Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

629+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Cybercriminals Target Accountants to Drain Russian Firms' Bank Accounts
Cybercriminals Target Accountants to Drain Russian Firms' Bank Accounts
NEWS

Cybercriminals Target Accountants to Drain Russian Firms' Bank Accounts

Cybercriminals are stealing millions from Russian companies by compromising accountants' computers and disguising fraudulent transfers as routine salary payments, with the largest confirmed single theft exceeding 14 million rubles.

Dylan H.

News Desk

April 9, 2026
5 min read

A sophisticated financial cybercrime campaign is targeting accountants at Russian companies, using compromised workstations and fraudulent salary payment orders to siphon millions of rubles from corporate bank accounts. According to reporting by The Record, the largest confirmed single theft in this campaign exceeds 14 million rubles (approximately $160,000 USD at current rates), with total losses across multiple victims running into the tens of millions.

The Attack Pattern

The campaign follows a consistent, well-refined playbook that blends technical intrusion with social engineering:

Step 1: Accountant Workstation Compromise

Attackers gain a foothold on the target by infecting the accountant's computer — typically through spear-phishing emails carrying malicious attachments or links, or via drive-by download from compromised financial or accounting-related websites. Once installed, the malware establishes remote access and begins monitoring the victim's banking activity.

Step 2: Banking Session Monitoring

With access to the accountant's machine, attackers observe legitimate banking sessions over days or weeks, learning:

  • Which banking portal the company uses
  • Standard payment patterns, amounts, and frequencies
  • Authorized payee lists and salary schedules
  • How the accountant authenticates (tokens, SMS OTP, etc.)

Step 3: Fraudulent Transfers Disguised as Salary Payments

At the optimal moment — often shortly before a legitimate payroll run when large transfers are expected — attackers inject or modify payment instructions to reroute funds to attacker-controlled accounts. The transfers are deliberately structured to mimic the format, timing, and amounts of normal salary payments, making them difficult to distinguish from legitimate payroll until the recipient employees fail to receive their salaries.

In some cases, attackers leverage banking trojans that intercept and modify payment details in real time as the accountant submits a legitimate transaction, substituting the destination account without the accountant seeing the change on their screen.

Why Accountants Are the Target

Accountants represent a uniquely valuable target profile for this type of attack:

FactorWhy It Matters
Authorized banking accessAccountants hold credentials for corporate banking portals with high transaction limits
Routine large transfersRegular salary runs, vendor payments, and tax payments make large outflows expected and unremarkable
Trust by finance systemsPayment instructions from accountants' workstations are trusted by internal controls
Salary payment camouflageSalary-formatted transfers evade automated fraud detection tuned to flag unusual payee types
Time pressurePayroll deadlines create urgency that reduces scrutiny of individual payments

Scale and Impact

Russian law enforcement and cybersecurity researchers tracking this campaign have confirmed:

  • Multiple Russian companies across various sectors have been victimized
  • The largest single theft confirmed exceeds 14 million rubles
  • Total stolen across identified incidents runs into tens of millions of rubles
  • Many victims only discovered the fraud when employees reported missing salary payments

The delayed discovery is a key feature of the attack: by the time the fraud is identified, the funds have typically been transferred through multiple intermediary accounts and are difficult to trace or recover.

Attribution and Threat Actor Profile

The campaign does not appear linked to nation-state actors or geopolitically motivated groups. Based on the financial modus operandi, researchers assess this is the work of financially motivated cybercriminal groups with established infrastructure for:

  • Phishing campaigns targeting corporate finance staff
  • Banking trojan deployment and management
  • Money mule networks for rapid laundering of stolen funds

This type of operation has parallels with Business Email Compromise (BEC) schemes targeting Western companies, adapted for the Russian banking ecosystem which uses different payment platforms and authentication methods.

Defensive Recommendations

Russian companies — and organizations globally with similar accountant-controlled payment workflows — should implement the following controls:

Technical Controls

  • Endpoint detection and response (EDR) on all finance workstations with behavioral monitoring for banking sessions
  • Application allowlisting on accountant workstations to block unauthorized executables
  • Out-of-band verification for all payroll runs — confirmation via phone call or secondary channel before submission
  • Read-only banking portals for accountants below a threshold — require a second approver for any transfer above a defined limit

Process Controls

  • Dual authorization for salary and payroll transfers — two separate authenticated users must approve large batches
  • Callback verification — before executing payroll, a manager or finance supervisor must verify the batch total via phone
  • Reconciliation alerts — automated comparison of submitted payroll vs. previous cycle to flag unusual deviations
  • Employee salary receipt confirmation — establish a process where payroll receipt failures from employees trigger immediate investigation

Detection Signals

SignalAction
Payment to new bank account formatted as salaryHold for manual review
Bulk salary transfer submitted outside normal payroll windowAlert finance supervisor
Accountant machine accessing banking portal from new location or IPTrigger step-up authentication
Banking trojan indicators on finance workstationsIsolate immediately, freeze pending payments

Source: The Record — Cybercriminals hack Russian accountants to steal millions

#Russia#Financial Crime#Phishing#Social Engineering#Cybercrime#Banking Trojan#Business Email Compromise#Threat Intelligence

Related Articles

Manager of Botnet Used in Ransomware Attacks Gets 2 Years in Prison

Ilya Angelov, co-leader of the TA551/Mario Kart cybercrime group, was sentenced to two years in prison for operating a phishing botnet that sent 700,000...

4 min read

Diesel Vortex: Russian Cybercrime Ring Steals 1,649

A Russian-linked phishing operation dubbed Diesel Vortex has stolen over 1,649 credentials from major freight and logistics companies across the US and...

4 min read

AI-Powered Phishing Achieves 54% Click-Through Rate

Microsoft reveals adversaries using AI for automated vulnerability discovery, phishing campaigns, and malware generation. AI-crafted phishing emails...

4 min read
Back to all News