Storm-2755 Hijacks Canadian Payroll via AiTM Attacks

Article Highlights
Off On

A Canadian professional wakes up on a Friday morning expecting the comfort of a fresh direct deposit, only to discover their checking account remains stubbornly and inexplicably empty. This jarring reality is becoming increasingly common across the Canadian workforce as a sophisticated threat actor known as Storm-2755 bypasses digital safeguards that were once considered impenetrable. The victim’s security logs show a successful login, complete with multi-factor authentication (MFA) verification, yet the funds have vanished into the digital ether. This silent intrusion represents a significant shift in the cybercrime landscape, where the traditional security perimeter is no longer breached by brute force, but rather quietly circumvented through the theft of active user sessions.

The Invisible Thief in the Digital Paycheck

The modern security architecture relies heavily on the assumption that a successful MFA challenge equals a legitimate user. However, Storm-2755 exploits a fundamental paradox: a login can be verified and “secure” while remaining entirely under the control of an adversary. By hijacking the session token rather than just the password, attackers effectively step into the victim’s shoes after the security gate has already closed. This technical sleight of hand allows them to bypass the very shields designed to protect sensitive payroll data.

This transition from credential harvesting to session hijacking has rendered many traditional defense layers obsolete. Employees often follow every security protocol, yet they find themselves powerless as their digital identities are cloned in real-time. The sophistication of these attacks lies in their ability to remain invisible to the end user, who sees nothing more than a standard, albeit slightly sluggish, login process. Because the adversary possesses a valid session token, the internal systems of an organization continue to trust the connection, unaware that a silent thief is now navigating the corporate payroll infrastructure.

The Evolution of the “Payroll Pirate” Campaign

Storm-2755 has emerged as a formidable, financially motivated group with a sharp focus on the Canadian workforce. While previous iterations of payroll fraud relied on crude phishing emails and social engineering, this group has transitioned toward advanced Adversary-in-the-Middle (AiTM) frameworks. This evolution reflects a growing maturity in their operational capabilities, allowing them to target a broad spectrum of industries without needing to tailor their technical tools for each specific vertical.

The campaign is notably industry-agnostic, affecting small businesses and large-scale enterprises alike. By focusing on the mechanics of payroll rather than the specific nature of a business, the group ensures a consistent flow of illicit revenue. These “payroll pirates” have fine-tuned their workflows to maximize efficiency, moving from the initial compromise to the redirection of funds with surgical precision. This systematic approach suggests a highly organized structure behind Storm-2755, one that prioritizes the high-value returns found in redirected salaries over more destructive, but often less profitable, ransomware attacks.

The Anatomy of an AiTM Session Hijack

The assault begins with a calculated lure, often utilizing SEO poisoning and malvertising to place fraudulent Microsoft 365 sign-in pages at the top of search results. Unsuspecting employees searching for productivity tools or login portals are funneled toward these rogue domains. These pages are identical to legitimate interfaces, designed to capture the initial interest of the victim and prompt a standard login attempt. Once the user enters their credentials, the technical interception begins in earnest through a sophisticated proxy server. This proxy server acts as the “man in the middle,” passing communication between the user and the legitimate service provider in real-time. When the user completes their MFA challenge, the attacker intercepts the resulting session token—the digital “hall pass” that grants ongoing access without further verification. By possessing this token, Storm-2755 gains immediate, full access to the victim’s account. They maintain persistence by utilizing the Axios HTTP client and exploiting vulnerabilities like CVE-2025-27152 to establish a relay infrastructure. To avoid detection, they often schedule session renewals during early morning hours when security monitoring is less likely to flag suspicious activity.

Executing the Heist: Direct Deposit Diversion

Once the attackers have solidified their presence within an account, they conduct rapid, automated reconnaissance. They scan mailboxes for keywords like “direct deposit,” “payroll,” and “Workday” to understand how the organization handles financial changes. The heist is then executed through one of two primary methods. In the first scenario, the attacker sends an email to the HR department directly from the victim’s account, requesting a change in banking details. Because the request originates from an internal, legitimate address, it often bypasses standard external email filters and triggers less scrutiny from HR personnel.

Alternatively, the group may log directly into HR management platforms to manually update banking information. They use the stolen session tokens to navigate these platforms as if they were the employee. To ensure the victim remains oblivious, Storm-2755 implements malicious inbox rules that automatically delete or archive any confirmation emails or notifications from the HR system. This operational workflow ensures that the redirection is successful and remains undetected until the actual payday arrives, at which point the funds are already moving through a complex network of laundered accounts.

Defensive Strategies Against Session-Level Compromise

Defending against an adversary that bypasses MFA requires a fundamental shift toward phishing-resistant authentication methods. Moving away from SMS-based or app-based codes in favor of FIDO2 security keys provides a hardware-level defense that cannot be intercepted by proxy servers. These keys bind the authentication process to the specific website’s origin, making it impossible for a stolen token to be used elsewhere. Organizations that adopted these standards saw a significant reduction in successful session hijacking attempts, as the physical requirement for the key breaks the attacker’s automated relay chain.

Beyond authentication, security teams implemented Continuous Access Evaluation (CAE) to monitor sessions in real-time. This technology allows for the immediate revocation of access tokens if suspicious behavior, such as a sudden geographic shift or an unusual device profile, is detected. Hardening conditional access policies to enforce shorter session lifetimes also limited the window of opportunity for attackers. Furthermore, HR departments established out-of-band verification processes, requiring a phone call or in-person confirmation for any changes to banking information. These combined technical and procedural layers moved the defense from a reactive posture to a proactive strategy that prioritized session integrity.

Explore more

Psychology Explains Why Workplace Feedback Often Fails

The familiar ritual of the annual performance review often culminates in a deceptive moment where a manager feels heard and an employee feels understood, yet the actual results remain stubbornly absent from daily operations. It is a scene played out in thousands of conference rooms: a leader delivers a clear critique, the employee nods with total conviction, and yet, two

Can Embedded Finance Redefine the Travel Experience in Oman?

The modern traveler’s journey through a bustling international airport often feels like a series of disjointed hurdles rather than a fluid transition between destinations. The traditional terminal experience involves a fragmented series of transactions—juggling various currencies, credit cards, and loyalty apps at every boarding gate or duty-free shop. In Oman, this friction is beginning to disappear as financial services move

Is AI Modernizing Recruitment or Creating a Crisis of Trust?

The silent hum of a thousand algorithms processing millions of career dreams in milliseconds has fundamentally redefined what it means to look for work in the modern age. Where a handshake and a paper resume once served as the primary bridge between talent and opportunity, a complex layer of digital intelligence now stands as the ultimate gatekeeper. This transformation has

Why Is the AI Revolution Failing to Create New Jobs?

The high-octane promises of a digital renaissance fueled by artificial intelligence are currently running headlong into a labor market that seems remarkably uninterested in joining the celebration. While corporate boardrooms buzz with the potential of automated efficiency, the actual movement of American workers suggests a widening chasm between the software that runs the economy and the people who keep it

Can Speakers Solve the $2 Trillion Employee Engagement Crisis?

Corporate balance sheets across the globe are currently hemorrhaging trillions of dollars due to a quiet internal collapse of worker commitment that few traditional management strategies seem able to arrest. While a two trillion dollar figure usually characterizes national debt statistics or massive stimulus packages, it now represents the annual cost of “quiet quitting” and active disengagement within the American