UNC6783 Phishing Hits Dozen High-Value Firms

Several dozen high-value corporations just got phished through their own helpdesks. Google's calling out UNC6783, a slick extortion crew that's turning support chats into backdoors.

Dozens of Elite Corporations Rocked by UNC6783's Helpdesk Phishing Onslaught — theAIcatchup

Key Takeaways

  • UNC6783 targeted dozens of high-value firms via BPO and helpdesk phishing, bypassing MFA with clipboard stealers.
  • Adobe breach claim by Mr. Raccoon aligns perfectly with UNC6783 tactics, stealing millions of tickets.
  • BPO vulnerabilities mirror past attacks like Scattered Spider; expect escalation as cloud adoption grows.

“We are aware of several dozen high-value corporate entities targeted across multiple sectors.”

That’s Google Threat Intelligence’s Austin Larsen, dropping a bombshell in his latest blog post. Not hyperbole—real intrusions, real data theft, real extortion demands landing in inboxes via Proton Mail.

UNC6783. New name, old tricks. They’re not blasting mass emails. No, these guys — smooth-talking pros — hit call centers, BPOs, and helpdesks directly. Compromise the outsourcer? Boom, legitimate creds for the big fish clients. It’s the Scattered Spider playbook, refined.

Why Your Helpdesk Is a Sitting Duck

Look, BPOs handle the grunt work for giants—ticketing, support, resets. But security? Often an afterthought. UNC6783 knows this. They spoof Okta logins with domains like .zendesk-support<##>.com. Chat agents click, paste creds — clipboard stealers snag MFA codes. Then? Persistent access via enrolled devices.

Fake software updates seal the deal, dropping RATs. Google spotted it all. And here’s my take: this isn’t random. Market dynamics scream vulnerability. Global BPO spend hit $300 billion last year (Statista), yet breach reports from these firms? Crickets. Companies outsource risk, not defenses.

“The campaign relies on social engineering via live chat to direct employees to malicious, spoofed Okta login pages,” Larsen said.

Pure gold for attackers. One chat slip, and you’re in the cloud.

And Adobe? That Mr. Raccoon claim last week smells like UNC6783’s handiwork. Indian BPO employee RAT’d, manager phished, 13 million tickets swiped. Employee records, HackerOne bugs, internals—all out. vx-underground calls it legit. Adobe’s mum, naturally.

Is This the New Normal for Cloud Breaches?

Short answer: yes. Remember ShinyHunters? Same vector, MGM chaos. But UNC6783 scales it. Dozens hit already. Sectors? Finance, tech, you name it. Financially motivated—no nation-state flair, just cold cash.

Here’s my unique angle, absent from Google’s post: this echoes the 2016 Uber breach. Outsourced helpdesk in the Philippines, creds swiped, 57 million users exposed. History rhymes. Prediction? As cloud migration accelerates—Gartner says 85% of enterprises fully cloud by 2025—BPO attacks spike 40% yearly. Why? Cost-cutting trumps seg[regation]. Firms like Accenture, Genpact laugh to the bank while clients bleed data.

But Google’s sharp—linking to Raccoon. Persona games aside, it’s pro work. Proton for ransoms? OpSec tight.

So, does this strategy make sense for defenders? Hell no. You’re reactive, they’re proactive. Train helpdesk? Sure, but phishing kits evolve. MFA bypasses? Standard now. Zero-trust your vendors, or get owned.

What Broke—and What’s Next

Tactics unpacked: live chat social engineering. Phishing kits nab clipboard MFA. RATs via fake updates. BPO pivots to customer nets. Extortion follows.

Market truth: high-value targets pay. UNC6783 bets on it. We’ve seen $100k+ ransoms stick. Adobe’s silence? PR spin, betting on fade-out. Won’t work—data’s live on forums soon.

Unique critique: Google’s blog reads like a vendor pitch (Mandiant tie-in?). But facts land. No hype, just “several dozen.” Understatement? Probably hundreds brewing.

Defenses? Segment BPOs ruthlessly. AI chat filters? Emerging, but test ‘em. Hunt anomalies in Okta logs. It’s table stakes.

And the Adobe tie? If true, exposes SaaS giants’ underbelly. Helpdesk tickets = goldmines. PII, creds, internals. Raccoon’s brag: 15k employee records. Ouch.

Here’s the thing—enterprises, wake up. This crew’s just starting. Multi-sector blitz means no one’s safe. Invest now, or fund the next Proton inbox.


🧬 Related Insights

Frequently Asked Questions

What is UNC6783 and how do they attack?

UNC6783 is a new extortion group tracked by Google, using helpdesk phishing, BPO compromises, and MFA bypasses to steal corporate data for ransom.

Did UNC6783 breach Adobe?

Likely yes—Mr. Raccoon’s claimed Adobe hack via Indian BPO matches UNC6783 tactics, per Google and malware analysts.

How can companies stop helpdesk phishing?

Segment vendor access, monitor Okta anomalies, train on chat social engineering, and enforce zero-trust for BPOs.

Priya Sundaram
Written by

Hardware and infrastructure reporter. Tracks GPU wars, chip design, and the compute economy.

Frequently asked questions

What is UNC6783 and how do they attack?
UNC6783 is a new extortion group tracked by Google, using <a href="/tag/helpdesk-phishing/">helpdesk phishing</a>, BPO compromises, and MFA bypasses to steal corporate data for ransom.
Did UNC6783 breach Adobe?
Likely yes—Mr. Raccoon's claimed Adobe hack via Indian BPO matches UNC6783 tactics, per Google and malware analysts.
How can companies stop helpdesk phishing?
Segment vendor access, monitor Okta anomalies, train on chat social engineering, and enforce zero-trust for BPOs.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by The Register Security

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.