ANAVEM
Languagefr
Office computers displaying payroll software with red warning lights and financial documents

Storm-2755 Hackers Target Canadian Payroll Systems

Storm-2755 threat group hijacks Canadian employee accounts to steal salary payments through sophisticated payroll system attacks.

10 April 2026, 13:56 5 min read

Last updated 10 April 2026, 22:03

SEVERITYHigh
EXPLOITActive Exploit
PATCH STATUSUnavailable
VENDORMultiple Canadian payroll service providers
AFFECTEDADP Canada, Ceridian Dayforce,...
CATEGORYCyber Attacks

Key Takeaways

Storm-2755 Launches Payroll Piracy Campaign Against Canadian Workers

A financially motivated cybercriminal group designated Storm-2755 has launched a sophisticated campaign targeting Canadian payroll systems, successfully hijacking employee accounts to redirect salary payments to attacker-controlled accounts. The threat group, first identified in early 2026, has been conducting what security researchers term 'payroll pirate attacks' since March 2026, with the campaign escalating significantly throughout April.

The attack methodology involves Storm-2755 gaining unauthorized access to employee accounts within payroll management systems used by Canadian organizations. Once inside these accounts, the attackers modify direct deposit information, redirecting legitimate salary payments to bank accounts under their control. This technique allows the threat group to steal entire paychecks before employees or employers realize the compromise has occurred.

Security researchers tracking the campaign report that Storm-2755 demonstrates advanced knowledge of Canadian payroll processing cycles and banking systems. The group appears to time their account modifications to coincide with payroll processing windows, maximizing the window of opportunity before detection. The attackers have shown particular expertise in navigating popular Canadian payroll platforms, suggesting extensive reconnaissance and possibly insider knowledge of these systems.

The threat group's operations extend beyond simple account takeovers. Storm-2755 has developed sophisticated techniques for maintaining persistence within compromised payroll systems, often establishing multiple access points to ensure continued access even if initial compromise vectors are discovered and remediated. This persistence allows the group to conduct multiple theft operations against the same organization over extended periods.

Canadian cybersecurity authorities have been tracking this campaign since its emergence, noting that Storm-2755 employs advanced social engineering techniques to gain initial access to employee credentials. The group has been observed using targeted phishing campaigns, credential stuffing attacks against weak passwords, and exploitation of unpatched vulnerabilities in payroll system interfaces.

Canadian Organizations and Employees Face Direct Financial Impact

The Storm-2755 campaign primarily affects Canadian employees across multiple industry sectors, with particular concentration in small to medium-sized businesses that rely on cloud-based payroll services. Organizations using popular Canadian payroll platforms including ADP Canada, Ceridian Dayforce, and Paymi have reported successful compromises, though the attacks are not limited to specific software vendors.

Affected employees face immediate financial hardship when their salary payments are redirected to attacker-controlled accounts. The theft often goes undetected until payday, when employees discover their expected deposits have not arrived. Recovery of stolen funds requires coordination between employers, payroll providers, and banking institutions, a process that can take weeks to resolve while employees struggle with unexpected financial shortfalls.

Small businesses appear particularly vulnerable to these attacks due to limited cybersecurity resources and reliance on default security configurations in payroll systems. Organizations with fewer than 500 employees account for approximately 70% of confirmed Storm-2755 victims, according to preliminary analysis from Canadian cybersecurity researchers. These smaller organizations often lack dedicated IT security staff capable of implementing advanced monitoring and detection capabilities.

The geographic distribution of attacks shows concentration in major Canadian metropolitan areas, particularly Toronto, Vancouver, and Montreal, where higher concentrations of businesses use cloud-based payroll services. However, the campaign has expanded to include organizations across all Canadian provinces, indicating Storm-2755 has developed scalable attack infrastructure capable of targeting organizations nationwide.

Comprehensive Response and Mitigation Strategy for Payroll Security

Organizations must immediately implement multi-factor authentication (MFA) across all payroll system accounts, prioritizing administrative and employee self-service portals. Canadian businesses should audit all payroll system access logs from the past 90 days, looking for unusual login patterns, after-hours access, or logins from unfamiliar geographic locations. The CISA Known Exploited Vulnerabilities catalog should be consulted to ensure all payroll system components are patched against known security flaws.

Employee education represents a critical defense component against Storm-2755 tactics. Organizations should conduct immediate security awareness training focused on payroll-related phishing attempts, emphasizing that legitimate payroll providers will never request credential updates via email or phone calls. Employees should be instructed to verify any payroll system communications through official channels and report suspicious requests immediately to IT security teams.

Technical mitigation requires implementing robust monitoring capabilities within payroll systems. Organizations should configure alerts for any changes to employee banking information, requiring additional verification steps before processing modified direct deposit details. Network segmentation should isolate payroll systems from general corporate networks, limiting potential lateral movement if initial compromise occurs through other attack vectors.

Financial institutions and payroll service providers must enhance fraud detection capabilities specifically targeting unusual direct deposit modifications. Banks should implement additional verification procedures for new account additions to payroll systems, particularly when changes occur outside normal business hours or involve accounts with limited transaction history. The Microsoft Security Response Center provides additional guidance for organizations using Microsoft-based payroll infrastructure components.

Recovery procedures should be established before attacks occur, including predetermined communication channels with banking partners and clear escalation procedures for suspected payroll fraud. Organizations should maintain offline backups of payroll configuration data, enabling rapid restoration of legitimate direct deposit information if systems are compromised. Regular testing of these recovery procedures ensures effective response when actual incidents occur.

Frequently Asked Questions

How does Storm-2755 steal salary payments from Canadian employees?+
Storm-2755 hijacks employee accounts in payroll systems and modifies direct deposit information to redirect salary payments to attacker-controlled bank accounts. The group times these changes with payroll processing cycles to maximize theft opportunities before detection.
Which Canadian payroll systems are targeted by Storm-2755 attacks?+
Storm-2755 targets multiple Canadian payroll platforms including ADP Canada, Ceridian Dayforce, and Paymi. Small to medium businesses using cloud-based payroll services are particularly vulnerable to these attacks.
How can Canadian organizations protect against payroll piracy attacks?+
Organizations should implement multi-factor authentication on all payroll accounts, monitor for unusual login patterns, and require additional verification for banking information changes. Employee security training and network segmentation provide additional protection layers.

Discussion

Share your thoughts and insights

Sign in to join the discussion