Imagine typing 'forgot password' into chat support, only for hackers to snag your credentials. Google's latest alert on UNC6783 shows BPOs are prime targets for this extortion racket.
theAIcatchupApr 09, 20263 min read
⚡ Key Takeaways
UNC6783 exploits live chats at BPOs for credential theft and extortion, bypassing MFA via clipboard grabs.𝕏
Switch to FIDO2 keys immediately—SMS and app MFA are sitting ducks.𝕏
This isn't new; it's Lapsus$ tactics evolved for profit, hitting helpdesks hardest.𝕏
The 60-Second TL;DR
UNC6783 exploits live chats at BPOs for credential theft and extortion, bypassing MFA via clipboard grabs.
Switch to FIDO2 keys immediately—SMS and app MFA are sitting ducks.
This isn't new; it's Lapsus$ tactics evolved for profit, hitting helpdesks hardest.