Storm-2755 and Storm-2657 are conducting payroll pirate attacks targeting Canadian and U.S. university employees. Attackers use Microsoft 365 phishing pages (malvertising/SEO poisoning) to steal session tokens via AiTM attacks, bypass MFA, and manipulate inbox rules or HR software (e.g., Workday) to divert salary payments. Microsoft highlights phishing-resistant MFA and token revocation as mitigations. Historical BEC losses exceed $3B annually.
| IOC Type | Value | Description | Relevant MITRE ATT&CK Techniques |
|---|---|---|---|
| Domain |
bluegraintours[.]com
|
Malicious domain hosting phishing pages impersonating Microsoft 365 login | T1566.001 |
| Code | Title |
|---|---|
| T1566.001 | Phishing: Spearphishing Attachment - Phishing (malicious sign-in pages) |
| T1426.001 | Acquisition of Sharing Tokens (session/OAuth token theft) |
| T1078.002 | Public-Facing Application Abuse (Exploiting Microsoft 365/Workday) |
| T1558.002 | Account Manipulation (inbox rule changes, payroll edits) |
| Type | Value |
|---|---|
| Company | Universities (Workday users) |
| Country | Canada |
| Country | United States |
| Other | Employees targeted via payroll/HR systems |
| Sector | Education |
| Sector | Finance, Education |
A financially motivated threat actor tracked as Storm-2755 is stealing Canadian employees' salary payments after hijacking their accounts in payroll pirate attacks. The attackers used malicious Microsoft 365 sign-in pages to steal victims' authentication tokens and session cookies by redirecting them to domains (e.g.,
Storm-2755 emailing HR staff (Microsoft) To harden defenses against AiTM and payroll pirate attacks, Microsoft advises defenders to block legacy authentication protocols and implement phishing-resistant MFA. If any signs of compromise are detected, they should also revoke compromised tokens and sessions immediately, remove malicious inbox rules, and reset MFA methods and credentials for all affected accounts. In October, Microsoft disrupted another pirate payroll campaign targeting Workday accounts since March 2025, in which a cybercrime gang tracked as Storm-2657 targeted university employees across the