By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Global News TodayGlobal News TodayGlobal News Today
  • World
  • Politics
  • Business
  • Technology
  • Science
  • Entertainment
  • Sports
  • Health
Reading: UNC6783 Hackers Use Fake Okta Pages in Corporate Breach Campaign – Hackread
Share
Notification Show More
Font ResizerAa
Global News TodayGlobal News Today
Font ResizerAa
  • World
  • Politics
  • Sports
  • Business
  • Science
  • Technology
  • Entertainment
  • Home
    • Home 1
    • Home 2
    • Home 3
    • Home 4
    • Home 5
  • Demos
  • Categories
    • Technology
    • Business
    • Sports
    • Entertainment
    • World
    • Politics
    • Science
    • Health
  • Bookmarks
  • More Foxiz
    • Sitemap
Have an existing account? Sign In
Follow US
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Business

UNC6783 Hackers Use Fake Okta Pages in Corporate Breach Campaign – Hackread

Editorial Staff
Last updated: April 10, 2026 12:34 pm
Editorial Staff
18 hours ago
Share
SHARE

Cybersecurity experts at Google Threat Intelligence Group (GTIG) have issued a warning about a new group of hackers, known as UNC6783, who are trying to steal data from large companies for data theft extortion. Austin Larsen, a lead analyst at GTIG, reports that this group might be linked to an individual using the name Raccoon.
The hackers have so far targeted dozens of high-value organisations across various industries by compromising the security of Business Process Outsourcers (BPOs). These are third-party service providers responsible for handling tasks such as customer service and technical support for larger corporations. By targeting these partner firms, hackers can gain access to the main systems of the companies they really want to target for data theft.
According to Larsen, the group uses a special phishing kit to bypass standard security. The attack kicks off with social engineering, where hackers use live chat windows to talk to employees. They pretend to be helpful but actually send links to fake login pages that look like the real Okta service used by many offices. These fake websites use addresses like <org>zendesk-support<##>com to look official.
Once an employee tries to log in, the hackers steal information from the person’s computer clipboard. This allows the attackers to add their own phones or laptops to the company’s security list. This is called enrolling a device for persistent access, which means they can get back into the system whenever they want.
GTIG’s research reveals that the hackers use several different methods to trick employees. They sometimes send messages about fake security software updates, containing the malware installer. If the employee downloads the update, a Remote Access Trojan (RAT) gets installed instead, which lets the hackers remotely control the computer. After they take the files they want, they send ransom notes using Proton Mail.
For staying safe, Mandiant and Google recommend that organisations start using physical security keys, like Titan Security Keys, instead of just text message codes. These use a standard called FIDO2, which is much harder for hackers to crack. Also, they must monitor live chat logs and block suspicious web links that follow the Zendesk pattern. Regularly checking which devices are allowed to log in is another good practice to prevent these hackers from invading the system.
Industry experts shared their thoughts on these findings with Hackread.com. John Watters, CEO at iCOUNTER, believes this represents a major change in how hackers work. Watters stated: “What’s emerging with UNC6783 and the Raccoon persona is not just another social engineering campaign; it’s a deliberate strategy to enter through the ecosystem instead of attacking the enterprise head-on.”
He explained that by targeting live support channels, hackers are exploiting the trust between companies and their partners. Watters added: “Raccoon isn’t attacking companies, it’s attacking the relationships companies rely on to operate. If you’re not defending your ecosystem, you’re leaving the front door open through someone else’s system.”
Mika Aalto, Co-Founder and CEO at Hoxhunt, says that these attackers are using psychological tricks to beat strong security. “Attackers don’t need to hack through security systems when they can persuade people to open the door,” Aalto stated, suggesting that targeting helpdesk teams is very effective because they handle sensitive requests every day.
To stay safe, he recommends training employees with realistic simulations so they can spot suspicious chats and report them as soon as they happen.
Your email address will not be published. Required fields are marked *







Email Address*
FIRSTNAME
LASTNAME

The display of third-party trademarks and trade names on the site do not necessarily indicate any affiliation or endorsement of Hackread.com. If you click an affiliate link and buy a product or service, we may be paid a fee by that merchant.

source

SPAC deal nears close as Instinct Brothers targets Nasdaq listing – Stock Titan
Assessing AES (AES) Valuation As Mixed Returns Contrast With Discounted Earnings Multiple – simplywall.st
Sony : Corporate Strategy and Earnings Announcement Presentation (5/8) – marketscreener.com
Reflecting On Drug Development Inputs & Services Stocks’ Q4 Earnings: IQVIA (NYSE:IQV) – StockStory
Lufthansa Technik completes first 787 cabin modification – Aviation Business News
Share This Article
Facebook Email Print
Previous Article How IBM Is Using the Masters to Test the Future of Fan CX – CX Today
Next Article In the Press: Privatize TSA, Presidential Budget Cuts, DHS Oversight, and 3 Percent Deficit Target – The Debt Dispatch
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • World
  • Politics
  • Business
  • Technology
  • Science
  • Entertainment
  • Sports
  • Health
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..
[mc4wp_form]
Zero spam, Unsubscribe at any time.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?