'Several dozen' high-value corporations hit by new extortion crew in helpdesk #phishing spree
www.theregister.com/2026/04/09/s...
Google Threat Intelligence Group tracks the financially motivated group as #UNC6783.
#CyberSecurity #InfoSec #CyberCrime #ThreatIntelligence
#UNC6783 extortionist hackers impersonate support staff, using fake Okta login pages and social engineering to access corporate systems and steal sensitive data, #Google warns.
Read: hackread.com/unc6783-hack...
#CyberSecurity #CyberCrime #Okta #Extortion #Scam
New #UNC6783 hackers steal corporate #Zendesk support tickets
www.bleepingcomputer.com/news/security/google-new...
#cybersecurity #Raccoon
UNC6783 targets BPO providers to breach major organizations via phishing, social engineering, live-chat impersonation, and fake updates. Google and Mandiant recommend FIDO2 keys, chat monitoring, and MFA audits. #UNC6783 #BPOAttacks #US
UNC6783 targets BPOs and support staff using live chat phishing, clipboard-stealing kits to bypass MFA, RATs disguised as security updates, and Proton Mail extortion. #UNC6783 #DataTheft #BPOIndustry
Google Warns of New Campaign Targeting BPOs to Steal Corporate Data Tracked as UNC6783, the threat actor is likely linked to Mr. Raccoon, the hacker behind the alleged theft of Adobe data from a BP...
#Cybercrime #Adobe #data #theft #Mr #Racoon #Racoon #UNC6783
Origin | Interest | Match
UNC6783 hackers exploit BPO providers to steal and extort sensitive corporate data using Okta login spoofing on Zendesk-like domains, clipboard phishing, and remote access Trojans via fake security updates. #UNC6783 #BPOAttacks #Okta