Google: New UNC6783 hackers steal corporate Zendesk support tickets
嗯,用户让我用中文总结一下这篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要通读文章,抓住主要信息。 文章讲的是威胁组织UNC6783通过入侵BPO提供商来获取高价值公司的敏感数据,进而进行勒索。他们主要使用社会工程和钓鱼攻击,还可能联系目标公司的支持人员。此外,他们还使用了伪造的Okta登录页面和恶意软件来绕过MFA。Google的报告还提到他们可能与Raccoon有关联,并举了Adobe被攻击的例子。 现在,我需要把这些要点浓缩到100字以内。要确保涵盖威胁组织、攻击手法、目标以及后果。同时,语言要简洁明了。 可能的结构是:威胁组织UNC6783通过入侵BPO提供商获取高价值公司数据,利用钓鱼和社会工程手段绕过MFA进行勒索。 检查一下字数是否合适,确保不超过限制。这样应该能满足用户的需求。 </think> 威胁组织UNC6783通过入侵业务流程外包(BPO)提供商获取高价值公司敏感数据,并利用钓鱼攻击和社会工程手段绕过多因素认证(MFA),最终以勒索为目的进行数据窃取和传播恶意软件。 2026-4-8 22:0:24 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

Google: New UNC6783 hackers steal corporate Zendesk support tickets

A threat actor tracked as UNC6783 is compromising business process outsourcing (BPO) providers to gain access to high-value companies across multiple sectors.

According to the Google Threat Intelligence Group, dozens of corporate entities have been targeted through this method to exfiltrate sensitive data for extortion.

Austin Larsen, GTIG principal threat analyst, says that UNC6783 typically relies on social engineering and phishing campaigns to compromise BPOs working with targeted companies.

Wiz

However, there have been instances where the hackers have also contacted support and helpdesk staff within targeted organizations, in an attempt to obtain direct access.

The researchers say that UNC6783 may be linked to Raccoon, a persona known to have targeted multiple BPOs that provide services to large companies.

In social engineering attacks over live chat, the threat actor directs support employees to spoofed Okta login pages hosted on domains that impersonate those of the target company and follow the pattern <org>[.]zendesk-support<##>[.]com.

Larsen says that the phishing kit deployed in these attacks can steal clipboard contents to bypass multi-factor authentication (MFA) protection, enabling the attacker to register their device with the organization.

Google has also observed attacks where UNC6783 distributed fake security updates to deliver remote access malware.

After stealing sensitive data, the threat actor proceeds to extort victims, contacting them via ProtonMail addresses with payment demands.

While GTIG did not offer more information about Raccoon, threat intelligence account International Cyber Digest recently disclosed that someone using the alias “Mr. Raccoon” claimed a breach at Adobe, which the company has yet to confirm.

The attacker claimed to have gained access to Adobe data after compromising an India-based BPO working for the company. They deployed a remote access trojan (RAT) on an employee’s computer and subsequently targeted the employee’s manager in a phishing attack.

Mr. Raccoon said that they stole 13 million support tickets containing personal data, employee records, HackerOne submissions, and internal documents.

In conversations with BleepingComputer, the threat actor behind the CrunchyRoll breach confirmed that they were also behind the Adobe attack, but did not provide any evidence.

Google’s Mandiant listed several defense recommendations against UNC6783 attacks, including deploying FIDO2 security keys for MFA, monitoring live chat for abuse, blocking spoofed domains that match Zendesk patterns, and regularly auditing MFA device enrollments.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/google-new-unc6783-hackers-steal-corporate-zendesk-support-tickets/
如有侵权请联系:admin#unsafe.sh