UNC6783 Extortion Crew Targets 'Several Dozen' Corporations Through BPO and Helpdesk Phishing Attacks

Available in: 中文
2026-04-10T13:45:31.523Z·1 min read
A financially motivated threat group tracked as UNC6783 has targeted "several dozen" high-value corporations through a sophisticated campaign targeting call centers, business process outsourcers (B...

A financially motivated threat group tracked as UNC6783 has targeted "several dozen" high-value corporations through a sophisticated campaign targeting call centers, business process outsourcers (BPOs), and corporate helpdesk staff, according to Google Threat Intelligence Group.

Attack Methodology

UNC6783 employs a multi-stage attack chain:

  1. Initial access: Social engineering via live chat to direct employees to spoofed Okta login pages (e.g., <org>.zendesk-support<##>.com)
  2. MFA bypass: Custom phishing kit steals clipboard contents to bypass multi-factor authentication
  3. Persistence: Enrolls attacker's own devices for persistent access
  4. Lateral movement: Uses stolen BPO credentials to access customer IT environments
  5. Data exfiltration: Steals sensitive corporate data
  6. Extortion: Delivers ransom notes via Proton Mail accounts

Potential Adobe Breach Connection

The group may be linked to the "Mr. Raccoon" persona, who allegedly breached Adobe through an Indian BPO:

Notable Techniques

Recommendations

↗ Original source · 2026-04-10T00:00:00.000Z
← Previous: AWS Launches Agent Registry for Enterprise AI Agent Discovery and GovernanceNext: US-Israel Strikes on Iran Enter Day 42: Strait of Hormuz Risk Continues to Reshape Global Energy Markets →
Comments0