Advertisement · 728 × 90
#
Hashtag
#BPOAttacks
Advertisement · 728 × 90
Preview
UNC6783 Turns BPO Providers into Cyberattack Gateways UNC6783 is targeting business process outsourcing (BPO) companies as a pathway to infiltrate major organizations, using phishing, social engineering, live-chat impersonation, and fake updates to steal sensitive data and deploy remote access malware. Google’s analysis and Mandiant recommendations emphasize measures such as FIDO2 hardware keys, live-chat monitoring, blocking Zendesk-like domains, and...

UNC6783 targets BPO providers to breach major organizations via phishing, social engineering, live-chat impersonation, and fake updates. Google and Mandiant recommend FIDO2 keys, chat monitoring, and MFA audits. #UNC6783 #BPOAttacks #US

0 0 0 0
Preview
Google: New UNC6783 hackers steal corporate Zendesk support tickets UNC6783 is compromising business process outsourcing (BPO) providers to access and exfiltrate sensitive data from high-value companies across multiple sectors and then extorting victims for payment. Their tactics include social engineering, phishing to spoof Okta logins on Zendesk-patterned domains, clipboard-stealing phishing kits to bypass MFA, delivery of remote access trojans via fake security updates, and extortion contacts via ProtonMail. #UNC6783 #Raccoon #Okta #Zendesk #Adobe

UNC6783 hackers exploit BPO providers to steal and extort sensitive corporate data using Okta login spoofing on Zendesk-like domains, clipboard phishing, and remote access Trojans via fake security updates. #UNC6783 #BPOAttacks #Okta

0 0 0 0