activity and linked the flow to known Axios-related abuse, including CVE-2025-27152 concerns.
  • After access, Storm-2755 searched for payroll and HR-related resources, then impersonated employees with emails such as “Question about direct deposit.”
  • In some cases, the actor also created inbox rules to hide messages containing terms like “direct deposit” or “bank.”

Impact on administrators and organizations

The most immediate risk is direct financial loss. Once an account is compromised, the attacker can use legitimate sessions to blend into normal business activity, making detection harder.

Admins should also note that traditional MFA is not always enough against token theft. Because AiTM attacks replay authenticated sessions, organizations relying on legacy MFA methods may still be exposed.

What IT teams should do next

Microsoft recommends prioritizing mitigations that reduce token replay and phishing success.

Action items

  • Deploy phishing-resistant MFA, such as FIDO2/WebAuthn.
  • Review sign-in logs for error 50199, unusual session continuity, and Axios user-agent activity.
  • Monitor for repeated non-interactive sign-ins to apps like OfficeHome, Outlook, My Sign-Ins, and My Profile.
  • Audit inbox rules for keywords related to banking or direct deposit.
  • Investigate suspicious access to HR and payroll platforms such as Workday.
  • Revoke active session tokens and reset credentials for suspected compromised accounts.
  • Educate users about search-result phishing and fake Microsoft 365 login pages.

Bottom line

Storm-2755 shows how modern phishing campaigns are evolving from simple credential theft to session hijacking with real financial impact. Organizations using Microsoft 365 should review phishing-resistant authentication, strengthen monitoring for anomalous sign-in behavior, and coordinate security and HR teams on payroll change verification processes.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Storm-2755AiTM phishingMicrosoft 365payroll fraudMFA

Related Posts

Security

Android SDK Vulnerability Exposed Millions of Wallets

Microsoft disclosed a severe intent redirection flaw in the third-party EngageSDK for Android, putting millions of crypto wallet users at potential risk of data exposure and privilege escalation. The issue was fixed in EngageSDK version 5.2.1, and the case highlights the growing security risk of opaque mobile app supply-chain dependencies.

Security

DNS Hijacking Attacks via SOHO Routers: Microsoft Warns

Microsoft Threat Intelligence says Forest Blizzard has been compromising vulnerable home and small-office routers to hijack DNS traffic and, in some cases, enable adversary-in-the-middle attacks against targeted connections. The campaign matters to IT teams because unmanaged SOHO devices used by remote and hybrid workers can expose cloud access and sensitive data even when corporate environments remain secure.

Security

Medusa Ransomware: Storm-1175 Targets Web Assets

Microsoft Threat Intelligence warns that Storm-1175 is rapidly exploiting vulnerable internet-facing systems to deploy Medusa ransomware, sometimes within 24 hours of initial access. The group’s focus on newly disclosed flaws, web shells, RMM tools, and fast lateral movement makes patch speed, exposure management, and post-compromise detection critical for defenders.

Security

Device Code Phishing: AI-Driven Campaign Escalates

Microsoft Defender Security Research detailed a large-scale phishing campaign that abuses the OAuth device code flow using AI-generated lures, dynamic code generation, and automated backend infrastructure. The campaign raises the risk for organizations because it improves attacker success rates, bypasses traditional detection patterns, and enables token theft, inbox rule persistence, and Microsoft Graph reconnaissance.

Security

AI Cyberattacks Accelerate Threats Across Attack Chain

Microsoft warns that threat actors are now embedding AI across the full cyberattack lifecycle, from reconnaissance and phishing to malware development and post-compromise operations. For defenders, this means faster, more precise attacks, higher phishing success rates, and a growing need to strengthen identity, MFA protections, and visibility into AI-driven attack surfaces.

Security

PHP Webshells on Linux: Cookie-Controlled Evasion

Microsoft warns that threat actors are using HTTP cookies to control PHP webshells on Linux hosting environments, helping malicious code stay dormant unless specific cookie values are present. The technique reduces visibility in routine logs, supports persistence through cron jobs, and highlights the need for stronger monitoring, web protection, and endpoint detection on hosted Linux workloads.