CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 10, 2026

Threat cluster launches extortion campaign using social engineering - Cybersecurity Dive

Cybersecurity Dive Archived Apr 10, 2026 ✓ Full text saved

Threat cluster launches extortion campaign using social engineering Cybersecurity Dive

Full text archived locally
✦ AI Summary · Claude Sonnet


    Threat cluster launches extortion campaign using social engineering Researchers said the hackers are compromising business process outsourcers and targeting help desk support. Published April 7, 2026 David Jones Reporter Share License Add us on Google Getty Images A social engineering campaign by a financially motivated threat cluster has been uncovered extort payments from dozens of targeted organizations, according to researchers at Google Threat Intelligence Group. The threat cluster, tracked as UNC6783, operates by compromising business process outsourcers that work with targeted organizations, Austin Larsen, principal threat analyst at GTIG, said in a LinkedIn post. The cluster has potential ties to an operative using the “Raccoon” persona. In other cases, hackers set their sights on support or help desk staff at the targeted entities in order to gain trust and steal sensitive data. The hackers have used a live chat to direct employees to malicious Okta login pages, according to Larsen. Phishing kits are used to bypass multifactor authentication. The hackers then use their own enrolled device to gain persistent access to a targeted environment. In some cases, fake security software has been used to trick workers into downloading remote access malware. The threat cluster has used Proton emails to send ransom notes to victims.  GTIG researchers have not named any specific organizations that were impacted, but said that several dozen were targeted across multiple industry sectors.  Cybersecurity Dive previously learned that a persona called Mr. Raccoon had taken credit for a social engineering attack against Adobe. The hacker claimed to have exfiltrated a large number of support tickets. Adobe did not respond to a request for comment.  Security teams should implement phishing resistant multifactor authentication and proactively block unauthorized domains. Add us on Google Share PURCHASE LICENSING RIGHTS Filed Under: Threats
    💬 Team Notes
    Article Info
    Source
    Cybersecurity Dive
    Category
    ◇ Industry News & Leadership
    Published
    Apr 10, 2026
    Archived
    Apr 10, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗