UNC6783 Turns BPO Providers into Cyberattack Gateways
好的,我现在需要帮用户总结一篇关于网络犯罪集团UNC6783的文章,控制在100字以内。首先,我要仔细阅读文章内容,抓住关键信息。 文章提到UNC6783主要攻击业务流程外包(BPO)公司,作为入侵大型组织的入口。他们使用钓鱼邮件和社会工程手段,甚至直接与内部支持团队互动获取未经授权的访问。攻击者还利用高级钓鱼工具包,窃取敏感信息并进行勒索。 此外,他们还分发虚假的安全更新,安装远程访问木马。受害者通常通过ProtonMail收到勒索邮件。文章还提到“Raccoon”可能与此集团有关,并举了Adobe被入侵的例子。 接下来,我需要将这些信息浓缩到100字以内。重点包括:目标是BPO公司、攻击手段、钓鱼工具包功能、勒索方式以及建议的防御措施。 确保语言简洁明了,不使用“文章内容总结”之类的开头。最后检查字数是否符合要求。 </think> 网络犯罪集团UNC6783针对业务流程外包公司发起攻击,利用钓鱼邮件和社会工程手段获取访问权限,并通过高级工具包窃取敏感信息进行勒索。建议采用FIDO2硬件密钥、监控聊天系统及阻止仿冒域名以防范此类攻击。 2026-4-9 12:49:56 Author: thecyberexpress.com(查看原文) 阅读量:25 收藏

UNC6783, BPO, Google Threat Intelligence Group, Okta, Help Desk, Phishing

A cybercriminal group identified as UNC6783 is targeting business process outsourcing (BPO) companies likely as a gateway to infiltrate major organizations across various industries.

The Google Threat Intelligence Group reports that this tactic has already affected dozens of companies, with attackers stealing sensitive information to pressure victims into paying ransoms.

According to principal threat analyst Austin Larsen, the group primarily depends on phishing schemes and social engineering tactics to compromise BPO providers that support their intended targets. In some cases, attackers have gone a step further by directly engaging with internal support or helpdesk teams to gain unauthorized access.

Investigators also believe UNC6783 may be connected to a cybercriminal persona known as “Raccoon,” which has previously focused on BPO firms serving large enterprises.

Also read: Singapore Launches Largest-Ever Cyber Defense Operation After UNC3886 Targets All Major Telcos

One notable technique involves manipulating support staff through live chat interactions. Employees are tricked into visiting counterfeit login pages that mimic Okta portals. These fraudulent sites are hosted on domains designed to resemble legitimate ones, often following a pattern like [.]zendesk-support<##>[.]com.

Larsen notes that the phishing toolkit used in these campaigns is particularly advanced—it can capture clipboard data, allowing attackers to bypass multi-factor authentication (MFA) and register their own devices within compromised systems.

report-ad-banner

In addition to phishing, the group has also distributed fake security updates that install remote access malware, further expanding their control over victim networks.

Once data is obtained, the attackers initiate extortion efforts, typically reaching out via ProtonMail accounts to demand payment in exchange for not releasing the stolen information.

Although further details about “Raccoon” remain limited, the International Cyber Digest recently reported that an individual using the alias “Mr. Raccoon” claimed responsibility for a breach involving Adobe—a claim that has not yet been confirmed.

According to these claims, the breach occurred after compromising an India-based BPO associated with Adobe. The attacker allegedly installed a remote access trojan (RAT) on an employee’s system and later targeted the employee’s manager through a phishing campaign.

The individual further asserted that approximately 13 million support tickets were stolen, including personal data, employee details, vulnerability reports submitted via HackerOne, and internal company documents.

To mitigate risks from UNC6783, Google’s Mandiant division recommends several defensive measures. These include adopting FIDO2-based hardware keys for MFA, closely monitoring live chat systems for suspicious activity, blocking domains that mimic Zendesk naming patterns, and routinely reviewing MFA device registrations for unauthorized additions.


文章来源: https://thecyberexpress.com/unc6783-bpo-providers-as-cyberattack-gateways/
如有侵权请联系:admin#unsafe.sh