{"id":45310,"date":"2026-04-10T22:10:47","date_gmt":"2026-04-10T14:10:47","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/unc6783-hackers-use-fake-okta-pages-in-corporate-breach-campaign\/"},"modified":"2026-04-10T22:10:47","modified_gmt":"2026-04-10T14:10:47","slug":"unc6783-hackers-use-fake-okta-pages-in-corporate-breach-campaign","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/unc6783-hackers-use-fake-okta-pages-in-corporate-breach-campaign\/","title":{"rendered":"UNC6783 Hackers Use Fake Okta Pages in Corporate Breach Campaign"},"content":{"rendered":"\n<p>Cybersecurity experts at Google Threat Intelligence Group (GTIG) have issued a warning about a new group of hackers, known as UNC6783, who are trying to steal data from large companies for <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/19-year-old-admits-powerschool-data-breach-extortion\/\" data-type=\"post\" data-id=\"130203\">data theft extortion<\/a>. Austin Larsen, a lead analyst at GTIG, reports that this group might be linked to an individual using the name Raccoon.<\/p>\n<p>The hackers have so far targeted dozens of high-value organisations across various industries by compromising the security of Business Process Outsourcers (BPOs). These are third-party service providers responsible for handling tasks such as customer service and technical support for larger corporations. By targeting these partner firms, hackers can gain access to the main systems of the companies they really want to target for data theft.<\/p>\n<h3><strong>How the hackers trick the staff<\/strong><\/h3>\n<p>According to Larsen, the group uses a special phishing kit to bypass standard security. The attack kicks off with social engineering, where hackers use <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/phishing-scam-livechat-pose-as-amazon-paypal\/\">live chat<\/a> windows to talk to employees. They pretend to be helpful but actually send links to fake login pages that look like the real <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/okta-fixes-sign-on-policy-bypass-vulnerability\/\">Okta<\/a> service used by many offices. These fake websites use addresses like <code>&lt;org>zendesk-support&lt;##>com<\/code> to look official.<\/p>\n<p>Once an employee tries to log in, the hackers steal information from the person&#8217;s computer clipboard. This allows the attackers to add their own phones or laptops to the company\u2019s security list. This is called enrolling a device for persistent access, which means they can get back into the system whenever they want.<\/p>\n<h3><strong>Fake updates and ransom notes<\/strong><\/h3>\n<p>GTIG\u2019s <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7447117799153360896\/\">research<\/a> reveals that the hackers use several different methods to trick employees. They sometimes send messages about fake security software updates, containing the malware installer. If the employee downloads the update, a <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/hackers-abuse-monitoring-tool-nezha-trojan\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/hackers-abuse-monitoring-tool-nezha-trojan\/\">Remote Access Trojan<\/a> (RAT) gets installed instead, which lets the hackers remotely control the computer. After they take the files they want, they send ransom notes using <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/police-accessed-proton-mail-user-data-in-terrorism-probe\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/police-accessed-proton-mail-user-data-in-terrorism-probe\/\">Proton Mail<\/a>.<\/p>\n<p>For staying safe, Mandiant and Google recommend that organisations start using physical security keys, like Titan Security Keys, instead of just text message codes. These use a standard called <a target=\"_blank\" rel=\"noopener\" href=\"https:\/\/hackread.com\/mitm-attacks-can-bypass-fido2-security\/\">FIDO2<\/a>, which is much harder for hackers to crack. Also, they must monitor live chat logs and block suspicious web links that follow the Zendesk pattern. Regularly checking which devices are allowed to log in is another good practice to prevent these hackers from invading the system.<\/p>\n<h3><strong>Industry experts&#8217; perspectives<\/strong><\/h3>\n<p>Industry experts shared their thoughts on these findings with Hackread.com. John Watters, CEO at iCOUNTER, believes this represents a major change in how hackers work. Watters stated: \u201cWhat\u2019s emerging with UNC6783 and the Raccoon persona is not just another social engineering campaign; it\u2019s a deliberate strategy to enter through the ecosystem instead of attacking the enterprise head-on.\u201d<\/p>\n<p>He explained that by targeting live support channels, hackers are exploiting the trust between companies and their partners. Watters added: \u201cRaccoon isn\u2019t attacking companies, it\u2019s attacking the relationships companies rely on to operate. If you\u2019re not defending your ecosystem, you\u2019re leaving the front door open through someone else\u2019s system.\u201d<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<p>Mika Aalto, Co-Founder and CEO at Hoxhunt, says that these attackers are using psychological tricks to beat strong security. \u201cAttackers don\u2019t need to hack through security systems when they can persuade people to open the door,\u201d Aalto stated, suggesting that targeting helpdesk teams is very effective because they handle sensitive requests every day. <\/p>\n<p>To stay safe, he recommends training employees with realistic simulations so they can spot suspicious chats and report them as soon as they happen.<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a target=\"_blank\" rel=\"author\" href=\"https:\/\/hackread.com\/author\/deeba\/\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"UNC6783 Hackers Use Fake Okta Pages in Corporate Breach Campaign\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity experts at Google Threat Intelligence Gro [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-45310","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45310"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45310\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}