UNC6783 Extortion Crew Targets 'Several Dozen' Corporations Through BPO and Helpdesk Phishing Attacks
Available in: 中文
A financially motivated threat group tracked as UNC6783 has targeted "several dozen" high-value corporations through a sophisticated campaign targeting call centers, business process outsourcers (B...
A financially motivated threat group tracked as UNC6783 has targeted "several dozen" high-value corporations through a sophisticated campaign targeting call centers, business process outsourcers (BPOs), and corporate helpdesk staff, according to Google Threat Intelligence Group.
Attack Methodology
UNC6783 employs a multi-stage attack chain:
- Initial access: Social engineering via live chat to direct employees to spoofed Okta login pages (e.g.,
<org>.zendesk-support<##>.com) - MFA bypass: Custom phishing kit steals clipboard contents to bypass multi-factor authentication
- Persistence: Enrolls attacker's own devices for persistent access
- Lateral movement: Uses stolen BPO credentials to access customer IT environments
- Data exfiltration: Steals sensitive corporate data
- Extortion: Delivers ransom notes via Proton Mail accounts
Potential Adobe Breach Connection
The group may be linked to the "Mr. Raccoon" persona, who allegedly breached Adobe through an Indian BPO:
- Deployed remote access tool on one employee
- Phished that worker's manager
- Claimed to have stolen 13 million support tickets, 15,000 employee records, all HackerOne submissions, and internal documents
- According to vx-underground: "Anyone who submitted a helpdesk ticket to Adobe could be impacted"
Notable Techniques
- Fake security software updates to trick victims into downloading remote access malware
- BPO targeting — a method popularized by Scattered Spider and ShinyHunters
- Direct helpdesk phishing — voice phishing attacks against support staff have "skyrocketed" according to Google
Recommendations
- Verify Okta login page URLs carefully, especially variations of zendesk-support domains
- Implement additional controls for BPO and call center access
- Monitor for unusual device enrollment in MFA/identity systems
- Train helpdesk staff on live chat-based social engineering attacks
- Review access logs for BPO-linked accounts
← Previous: AWS Launches Agent Registry for Enterprise AI Agent Discovery and GovernanceNext: US-Israel Strikes on Iran Enter Day 42: Strait of Hormuz Risk Continues to Reshape Global Energy Markets →
0