PROMIT NOW · SECURITY DAILY · 2026-04-11

Helpdesk BPOs Become MFA Bypass Vector in Adobe Breach

· Security · 41 sources · 1,271 words · 6 min

Topics Agentic AI · AI Regulation · AI Safety

Attackers are bypassing your MFA by going through your helpdesk vendors — UNC6783 ('Mr. Raccoon') stole 13 million Zendesk tickets from Adobe through a compromised Indian BPO using spoofed Okta pages that steal clipboard contents to defeat TOTP, and Storm-2755 ('Payroll Pirate') is using AitM session theft to redirect employee direct deposits at organizations including security firms. Only FIDO2 hardware keys break these chains. If your BPO can reset passwords or re-enroll MFA without out-of-band verification, close that gap today.

◆ INTELLIGENCE MAP

  1. 01

    BPO & Helpdesk: Your Identity Perimeter's Weakest Link

    act now

    UNC6783 stole 13M Zendesk tickets from Adobe via compromised Indian BPO. Storm-2755 chains SEO poisoning → AitM → payroll diversion, hitting Canada and security firms. Both bypass non-FIDO2 MFA. Google and multiple threat intel sources confirm only hardware keys resist these campaigns.

    13M
    tickets stolen from Adobe
    4
    sources
    • Adobe tickets stolen
    • Package ecosystems hit
    • MFA bypass method
    • Effective defense
    1. 01UNC6783 (Mr. Raccoon)13M records via BPO
    2. 02Storm-2755 (Payroll Pirate)AitM → payroll redirect
    3. 03Spoofed Okta campaignsDozens of enterprises
  2. 02

    Critical Vulnerabilities: Ivanti EPMM, Adobe Reader, Ingress NGINX

    act now

    Ivanti EPMM CVE-2026-1340 (CVSS 9.8) hit CISA KEV April 8 with 3-day deadline — EU Commission, Netherlands, Finland already compromised. Adobe Reader zero-day has new C2 IOC (188.214.34.20:34123). Ingress NGINX hit EOL with 2 unpatched critical CVEs at your Kubernetes edge. Ninja Forms RCE affects hundreds of thousands of WordPress sites.

    9.8
    Ivanti EPMM CVSS score
    5
    sources
    • Ivanti CVSS
    • Adobe zero-day age
    • CISA KEV deadline
    • Nginx EOL CVEs
    1. Ivanti EPMM9.8
    2. Adobe Reader 0day9
    3. Ninja Forms RCE9
    4. Ingress NGINX (2)9
  3. 03

    AI Agent Security: 78% Execute Malicious Code, Zero Detection

    monitor

    78% of tested LLM systems execute malicious code from compromised packages undetected. Subliminal prompts propagate virally across multi-agent systems. 30%+ of Vercel deployments are now agent-initiated. Vercel's Claude Code plugin harvests all prompts and bash commands cross-project. Qwen Code ships with Telegram/WeChat remote control — structurally indistinguishable from C2.

    78%
    LLM agents exploitable
    6
    sources
    • LLMs executing malware
    • Agent deployments
    • Qwen Code C2 channels
    • Detection coverage
    1. LLM agents executing malicious code undetected78
  4. 04

    Quantum Cryptography Threshold Collapses to ~10,000 Qubits

    background

    CalTech/Oratomic and Google Quantum AI independently confirmed the qubit threshold for breaking RSA/ECC dropped from millions to ~10,000 — viable machines potentially operational before 2030. China deployed 100-qubit Huanyuan 1. 1.7M BTC ($102B) sit in quantum-vulnerable addresses. Harvest-now-decrypt-later is already active. Begin cryptographic inventory and PQC migration planning with NIST-vetted algorithms.

    ~10K
    qubits to break ECC
    3
    sources
    • Previous estimate
    • New estimate
    • Viable timeline
    • Quantum-vulnerable BTC
    1. Previous qubit estimate1000000
    2. New qubit estimate10000
  5. 05

    Healthcare Sector Under Direct Patient-Safety Attack

    monitor

    Signature Healthcare (Brockton, MA) diverted ambulances, cancelled chemotherapy, closed pharmacies since April 7. ChipSoft ransomware took EHR systems offline at 11 Dutch hospitals simultaneously — a single vendor compromise with 11x blast radius. Both incidents demonstrate direct patient safety impact from cyber operations targeting healthcare supply chains.

    11
    hospitals hit via one vendor
    1
    sources
    • Signature Healthcare
    • Dutch hospitals offline
    • ChipSoft vector
    • Patient impact
    1. Signature Healthcare (US)1
    2. ChipSoft (Netherlands)11

◆ DEEP DIVES

  1. 01

    Your Helpdesk Is the New Front Door: BPO Supply Chain Attacks Bypass MFA at Scale

    <h3>Two Campaigns, One Broken Trust Model</h3><p>Two distinct threat actors are exploiting the same architectural flaw: <strong>outsourced support vendors sit inside your identity perimeter</strong> with the ability to reset passwords, re-enroll MFA, and modify authentication workflows — and attackers are going through them instead of through you.</p><p><strong>UNC6783 ('Mr. Raccoon')</strong> targets BPO providers handling customer support for large enterprises. Google's threat intelligence documents the playbook: compromise the BPO, then use their legitimate access to <strong>steal Zendesk tickets en masse</strong>. The Adobe breach alone yielded <strong>13 million support tickets</strong> stolen through a compromised Indian BPO. Their phishing kit uses spoofed Okta pages following patterns like <code>company.zendesk-support##.com</code> and captures <strong>clipboard contents to bypass TOTP codes</strong> copied from authenticator apps. Only FIDO2/hardware keys resist this technique.</p><p><strong>Storm-2755 ('Payroll Pirate')</strong> takes a different path to the same destination. Microsoft tracks this actor using SEO poisoning and malvertising to drive employees to fake Office 365 login pages. An <strong>adversary-in-the-middle proxy captures session tokens</strong>, defeating MFA entirely. Once inside, they search for HR and payroll contacts, create inbox rules to hide their activity, then email HR to redirect direct deposit information. <em>Vulnerable U — a security-focused organization — was itself targeted by this campaign.</em></p><hr><h4>Why Your EDR Won't Save You</h4><p>These attacks are <strong>invisible to endpoint detection</strong> because nothing anomalous happens on the endpoint. The compromise occurs in the identity layer — legitimate credentials, legitimate SSO flows, legitimate-looking user behavior. Your EDR fires when malware executes; it doesn't fire when a valid session token authenticates through Okta.</p><table><thead><tr><th>Detection Layer</th><th>Effectiveness</th><th>Gap</th></tr></thead><tbody><tr><td>EDR/Endpoint</td><td>Low</td><td>Valid credentials + legitimate SSO = no anomaly</td></tr><tr><td>Network/DNS</td><td>Medium</td><td>Can detect spoofed Okta domains if DNS telemetry monitored</td></tr><tr><td>Identity Analytics</td><td>High</td><td>Impossible travel, MFA re-enrollment spikes detectable</td></tr><tr><td>BPO Access Monitoring</td><td>High</td><td>Most orgs don't monitor support vendor identity ops at all</td></tr><tr><td>FIDO2 MFA</td><td>Preventive</td><td>Keys can't be replayed through spoofed pages</td></tr></tbody></table><blockquote>If your BPO agent can reset an executive's password without a second verification channel, that's your highest-priority finding today.</blockquote><h4>The Payroll Endgame</h4><p>Storm-2755's targeting of payroll is particularly insidious because the fraud often isn't detected until an employee reports a missing paycheck — <strong>days or weeks after the redirect</strong>. Zephyr Energy lost <strong>€700K</strong> to a contractor payment redirect using similar TTPs. The actor creates inbox rules to auto-delete confirmation emails, ensuring neither the compromised employee nor HR sees evidence of the change until it's too late.</p>

    Action items

    • Map every BPO, call center, and helpdesk contractor that can trigger password resets, MFA re-enrollment, or Okta session modifications — then apply conditional access policies restricting these actions to verified contexts
    • Deploy FIDO2/WebAuthn hardware keys to all admin accounts, helpdesk staff, HR/payroll teams, and executives within 30 days
    • Mandate out-of-band phone verification for all payroll/direct deposit changes — no exceptions for email or chat requests
    • Monitor for spoofed domains matching patterns like company.zendesk-support##.com and deploy impossible travel detection on Okta

    Sources:Adobe Reader zero-day has no patch, DPRK is in 5 of your package managers · FortiClient EMS zero-day is live, BlueHammer is unpatched · Your helpdesk is the new front door

  2. 02

    AI Agents Are Your New Unmonitored Privileged Users — And 78% Execute Malicious Code Without Detection

    <h3>The Research That Should Change Your Agent Policy</h3><p>New research findings this cycle quantify what security teams have been warning about: <strong>78% of tested LLM systems executed malicious code from compromised agent packages</strong> without any detection mechanism firing. Separately, researchers demonstrated that <strong>subliminal prompts embedded in one AI agent's output propagate virally</strong> to downstream agents in multi-agent architectures — a worm-like propagation mechanism with no production defenses.</p><p>These aren't theoretical attacks. They exploit the fundamental design of AI agents: the willingness to install packages, execute code, and pass instructions between systems based on natural language context. Your EDR, SAST, and SCA tools have <strong>zero coverage</strong> for this attack pattern because it doesn't match any signature — it's the agent doing exactly what it was designed to do, just with adversarial input.</p><hr><h3>The Scale of Unmonitored Agent Access</h3><p>Multiple data points converge to show how far ahead agent adoption has raced past security controls:</p><ul><li><strong>30%+ of Vercel deployments</strong> are now agent-initiated — non-human actors pushing code to production at scale</li><li><strong>Vercel's Claude Code plugin</strong> harvests all developer prompts and full bash commands across every project, regardless of Vercel relevance — a broad-scope telemetry collection mechanism inside your most trusted dev environment</li><li><strong>Alibaba's Qwen Code v0.14.x</strong> ships with remote control via Telegram, DingTalk, and WeChat plus cron-scheduled task execution — traffic patterns structurally indistinguishable from C2</li><li><strong>Claude Managed Agents</strong> now autonomously read files, run commands, browse the web, and execute code on Anthropic's infrastructure with your data</li></ul><table><thead><tr><th>Agent Capability</th><th>ATT&CK Parallel</th><th>Risk Level</th></tr></thead><tbody><tr><td>Remote control via messaging</td><td>T1102 — Web Service C2</td><td>High</td></tr><tr><td>Scheduled autonomous execution</td><td>T1053 — Scheduled Task/Job</td><td>High</td></tr><tr><td>Terminal access & file inspection</td><td>T1059 — Command Interpreter</td><td>High</td></tr><tr><td>Cross-project data collection</td><td>T1005 — Data from Local System</td><td>High</td></tr></tbody></table><blockquote>Your CI/CD pipeline likely has AI agents with more credential access than your junior developers — and fewer guardrails than your interns.</blockquote><h3>Why This Is Different From Shadow IT</h3><p>Traditional shadow IT involved employees using unauthorized SaaS apps. AI agents are <strong>autonomous actors with delegated credentials</strong> that make decisions, execute code, and interact with production systems. When a Vercel plugin collects all bash commands across every project, that's not an employee using an unapproved tool — it's a <strong>persistent data collection mechanism operating inside your development environment</strong> by design, not by misconfiguration.</p><p>The emergence of dedicated sandboxing tools like <strong>JAI ('Jail your AI agent')</strong> and <strong>IronClaw</strong> (Wasm-sandboxed agent harness isolating credentials from the LLM) confirms the industry recognizes this gap. If the market is building containment products, the containment problem is real.</p>

    Action items

    • Audit all Claude Code plugin installations across development teams this week — specifically check for Vercel plugin — and restrict write access to Claude.md configuration files via CODEOWNERS
    • Deploy network detection rules for Telegram Bot API, DingTalk webhook, and WeChat Work API traffic from developer workstations and CI/CD environments
    • Sandbox all LLM agent code execution environments with explicit package allowlists — treat agent-installed packages as untrusted by default
    • Publish an AI agent acceptable-use policy covering approved frameworks, permitted access scopes, and remote control channel restrictions before end of quarter

    Sources:78% of LLM agents blindly execute malicious code · Autonomous AI agents with remote control channels · That Vercel plugin in your devs' Claude Code is exfiltrating every prompt · 30% of Vercel Deployments Are Now Agent-Initiated

  3. 03

    Quantum Cryptography Timeline Compressed to Pre-2030 — Start Your PQC Migration Now

    <h3>The Qubit Threshold Just Collapsed</h3><p>Two independent research tracks published this cycle converge on the same conclusion: the hardware requirements for a <strong>cryptographically relevant quantum computer (CRQC)</strong> capable of breaking RSA and ECC are dropping far faster than anyone's migration plans assumed.</p><p><strong>CalTech/Oratomic/UC</strong> demonstrated neutral-atom array advances that reduce the estimated qubit threshold from <strong>millions down to approximately 10,000</strong>. Separately, <strong>Google Quantum AI</strong> reported major reductions in physical qubits needed to crack 256-bit ECC, though specific counts weren't disclosed. China has commercially deployed the <strong>100-qubit Huanyuan 1</strong> system and demonstrated capabilities publicly at MWC Shanghai.</p><table><thead><tr><th>Research Source</th><th>Finding</th><th>Previous Assumption</th><th>New Estimate</th></tr></thead><tbody><tr><td>CalTech / Oratomic / UC</td><td>Neutral-atom array advances</td><td>Millions of qubits</td><td>~10,000 qubits</td></tr><tr><td>Google Quantum AI</td><td>Physical qubit reduction for ECC</td><td>Impractically large</td><td>"Major reduction"</td></tr></tbody></table><hr><h3>Why This Matters Today, Not in 2030</h3><p><strong>Harvest-now-decrypt-later (HNDL)</strong> means the threat is already active. Any data with a secrecy requirement beyond ~2030 that's currently protected by RSA or ECC should be treated as potentially compromised to future decryption. This is especially acute for:</p><ul><li><strong>Blockchain/cryptocurrency</strong> — 1.7 million BTC (~$102B) sit in quantum-vulnerable pay-to-public-key (p2pk) addresses where public keys are permanently exposed on-chain with no migration path</li><li><strong>Healthcare records</strong> subject to HIPAA's indefinite protection requirements</li><li><strong>Diplomatic and classified communications</strong> with multi-decade secrecy needs</li><li><strong>PKI/TLS infrastructure</strong> where certificate rotation is operationally complex</li></ul><p>Even skeptics place a CRQC at 2029–2035. The critical point: <em>Western PQC migration timelines are being set by adversary capability development, not by our own readiness.</em> NIST-vetted post-quantum algorithms exist (ML-KEM, ML-DSA, SLH-DSA). The question is whether your organization is treating migration as a roadmap item or an active program.</p><blockquote>What was a theoretical two-decade planning horizon has compressed into an active deployment concern. Your cryptographic inventory is the prerequisite — and most organizations haven't started.</blockquote><h3>JPMorgan's Signal</h3><p>JPMorganChase launched a <strong>$1.5 trillion 'Security and Resiliency Initiative'</strong> spanning defense, energy, supply chain, and frontier tech including quantum computing. When the largest U.S. bank names quantum as a strategic security priority alongside defense, that's a market signal. The DOJ separately requested a <strong>285% funding increase ($149M vs. ~$38.7M)</strong> for zero-trust migration across 275,000 endpoints — indicating even federal agencies recognize the urgency of cryptographic modernization.</p>

    Action items

    • Commission a cryptographic asset inventory covering all systems using RSA, ECC, or Diffie-Hellman — prioritize by data longevity and sensitivity — within 90 days
    • Mandate crypto-agility for all new systems and major architecture decisions — the ability to swap cryptographic algorithms without full re-architecture
    • Audit Bitcoin holdings for legacy p2pk address format and migrate to p2pkh or newer address types that don't expose public keys until spend-time
    • Build a phased PQC migration roadmap prioritizing HNDL-vulnerable data stores with >5 year secrecy requirements, then TLS/PKI infrastructure

    Sources:Unpatched Adobe Reader zero-day has been hitting your users since November · 5,219 exposed PLCs in your critical infrastructure supply chain · 1.7M BTC in quantum-vulnerable addresses

◆ QUICK HITS

  • Ivanti EPMM CVE-2026-1340 (CVSS 9.8) added to CISA KEV with April 11 deadline — EU Commission, Netherlands, and Finland already compromised within 24 hours of January disclosure; a 69-day gap before KEV listing means orgs relying on KEV for prioritization missed this

    Two zero-days hitting your endpoints right now

  • Update: Adobe Reader zero-day now has C2 IOC 188.214.34.20:34123 — campaign uses util.readFileIntoStream() and RSS.addFeed() APIs to exfiltrate files and beacon; no patch, no CVE, exploited since November 2025; block the IOC and disable Acrobat JavaScript via GPO today

    Unpatched Adobe Reader zero-day has been hitting your users since November

  • CVE-2026-0740: Ninja Forms File Upload WordPress plugin allows unauthenticated RCE on hundreds of thousands of sites — actively exploited, no auth or user interaction required; scan all WordPress instances including shadow marketing sites

    Adobe Reader zero-day has no patch, DPRK is in 5 of your package managers

  • Update: Lapsus$ claims Mercor breach via LiteLLM supply chain — Mercor confirms it was 'one of thousands' affected; LiteLLM proxies API credentials for every LLM provider in your stack; scan all repos for litellm dependencies and rotate API keys

    Claude Mythos Can Out-Hack Your Defenders — and Lapsus$ Just Hit Your AI Supply Chain via LiteLLM

  • Ingress NGINX reached EOL in March 2026 with two unpatched critical CVEs (CVE-2026-24512, CVE-2026-3288) — no fix path exists; migrate to Kubernetes Gateway API or deploy WAF upstream

    Ingress NGINX is EOL with 2 unpatched critical CVEs

  • Chrome 147 launches Device Bound Session Credentials (DBSC), cryptographically binding auth cookies to the device — significant defense against infostealer-based session hijacking; prioritize fleet rollout

    Adobe Reader zero-day has no patch, DPRK is in 5 of your package managers

  • Signature Healthcare (Brockton, MA) diverting ambulances, cancelling chemotherapy, closing pharmacies since April 7; ChipSoft ransomware took EHR systems offline at 11 Dutch hospitals — one vendor compromise cascading to 11 healthcare providers

    Two zero-days hitting your endpoints right now

  • FBI recovered deleted Signal messages from iPhone notification database in Texas anti-ICE case — E2E encryption is irrelevant when iOS caches plaintext in forensically accessible notification logs; disable notification previews for Signal on managed devices via MDM

    Adobe Reader zero-day has no patch, DPRK is in 5 of your package managers

  • BKA identified Daniil Shchukin (UNKN, age 31) and Anatoly Kravchuk (age 43) as former GandCrab/REvil leaders — 130+ extortion cases, €35M+ damages, EU Most Wanted, believed sheltering in Russia

    Two zero-days hitting your endpoints right now

  • React Server Components vulnerability patched across three version lines simultaneously (19.0.5, 19.1.6, 19.2.5) — no CVE published yet; verify all production React RSC apps are updated

    React Server Components vulnerability patched across 3 version lines

  • CIA elevated Center for Cyber Intelligence to full mission center; France merged electromagnetic/cyber into new EW division; China's 15th Five-Year Plan names 'cyber superpower' as a national priority — institutional signal that nation-state cyber investment is accelerating across all major powers

    Adobe Reader zero-day has no patch, DPRK is in 5 of your package managers

BOTTOM LINE

Your identity perimeter's weakest link isn't your firewall — it's the BPO agent who can reset your CEO's password: UNC6783 stole 13 million Zendesk tickets from Adobe through a compromised outsourced helpdesk, Storm-2755 is redirecting employee paychecks via session token theft that defeats non-FIDO2 MFA, 78% of LLM agents in your dev environment execute malicious code with zero detection, and the quantum threat timeline just compressed from 'decades away' to 'before your current strategy expires' — deploy hardware security keys to privileged users, sandbox your AI agents, and start your cryptographic inventory this quarter.

Frequently asked

Why don't EDR tools detect the UNC6783 and Storm-2755 attack chains?
These attacks occur entirely in the identity layer using legitimate credentials and SSO flows, so nothing anomalous executes on the endpoint. EDR fires on malware execution, not on a valid session token authenticating through Okta or a BPO agent performing a sanctioned password reset. Detection requires identity analytics, DNS telemetry for spoofed domains, and monitoring of vendor identity operations.
Why are FIDO2 hardware keys the only MFA that stops both campaigns?
UNC6783's phishing kit steals clipboard contents to capture TOTP codes the moment they're copied from authenticator apps, and Storm-2755 uses an adversary-in-the-middle proxy to steal session tokens after MFA completes. FIDO2/WebAuthn binds the authentication to the legitimate origin cryptographically, so credentials cannot be replayed through a spoofed page or proxy. Every other MFA factor — SMS, TOTP, push — fails against at least one of these techniques.
What concrete controls close the BPO access gap today?
Require out-of-band verification — typically a phone call to a known number — for any BPO-initiated password reset, MFA re-enrollment, or direct deposit change, with no exceptions for email or chat requests. Apply conditional access policies restricting vendor identity operations to verified contexts, and monitor helpdesk activity for MFA re-enrollment spikes and impossible travel. These changes break both attack chains without waiting for hardware key rollout.
How should payroll and HR teams be hardened against direct deposit redirect fraud?
Mandate out-of-band phone verification to a pre-registered number for every direct deposit or banking change request, and alert on inbox rules that auto-delete or hide HR correspondence. Storm-2755's entire playbook depends on email-only social engineering and hidden confirmation messages, so a single callback requirement defeats it. Prioritize FIDO2 keys for HR, payroll, and finance staff since they're explicitly targeted.
What domain patterns should defenders proactively block?
UNC6783 uses predictable spoofed Okta lookalikes following formats such as company.zendesk-support##.com, where ## is a numeric suffix. Deploy DNS and proxy blocks for newly registered domains matching your brand combined with zendesk, okta, or support keywords, and feed these patterns into your phishing takedown service. Pair this with impossible-travel detection on Okta to catch sessions that evade the domain filter.

◆ ALSO READ THIS DAY AS

◆ RECENT IN SECURITY