Security

Storm-2755 Payroll Attacks Hit Canadian Employees

3 min read

Summary

Microsoft has detailed a financially motivated Storm-2755 campaign targeting Canadian employees with payroll diversion attacks. The threat actor used SEO poisoning, malvertising, and adversary-in-the-middle techniques to steal sessions, bypass legacy MFA, and alter direct deposit details, making phishing-resistant MFA and session monitoring critical defenses.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Storm-2755 payroll attacks target Canadian employees

Introduction

Microsoft Incident Response has published new findings on Storm-2755, a threat actor running so-called payroll pirate attacks against Canadian users. For IT and security teams, this campaign is notable because it combines SEO poisoning, malvertising, and adversary-in-the-middle (AiTM) phishing to hijack authenticated sessions and redirect employee salary payments.

This matters beyond Canada: the tradecraft can be reused against any organization that relies on Microsoft 365 and online HR or payroll platforms.

What’s new

Microsoft says Storm-2755 used a distinct attack chain focused on broad geographic targeting of Canadian users, rather than a single industry.

Key techniques observed

  • SEO poisoning and malvertising pushed victims to attacker-controlled domains from searches like “Office 365” and similar misspellings.
  • Victims were sent to a fake Microsoft 365 sign-in page designed to steal credentials and session tokens.
  • The actor used AiTM techniques to capture session cookies and OAuth tokens, allowing them to bypass non-phishing-resistant MFA.
  • Microsoft observed suspicious Axios 1.7.9 user-agent activity and linked the flow to known Axios-related abuse, including CVE-2025-27152 concerns.
  • After access, Storm-2755 searched for payroll and HR-related resources, then impersonated employees with emails such as “Question about direct deposit.”
  • In some cases, the actor also created inbox rules to hide messages containing terms like “direct deposit” or “bank.”

Impact on administrators and organizations

The most immediate risk is direct financial loss. Once an account is compromised, the attacker can use legitimate sessions to blend into normal business activity, making detection harder.

Admins should also note that traditional MFA is not always enough against token theft. Because AiTM attacks replay authenticated sessions, organizations relying on legacy MFA methods may still be exposed.

What IT teams should do next

Microsoft recommends prioritizing mitigations that reduce token replay and phishing success.

Action items

  • Deploy phishing-resistant MFA, such as FIDO2/WebAuthn.
  • Review sign-in logs for error 50199, unusual session continuity, and Axios user-agent activity.
  • Monitor for repeated non-interactive sign-ins to apps like OfficeHome, Outlook, My Sign-Ins, and My Profile.
  • Audit inbox rules for keywords related to banking or direct deposit.
  • Investigate suspicious access to HR and payroll platforms such as Workday.
  • Revoke active session tokens and reset credentials for suspected compromised accounts.
  • Educate users about search-result phishing and fake Microsoft 365 login pages.

Bottom line

Storm-2755 shows how modern phishing campaigns are evolving from simple credential theft to session hijacking with real financial impact. Organizations using Microsoft 365 should review phishing-resistant authentication, strengthen monitoring for anomalous sign-in behavior, and coordinate security and HR teams on payroll change verification processes.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Storm-2755AiTM phishingMicrosoft 365payroll fraudMFA

Related Posts

Security

@antv npm Attack Hits CI/CD Secrets and Tokens

Microsoft has disclosed an active supply chain attack involving compromised @antv npm packages that used malicious preinstall scripts to steal credentials from GitHub Actions and other CI/CD environments. The campaign matters because it spread through popular downstream dependencies, putting developer pipelines, cloud secrets, and software supply chains at risk.

Security

Microsoft Gaming Security: Key Risks and Defenses

Microsoft’s latest Deputy CISO post explains why securing gaming requires a different approach than traditional enterprise IT. The company outlines the distinct risks across gaming platforms, studios, and shared central teams, and highlights how Entra ID, Purview, Defender for Cloud, and Sentinel help balance security with player experience and developer agility.

Security

Microsoft RAMPART and Clarity Open-Sourced

Microsoft has open-sourced RAMPART and Clarity, two tools aimed at improving safety in agentic AI development. RAMPART brings repeatable adversarial and regression testing into CI pipelines, while Clarity helps teams challenge design assumptions early before code is written.

Security

Fox Tempest Malware Signing Service Disrupted

Microsoft has disrupted Fox Tempest, a malware-signing-as-a-service operation that helped cybercriminals make ransomware and other malware appear legitimately signed. The takedown matters because the group abused Microsoft Artifact Signing, created more than 1,000 fraudulent certificates, and enabled attacks that could bypass security controls more easily.

Security

Storm-2949 Cloud Breach: Entra ID to Azure Attack

Microsoft detailed how Storm-2949 turned a socially engineered Microsoft Entra ID compromise into broad data theft across Microsoft 365 and Azure. The case highlights how identity attacks can escalate quickly through legitimate cloud management features, making stronger MFA controls, monitoring, and cross-platform detections critical for defenders.

Security

Microsoft Security for SMBs in an AI-Powered World

Microsoft is urging small and medium businesses to treat cybersecurity as a core business risk as AI makes phishing, malware, and identity attacks faster and more effective. The company highlights Microsoft 365 Business Premium and integrated security controls as a practical way for growing businesses to protect users, devices, email, and cloud apps without adding major complexity.