Threat IntelHIGH

Google Warns of UNC6783 Threat Group Targeting BPOs

Featured image for Google Warns of UNC6783 Threat Group Targeting BPOs
#UNC6783#Raccoon#BPOs#phishing#extortion

Original Reporting

IMInfosecurity Magazine

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelHIGH

High severity β€” significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupUNC6783
AliasesRaccoon
AttributionPossibly linked to Raccoon persona
Target SectorsBPOs, Enterprises
Target RegionsGlobal
Active Since2026
Campaign NameBPO Extortion Campaign
Primary TTPsSocial engineering, phishing
Tools UsedSpoofed domains, phishing kits
MITRE ATT&CKT1566.001 (Spearphishing Attachment)
MotivationFinancial gain through extortion
🎯

Basically, a new hacker group is tricking companies into giving up sensitive information.

Quick Summary

Google warns of a new threat group, UNC6783, targeting BPOs and helpdesks for extortion. This group uses social engineering tactics to steal sensitive data. Companies must implement stronger security measures to defend against these attacks.

What Happened

Google's Threat Intelligence Group (GTIG) has issued a warning about a new threat group named UNC6783. This group is targeting business process outsourcers (BPOs) and large enterprises, aiming to extort sensitive data. The group appears to be financially motivated and may have links to the notorious Raccoon persona.

Who's Behind It

The principal threat analyst at GTIG, Austin Larsen, highlighted that UNC6783 has already targeted numerous high-value corporate entities across various sectors. Their primary focus is on BPOs, but they also directly attack in-house helpdesk and support teams.

Tactics & Techniques

UNC6783 employs social engineering tactics via live chat to lure employees into visiting malicious, spoofed Okta login pages. These phishing attempts often use domain patterns that mimic legitimate organizations, such as [.]zendesk-support<##>[.]com. The attackers also utilize a phishing kit designed to bypass standard multi-factor authentication (MFA) by stealing clipboard contents, allowing them to enroll their own devices for persistent access.

In addition, the group has been observed using fake security software updates to trick users into downloading remote access malware. After exfiltrating data, they typically send ransom notes through Proton Mail accounts.

Defensive Measures

To mitigate risks, GTIG advises organizations to:

  • Implement phishing-resistant MFA like FIDO2 hardware security keys for all users, especially those in high-risk roles.
  • Monitor live chat for suspicious interactions that direct users to external links.
  • Educate employees about this specific campaign to enhance awareness.
  • Proactively block unauthorized domains that follow the [.]zendesk-support[.]com pattern.
  • Monitor for unauthorized binary executions, particularly during support sessions.
  • Regularly audit newly enrolled MFA devices to detect any unauthorized additions.

Conclusion

The emergence of UNC6783 highlights the evolving tactics of cybercriminals targeting BPOs and helpdesks. Organizations must remain vigilant and adopt robust security measures to protect sensitive data from these sophisticated threats.

πŸ” How to Check If You're Affected

  1. 1.Check for unauthorized login attempts from external domains.
  2. 2.Monitor for unusual live chat interactions directing users to external links.
  3. 3.Review recent MFA enrollments for any unauthorized devices.

🏒 Impacted Sectors

TechnologyFinanceAll Sectors

πŸ—ΊοΈ MITRE ATT&CK Techniques

Pro Insight

πŸ”’ Pro insight: UNC6783's tactics mirror those of other extortion groups, indicating a trend towards more sophisticated social engineering methods in cybercrime.

Sources

Original Report

IMInfosecurity Magazine
Read Original

Related Pings

HIGHThreat Intel

Cybersecurity Risks - Weaknesses in Interconnected Systems

A cybersecurity expert reveals the risks of tightly coupled systems in industries. As digital transformation accelerates, systemic vulnerabilities threaten operational resilience. Organizations must prioritize resilience over compliance to survive potential disruptions.

CSO OnlineΒ·
HIGHThreat Intel

Malaysia Faces Structural Shift in Cyber Threats Landscape

Malaysia's cyber threat landscape is rapidly evolving, with state-backed and financially motivated actors posing significant risks. This shift highlights the urgent need for enhanced cybersecurity measures across critical sectors.

SC MediaΒ·
HIGHThreat Intel

Criminal Wannabes - More Dangerous Than Cyber Pros, Says Ex-FBI Chief

A former FBI chief warns that inexperienced cybercriminals are becoming a serious threat. These wannabes are leveraging AI in dangerous ways, complicating the cybersecurity landscape. Organizations must adapt to counter these evolving attacks.

The Register SecurityΒ·
HIGHThreat Intel

UNC6783 Hackers Steal Corporate Zendesk Support Tickets

A new hacker group, UNC6783, is stealing sensitive Zendesk support tickets from BPOs. This poses a serious risk to companies across various sectors. Experts recommend enhanced security measures to combat these threats.

BleepingComputerΒ·
HIGHThreat Intel

Threat Actors Use Emojis to Evade Detection Mechanisms

Cybercriminals are using emojis to communicate covertly, evading detection filters. This tactic poses significant risks to cybersecurity efforts and ransom negotiations. Organizations must adapt to this new challenge.

Dark ReadingΒ·
HIGHThreat Intel

Minnesota National Guard Deployed After Cyberattack Disrupts Services

Minnesota's Winona County faces significant disruptions due to a cyberattack, prompting the deployment of the National Guard for recovery efforts. Governor Walz's emergency order mobilizes state resources to assist in restoring critical services.

The RecordΒ·