Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Alerts on New BPO Data Theft Campaign

Google Alerts on New BPO Data Theft Campaign

Posted on April 9, 2026 By CWS

Google’s Threat Intelligence Group (GTIG) has issued a warning about a new cyber campaign aimed at business process outsourcing (BPO) companies. The attackers, identified as UNC6783, are targeting these organizations to extract sensitive information related to high-value firms. The campaign is suspected to be linked to a hacker persona known as ‘Raccoon’, who recently claimed responsibility for stealing data from a third-party Adobe supplier.

Phishing and Social Engineering Tactics

According to Austin Larsen, GTIG’s principal threat analyst, UNC6783 is employing sophisticated social engineering and phishing strategies to breach multiple industries. The primary targets are BPOs working with high-profile companies. These attackers focus on infiltrating support and helpdesk staff to gain trusted access, facilitating data theft for extortion purposes.

The assailants use live chat interactions to deceive employees into accessing spoofed Okta login pages. A phishing toolkit is also in use to capture clipboard contents, circumventing standard multi-factor authentication (MFA) processes. GTIG reports that the attackers create fake Zendesk support pages mimicking the targeted organization’s domain to reinforce their scams.

Persistent Access and Extortion Techniques

By exploiting employee credentials, the hackers enroll their own devices within the compromised network, ensuring continued access. GTIG notes that the attackers deploy fake security software updates to trick victims into downloading remote access malware. After data exfiltration, UNC6783 uses Proton Mail accounts to send ransom demands, leveraging stolen data for extortion.

The tactics described by GTIG align with previous claims by a hacker known as Mr. Raccoon, who boasted of stealing extensive Adobe data from an Indian BPO firm. This data allegedly includes personal details of 15,000 employees, millions of support tickets, and bug bounty submissions.

Implications and Industry Response

The attack reportedly began with a phishing email targeting a BPO support agent, who unknowingly activated a remote access trojan (RAT). This action granted the hacker full control over the agent’s system. Further reconnaissance allowed the attacker to send a second phishing email using the employee’s address, leading to the compromise of managerial credentials for a support platform. With these credentials, Mr. Raccoon claimed to have extracted the entire Adobe database in one request.

SecurityWeek has reached out to Adobe for comments on these claims and will provide updates if the company responds. This incident underscores the critical need for robust cybersecurity measures, especially for BPOs handling sensitive corporate data.

Related reports highlight similar security breaches, including the Eurail data breach affecting 300,000 people and a data security incident at Lloyds impacting 450,000 individuals.

Security Week News Tags:Adobe, BPO, corporate data, Cybersecurity, data theft, Google, GTIG, multi-factor authentication, Phishing, Raccoon, social engineering, Threat Actors, UNC6783

Post navigation

Previous Post: Massive Data Breach Hits China’s Tianjin Supercomputing Center
Next Post: RoningLoader Malware Exploits Advanced Evasion Tactics

Related Posts

Sophisticated Koske Linux Malware Developed With AI Aid Sophisticated Koske Linux Malware Developed With AI Aid Security Week News
Siemens and Schneider Lead ICS Patch Tuesday Updates Siemens and Schneider Lead ICS Patch Tuesday Updates Security Week News
Approov Raises .7 Million for Mobile App Security Approov Raises $6.7 Million for Mobile App Security Security Week News
Russian Group Star Blizzard Utilizes DarkSword iOS Exploit Russian Group Star Blizzard Utilizes DarkSword iOS Exploit Security Week News
Europol-Coordinated Global Operation Takes Down Pro-Russian Cybercrime Network Europol-Coordinated Global Operation Takes Down Pro-Russian Cybercrime Network Security Week News
Apple Patches 19 WebKit Vulnerabilities  Apple Patches 19 WebKit Vulnerabilities  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Addressing Security Risks of Unregulated AI in Businesses
  • Critical Chrome Security Flaws Allow Remote Code Execution
  • Eurail Breach Affects 300,000 Customers’ Data
  • RoningLoader Malware Exploits Advanced Evasion Tactics
  • Google Alerts on New BPO Data Theft Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Addressing Security Risks of Unregulated AI in Businesses
  • Critical Chrome Security Flaws Allow Remote Code Execution
  • Eurail Breach Affects 300,000 Customers’ Data
  • RoningLoader Malware Exploits Advanced Evasion Tactics
  • Google Alerts on New BPO Data Theft Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark