Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Palo Alto Firewall Vulnerability Exploited for Root Access
May 6, 2026
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Home/Threats/Attackers Redirect Employee Paychecks, No System Breach
Threats

Attackers Redirect Employee Paychecks, No System Breach

A seemingly simple phone call enabled a sophisticated attack that diverted employee paychecks, all without malware or a network breach. An organization discovered this fraud when workers reported...

Jennifer sherman
Jennifer sherman
January 19, 2026 2 Min Read
0 0

A seemingly simple phone call enabled a sophisticated attack that diverted employee paychecks, all without malware or a network breach.

An organization discovered this fraud when workers reported missing salary deposits. The attacker had modified direct-deposit information to funnel payments into accounts under their control.

This incident reveals a troubling trend where threat actors are abandoning complex technical methods and turning instead to social engineering that targets human vulnerability.

The attack began with social engineering tactics, a method increasingly favored by threat actors. According to Palo Alto Networks’ 2025 Unit 42 Global Incident Response Report, 36 percent of incidents examined started with social engineering campaigns.

The attacker impersonated employees and contacted multiple help desk teams across payroll, IT, and HR departments.

By gathering publicly available information from social media platforms, the attacker collected enough personal details to answer verification questions.

They then convinced help desk staff to reset passwords and re-enroll multi-factor authentication devices.

The attacker even called back repeatedly to identify which verification questions were being asked, improving their chances of success on subsequent attempts.

Palo Alto Networks analysts identified the attack’s persistence mechanism as particularly concerning. The threat actor registered an external email address as an authentication method within the organization’s Azure Active Directory environment.

This step demonstrated clear intent to maintain access beyond the immediate payroll theft. The attacker systematically compromised multiple employee accounts to access sensitive payroll data.

Once authenticated, the attacker modified direct-deposit information for several workers, redirecting their salary payments to attacker-controlled bank accounts.

The fraudulent activity went undetected for weeks because the legitimate credentials and valid multi-factor authentication made the transactions appear normal.

The Help Desk Vulnerability: A Critical Security Gap

Help desk operations represent one of the most overlooked security weak points in modern organizations.

Password resets and MFA re-enrollment procedures, when not properly secured, become high-impact vulnerabilities.

This incident demonstrates how human-driven workflows can bypass all technical safeguards.

Attackers understand that social engineering requires no malware development, exploit discovery, or network intrusion skills.

They simply need persuasive communication and publicly available information.

The investigation eventually contained the impact to three employee accounts, but it revealed deeper systemic issues throughout the organization’s security infrastructure.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitMalwareSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Cloudflare Zero-Day Allows Any Host Access Byp Vulnerability Enables

Next Post

Attackers Use WSL2 for Stealthy Hideouts in Windows

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Cisco Acquires Astrix Security to Boost Strengthen Agent
May 5, 2026
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us