# Google Exposes UNC6783: New Threat Group Targeting Corporate Zendesk Support Tickets
Google's Threat Intelligence team has identified a previously unknown hacking group, UNC6783, actively stealing corporate support tickets from Zendesk accounts. The discovery marks another evolution in how threat actors are targeting the "shadow crown jewels" of enterprise infrastructure — the support ticketing systems where organizations inadvertently expose sensitive technical details, credentials, and system configurations.
## The Threat
UNC6783 represents a new addition to the growing roster of financially motivated hacking groups targeting business-critical SaaS platforms. Unlike attackers focused on ransomware deployment or mass data exfiltration, UNC6783 appears specifically interested in support tickets — the seemingly mundane records of customer interactions with technical support teams.
Key characteristics of UNC6783:
Google's findings indicate that UNC6783 has successfully compromised Zendesk accounts across multiple organizations, gaining unauthorized access to sensitive support ticket data that would normally be restricted to authorized support staff.
## Why Support Tickets Matter
On the surface, support tickets appear harmless — they're simply records of customers reporting issues and receiving help. However, in practice, support tickets are goldmines of sensitive information:
| Information Type | Security Risk |
|---|---|
| Technical specifications | Reveals infrastructure architecture and software versions |
| Credentials and keys | Support staff often share temporary or permanent access tokens |
| System configurations | Details about internal systems, databases, and integrations |
| Security weaknesses | Customers often describe problems that expose security gaps |
| Business intelligence | Information about deployments, partnerships, and timelines |
| Authentication details | Password reset links, multi-factor authentication bypasses |
| API endpoints and URLs | Internal resource locations and naming conventions |
For an attacker, a single compromised Zendesk account provides a roadmap to an organization's technical infrastructure without triggering the alarms that would accompany direct penetration attempts.
## Technical Details: How UNC6783 Operates
Based on Google's analysis, UNC6783 employs a multi-stage attack methodology:
Stage 1: Initial Access
The group uses credential harvesting campaigns and targeted phishing to obtain Zendesk login credentials for support staff. The initial compromise vector appears to target support team members through:
Stage 2: Account Compromise
Once initial credentials are obtained, attackers attempt to maintain persistence by:
Stage 3: Data Exfiltration
With Zendesk access established, UNC6783 systematically exfiltrates support tickets by:
## The Broader Context
This discovery reflects a concerning trend in enterprise targeting. Support systems, help desks, and customer service platforms have become prime targets because they occupy a unique position in organizational security:
UNC6783 joins a growing list of threat actors specifically targeting SaaS support platforms. Previous campaigns have targeted similar systems at other organizations, indicating this represents an established attack pattern rather than an isolated incident.
## Implications for Organizations
The compromise of support tickets exposes organizations to cascading risks:
Immediate Threats:
Longer-term Exposure:
Organizations should assume that any information shared in support tickets may now be compromised and accessible to sophisticated threat actors.
## Detection and Investigation
Google recommends that organizations potentially affected by UNC6783 take immediate steps:
1. Audit Zendesk access logs for unusual login patterns, particularly from unexpected geographic locations or IP ranges
2. Review API token usage to identify unauthorized programmatic access
3. Check for backup email addresses added to accounts during the compromise window
4. Examine ticket exports to identify when bulk data may have been downloaded
5. Verify MFA status across all support team accounts to ensure it wasn't disabled
Organizations should treat any anomalous access as a potential breach requiring immediate incident response.
## Recommendations for Defense
Immediate Actions:
Systemic Improvements:
Long-term Strategy:
## Conclusion
The discovery of UNC6783's campaign against Zendesk users underscores that enterprise security threats extend far beyond firewalls and network perimeters. The support systems where organizations provide customer service have become critical security infrastructure requiring the same rigor applied to production environments. Organizations using Zendesk or similar support platforms should immediately audit their security posture and implement controls to prevent unauthorized access to support ticket systems.