Skip to content
Back to Home
A security and privacy dashboard with its status.

Photo by Zulfugar Karimov on Unsplash

Targeted Attacks Hit Corporate Assets

Executive Summary

Targeted attacks on corporate assets by UNC6783 and APT28 threat actors have sent shockwaves through the business community. These attacks compromise sensitive information, including customer data, financial info, and intellectual property. To mitigate these risks, organizations must implement robust security measures such as multi-factor authentication, encryption, and network segmentation. Additionally, conduct regular security audits and risk assessments to identify vulnerabilities in third-party vendors and suppliers.

Introduction

A recent wave of targeted attacks on corporate assets has sent shockwaves through the business community, with high-value companies across multiple sectors facing significant threats from advanced threat actors like UNC6783 and APT28. These threat actors have been linked to compromises of business process outsourcing providers and the deployment of sophisticated malware to gain access to sensitive information. As these threats continue to evolve, organizations must implement robust security measures to prevent and mitigate the impact of these attacks.

The stakes are high, with potential consequences including significant financial losses, reputational damage, and compromised sensitive information. According to BleepingComputer, the UNC6783 threat actor has been stealing Zendesk support tickets from business process outsourcing providers, highlighting the risk of sensitive information exposure. Meanwhile, The Hacker News reports that APT28 has been linked to a spear-phishing campaign targeting Ukraine and its allies, deploying the previously undocumented PRISMEX malware suite.

These attacks demonstrate the increasing sophistication of threat actors, who continually evolve their tactics, techniques, and procedures (TTPs) to stay ahead of security measures. The use of advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control highlights the need for organizations to implement robust security controls, such as multi-factor authentication, encryption, and network segmentation.

UNC6783 Threat Actor Compromises Business Process Outsourcing Providers

The UNC6783 threat actor compromises business process outsourcing providers to gain access to high-value companies across multiple sectors. This attack vector is particularly concerning because it allows the threat actor to bypass traditional security measures and gain access to sensitive information. According to BleepingComputer, the UNC6783 threat actor steals Zendesk support tickets from these providers, which can contain sensitive information such as customer data, financial information, and intellectual property.

The compromise of business process outsourcing providers is often facilitated by phishing campaigns or exploited vulnerabilities in software applications. Once an initial foothold is gained, the threat actor can move laterally within the network, exploiting weaknesses in internal security controls to gain access to sensitive areas. This highlights the importance of implementing robust security controls, such as multi-factor authentication and encryption, to protect sensitive information.

Organizations must conduct regular security audits and risk assessments to identify vulnerabilities in their supply chain and implement measures to mitigate these risks. This includes monitoring third-party vendors and suppliers for signs of compromise, implementing secure communication protocols, and ensuring that all software applications are up-to-date with the latest security patches.

APT28 Deploys PRISMEX Malware in Targeted Campaign

The APT28 threat actor has been linked to a spear-phishing campaign targeting Ukraine and its allies, deploying the previously undocumented PRISMEX malware suite. According to The Hacker News, PRISMEX combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command-and-control. This sophisticated malware suite is designed to evade detection and persist on compromised systems, allowing the threat actor to gain long-term access to sensitive information.

The use of PRISMEX highlights the sophistication and adaptability of modern threat actors, who continually evolve their TTPs to stay ahead of security measures. The malware's ability to hijack legitimate cloud services for command-and-control demonstrates the need for organizations to monitor their cloud infrastructure for signs of compromise and implement robust security controls, such as network segmentation and access controls.

Additionally, the use of advanced steganography techniques by PRISMEX highlights the importance of implementing robust detection and response capabilities, including threat intelligence feeds and anomaly detection systems. These capabilities can help organizations identify and respond to emerging threats in a timely manner, minimizing the impact of an attack.

Recommendations and Takeaways

To protect against these targeted attacks, organizations must implement the following robust security measures:

  • Multi-factor authentication to prevent unauthorized access to sensitive information
  • Encryption to protect data both in transit and at rest
  • Regular security audits and risk assessments to identify vulnerabilities in third-party vendors and suppliers
  • Implementation of a defense-in-depth strategy to detect and respond to emerging threats
  • Stay informed about the latest threats and trends in cybersecurity to stay ahead of emerging attacks

Additionally, organizations should consider the following best practices:

  • Implement a least-privilege access model to limit the spread of malware
  • Use secure communication protocols, such as HTTPS and SFTP, to protect data in transit
  • Conduct regular backups and store them securely to ensure business continuity in the event of an attack
  • Develop an incident response plan to quickly respond to security incidents and minimize their impact

Organizations should prioritize the following mitigation guidance:

  • Monitor third-party vendors and suppliers for signs of compromise
  • Implement secure communication protocols, such as end-to-end encryption, to protect sensitive information
  • Ensure that all software applications are up-to-date with the latest security patches
  • Implement network segmentation and access controls to limit the spread of malware
  • Conduct regular security awareness training for employees to prevent phishing and other social engineering attacks

By following these recommendations and staying informed about the latest threats and trends in cybersecurity, organizations can reduce their risk of falling victim to targeted attacks and protect their sensitive information. As the threat landscape continues to evolve, it is essential for organizations to remain vigilant and adapt their security measures to stay ahead of emerging threats.

In conclusion, the recent wave of targeted attacks on corporate assets highlights the need for organizations to implement robust security measures to prevent and mitigate the impact of these attacks. By understanding the tactics, techniques, and procedures (TTPs) used by threat actors like UNC6783 and APT28, organizations can better protect themselves against emerging threats. To prioritize mitigation, organizations should:

  • Apply the latest security patches to all software applications
  • Implement multi-factor authentication for all users
  • Conduct regular security audits and risk assessments
  • Develop an incident response plan to quickly respond to security incidents
  • Stay informed about the latest threats and trends in cybersecurity through reputable sources like BleepingComputer and The Hacker News.
Sources
Related Articles
ProjectZyper AI ProjectZyper AI

AI-powered cybersecurity threat intelligence. Aggregated, analyzed, and published daily.

Powered by AI

Status

Live threat monitor Monitoring threat feeds — updated hourly

AI-generated content. Verify critical information independently.

© 2026 ProjectZyper AI. All rights reserved.