Unmasking payroll pirates: Harnessing social engineering tactics in cyber attacks

Feb 5, 2026 | Threat Intelligence Research

Rise of Social Engineering: Payroll Theft via Help Desk Manipulation

Cybersecurity firm Unit 42 reports on a recent case where an attacker exploited social engineering to redirect employees’ paychecks into accounts they controlled, highlighting the effectiveness of such tactics over technical breaches. This incident underscores the vulnerabilities within organizational help desk operations.

In this attack, the perpetrator did not exploit technical weaknesses but instead manipulated multiple help desks, including payroll, IT, and HR, by impersonating employees. The attacker successfully bypassed authentication protocols to access sensitive payroll information and modified direct-deposit details for multiple employees. This intrusion remained undetected until affected employees reported missing paychecks, leading to an internal investigation. The investigation revealed unauthorized changes in payroll accounts that had been occurring for weeks.

Unit 42’s response involved a thorough examination of the systems, utilizing tools like Cortex XSIAM to analyze telemetry data from various sources. They confirmed that the incident was limited to payroll diversions without broader network infiltration. However, during their investigation, evidence of the WannaCry ransomware was found in the client’s operational technology (OT) environment, indicating a long-standing compromise.

Why This Matters
This incident highlights the pressing need for organizations to enhance human-centric processes, especially those involving identity verification and help desk interactions, as they can become significant vulnerabilities. Financially motivated attackers leverage social engineering tactics to circumvent technical controls, which can lead to substantial operational and reputational damage.

Strengthening security measures, such as improving help desk protocols and enforcing multi-factor authentication, can mitigate risks posed by similar social engineering attacks. Enhanced logging and monitoring can also assist in detecting anomalies more efficiently.

Indicators of Compromise (IOCs)
The article does not provide specific IOCs such as IPs, domains, or malware hashes. It mainly focuses on the social engineering tactics used, the methods of manipulation, and organizational vulnerabilities.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles