“Payroll Pirates” hit
25 universities at once.
A Microsoft-tracked threat group phished 6,000 accounts to redirect Workday payroll. suss. would have caught it at three separate layers.
Storm-2657 compromised 11 accounts at 3 universities, then scaled to 25 institutions. Here's how suss. stops every phase of the attack.
What happened
Source: Microsoft Security Blog
How suss. would have caught it
We ran a reconstructed version of the phishing email through our API. Here's what fired — and three layers of defense that would have stopped it.
Three layers of defense
Detects the phishing email itself — urgency language, fake verification links, sender domain impersonation.
If someone clicks the link, the page analyzer detects the fake Workday login page — domain reputation, form structure, credential harvesting patterns.
Even if the page looks convincing, form guard blocks credential submission on unregistered domains — the last line of defense.
4 threat indicators fired
Recommended actions
- 1DO NOT click any verification links in this email
- 2Navigate to Workday directly via your browser bookmark or institutional portal
- 3Report this email to your IT security team immediately
- 4Check your inbox rules for auto-delete patterns targeting Workday notifications
- 5Log in to Workday and verify your direct deposit details have not changed
The cost of no protection
Why universities are prime targets
Multi-layer phishing defense
Email Phishing Detection
Identifies phishing emails targeting payroll, HR, and financial aid systems. Detects urgency language, fake verification links, and sender impersonation.
Credential Harvesting
Recognizes fake login pages for Workday, Banner, and other university platforms. Blocks credential submission on unregistered domains.
Payroll & Direct Deposit Fraud
Flags suspicious payroll redirect requests, direct deposit changes initiated through phishing, and unauthorized inbox rule creation.
Account Takeover Prevention
Detects compromised account behavior patterns including bulk phishing from internal addresses and suspicious rule manipulation.
With suss. vs. without
Without suss.
- Phishing email lands in employee inbox
- Employee clicks 'Verify Workday Account' link
- Fake login page captures credentials
- Attacker changes direct deposit details
- Inbox rule hides Workday confirmation email
- Discovered at payday — paycheck already stolen
With suss.
- Email scanner flags phishing in Gmail/Outlook
- Warning badge appears before employee clicks
- If clicked, page analyzer detects fake Workday domain
- Form guard blocks credential submission
- Employee reports to IT — entire campaign blocked
- Zero compromised accounts, zero stolen paychecks
How the pilot works
Start a free 30-day pilot
Deploy via Chrome Enterprise in minutes. Three layers of defense against payroll phishing — email, page, and form — with zero training required.
If Storm-2657 targeted 25 universities, yours could be next.
Free for qualified universities and government institutions