Newsclip — Social News Discovery

Business

Cybercriminals Target University Payroll in Massive Phishing Scam

October 25, 2025
  • #Cybersecurity
  • #PhishingScam
  • #HigherEducation
  • #PayrollFraud
  • #DataProtection
0 views0 comments
Cybercriminals Target University Payroll in Massive Phishing Scam

Understanding the Storm-2657 Attacks

Since March 2025, U.S. universities have been under siege from a sophisticated phishing campaign orchestrated by a group known as Storm-2657. Microsoft Threat Intelligence has revealed that roughly 6,000 email addresses across 25 institutions were targeted, principally through a tactic known as "pirate payroll" attacks.

“This is not just a tech issue; it has a direct impact on the livelihood of university staff,” says Microsoft researchers.

How the Scam Operates

The modus operandi of Storm-2657 involves sending highly convincing emails that appear to be legitimate communications from university officials. For instance, some messages claim there is an outbreak of illness on campus, prompting recipients to check important documents, while others may suggest that an employee is under investigation. This sense of urgency serves to bypass the rational skepticism that employees might typically feel.

Crafting the Phishing Emails

The phishing emails are carefully crafted to reflect a true university crisis, enticing unsuspecting staff members to follow links designed to capture their login information. These links often record login credentials and multi-factor authentication (MFA) codes in real-time using an adversary-in-the-middle technique.

Consequences of the Breach

Once an attacker gains access to a staff member's account, they typically set up inconspicuous rules that delete notifications about any changes originating from Workday, allowing them to modulate payroll profiles quietly. This means salary payments can be redirected without raising immediate suspicion, reflecting a stark vulnerability in how these institutions manage sensitive information.

The Broader Implications of Cyberattacks on Educational Institutions

Educational institutions are uniquely vulnerable targets due to their reliance on trust. The scale of these attacks shows that cybercriminals are not just exploiting software vulnerabilities but are honing in on deeply ingrained human behaviors.

“These attacks thrive on social engineering, particularly in environments where trust is paramount,” notes cybersecurity experts.

Preventing Future Attacks: 6 Essential Steps

Despite the rising incidence of such scams, there are actionable steps that university staff can take to protect themselves:

  • Limit Personal Information Online: The less information that's available, the harder it becomes for scammers to craft convincing messages.
  • Think Before You Click: Avoid clicking on links or downloading attachments unless you're certain of their legitimacy.
  • Verify with Sources: If an email prompts action regarding payroll, reach out to HR using known contact details.
  • Use Unique Passwords: Implement a password manager to store unique credentials securely.
  • Enable Two-Factor Authentication (2FA): Add layers of security to critical accounts.
  • Monitor Accounts Regularly: Stay vigilant for unusual activity on payroll and financial accounts.

Conclusion: A Call for Vigilance

The Storm-2657 phishing attacks unequivocally highlight the need for educational institutions to bolster their cybersecurity measures. These breaches not only affect financial stability but also undermine the foundational trust necessary for educational environments. We must prioritize security education and awareness to mitigate future risk. Only then can we begin to rebuild the trust that has been compromised.

Key Facts

  • Attacking group: Storm-2657
  • Number of targeted universities: 25
  • Estimated email addresses targeted: 6,000
  • Attack initiation: March 2025
  • Primary attack method: Pirate payroll phishing attacks
  • Consequences for universities: Compromised payroll information

Background

The Storm-2657 phishing attacks have raised significant concerns about cybersecurity in U.S. educational institutions, highlighting vulnerabilities that can lead to serious financial repercussions and breaches of trust.

Quick Answers

Who is behind the phishing attacks targeting universities?
The hacking group Storm-2657 is responsible for the phishing attacks targeting U.S. universities.
What is the primary method used in the Storm-2657 attacks?
Storm-2657 primarily uses pirate payroll phishing attacks to compromise payroll information.
How many universities have been affected by the Storm-2657 attacks?
A total of 25 U.S. universities have been affected by the Storm-2657 attacks.
When did the Storm-2657 attacks begin?
The Storm-2657 attacks began in March 2025.
What strategies can universities adopt to prevent phishing attacks?
Universities should implement strategies such as limiting personal information online, verifying with sources, and enabling two-factor authentication.
What do the phishing emails from Storm-2657 typically contain?
The phishing emails often contain urgent messages that simulate crises to trick staff into providing login information.

Frequently Asked Questions

What Happens if a staff member falls for the phishing scam?

If a staff member falls for the phishing scam, attackers can gain access to their accounts and redirect payroll funds without immediate detection.

How can university staff protect themselves from phishing attacks?

University staff can protect themselves by using strong, unique passwords, enabling two-factor authentication, and regularly monitoring their accounts.

Source reference: https://www.foxnews.com/tech/payroll-scam-hits-us-universities-phishing-wave-tricks-staff

Comments

Sign in to leave a comment

Sign In

Loading comments...

More from Business