Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
LECS 970x120 1

Your paycheck is zero! Congratulations, someone answered the phone wrong

18 January 2026 08:44

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber attack . An external party had managed to modify the salary payment details, diverting payments to accounts under its control.

The incident’s origin wasn’t a sophisticated technical breach, but a simple phone call. According to Unit 42’s Global Incident Response Report 2025 – Social Engineering Edition , 36% of incidents handled during the period analyzed were triggered by social engineering techniques. These include phishing, vishing, search engine manipulation, fake system prompts, and fraudulent help desk interactions.

Despite the availability of advanced security tools, attackers continue to successfully exploit tried-and-true tactics. Rather than hacking systems or distributing malware, they often choose to circumvent technological controls by targeting the people who manage business processes directly.

The attack: when social engineering affects processes

The initial access did not occur through a technical vulnerability. The attacker deployed a social engineering campaign, posing as an employee and contacting multiple help desks, including IT, HR, and payroll services. Through these interactions, he bypassed challenge/response verification mechanisms, prompting staff to reset their passwords and re-register their multi-factor authentication devices.

Social networks played a key role. Publicly available information allowed the attacker to prepare credible answers to verification questions. In some cases, calls were repeated multiple times to understand the type of controls in place, gradually gathering the data needed for successful access. The growing amount of personal and professional information online made this reconnaissance phase particularly effective.

Once they gained access, the individual attempted to establish a sustained presence by registering an external email address as an authentication method for a service account within the organization’s Azure AD environment. This clearly indicated an intent beyond immediate payroll fraud.

The pay slip diversion and the discovery of the incident

After authenticating to the payroll system, the attackers acted swiftly. Several employee accounts were compromised, allowing access to sensitive data. Direct deposit information was changed, and paychecks were redirected to bank accounts controlled by the attacker.

Because the credentials used were valid and the multifactor authentication was in place, the activities did not immediately raise alarms. The incident only became known when some employees reported the non-payment. The internal investigation identified suspicious changes dating back weeks, leading the organization to engage legal counsel and subsequently Unit 42 for a full analysis.

The intervention of Unit 42

Once tasked, Unit 42 launched an in-depth investigation. The team conducted threat hunting using Cortex XSIAM, correlating data from multiple sources: payroll systems, HR platforms, and logs from the organization’s next-generation firewalls.

Analysis confirmed that the impact of the incident was limited to account compromise and payroll diversion, with no evidence of lateral movement or data exfiltration from the internal network.

During the investigation, however, a further critical issue emerged: the presence of an active compromise attributable to the WannaCry ransomware within the organization’s legacy OT environment. This threat has been known for years, but has remained silent in industrial operating systems.

Containment and strengthening security

Unit 42 worked with the client to quickly block compromised accounts, reverse fraudulent payroll changes, and restore control of the affected cloud identities. At the same time, guidance was provided on hardening the IT and OT environments.

Recommendations included improving help desk verification procedures, strengthening multi-factor authentication application and recovery flows, more comprehensive event logging with integration into Cortex XSIAM, and targeted interventions to address the spread of WannaCry in OT systems.

Despite the initial attack, the overall impact was limited to three employee accounts. This result is linked both to the organization’s rapid response and the attacker’s objective, which was focused on financial gain rather than a broader network compromise.

Lessons learned from the survey

The incident highlights a growing trend: attackers are targeting operational processes and human interactions, particularly help desks, bypassing traditional technical controls. Activities such as password resets or MFA enrollment, if not managed with rigorous procedures, can become high-impact vulnerabilities.

The case also demonstrates how investigations into small fraud cases can uncover deeper structural issues, such as the prolonged presence of malware in industrial environments.

Given these dynamics, organizations are required to treat flows managed by humans with the same level of scrutiny as technical authentication mechanisms. Key elements remain unified visibility of the environment, trained security teams, and rigorous verification procedures for every digital identity-related request.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella. Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.