Subscribe

Social Media Links

Insights

 | 3 minute read

Ankura CTIX FLASH Update – April 10, 2026

Malware Activity

Hiding in Plain Sight as Malware Abuses Trust and Everyday Technology

Recent research highlights two major cybercrime campaigns that show how attackers are becoming more subtle and deceptive in stealing sensitive data. In one case, hackers compromised Magento‑based online stores by hiding credit‑card‑stealing malware inside a nearly invisible, one‑pixel SVG image embedded directly in a website’s code. When customers clicked “checkout,” they were shown a convincing fake payment page that quietly captured and encrypted their card details before sending them to attacker‑controlled servers. In a separate campaign targeting macOS users, attackers used fake Apple‑themed web pages to trick victims into launching the built‑in Script Editor, a trusted macOS tool, to run hidden malicious code. This approach bypassed newer Apple security warnings and installed Atomic Stealer malware, which can harvest passwords, browser data, cryptocurrency wallets, and financial information. Together, these campaigns demonstrate how attackers are shifting away from obvious malware tactics and instead abuse trusted technologies and user habits to remain hidden longer and increase their success. CTIX analysts will continue to report on the latest malware strains and attack methodologies.


Threat Actor Activity

UNC6783 Targets BPOs and Zendesk Support in Ongoing Data Extortion Campaign

Google Threat Intelligence Group (GTIG) recently highlighted ongoing activity from a financially motivated threat actor tracked as UNC6783, linked to a persona known as “Raccoon,” that continues to target high value enterprises across multiple sectors. The actor’s primary strategy focuses on compromising business process outsourcing (BPO) providers that support these organizations, though direct targeting of internal helpdesk and support teams has also been observed. Attacks rely heavily on social engineering and commonly abuse live chat interactions to redirect employees to spoofed Okta login pages hosted on domains impersonating the victim organization using legitimate Zendesk infrastructure, often following an [.]zendesk-support<##>[.]com pattern. A sophisticated phishing kit allows the attacker to steal clipboard data, bypass standard MFA, and enroll their own devices for persistent access. In parallel, fake security updates have been used to deploy remote access malware. Following data exfiltration, victims are contacted via Proton Mail with extortion demands. GTIG’s findings align with recent, unconfirmed breach claims by “Mr. Raccoon,” including alleged compromises involving Adobe and other firms through India based BPOs and the theft of large volumes of support and employee data. CTIX Analysts recommend that organizations strengthen phishing resistant MFA, monitor live chat abuse, block spoofed Zendesk-style domains, and audit MFA device enrollments as this threat continues to evolve.


Vulnerabilities

Adobe Reader Zero-Day Campaign Leveraging Malicious PDFs for Data Theft and Full System Compromise

Threat actors have been actively exploiting a highly sophisticated, previously unknown zero-day vulnerability in Adobe Reader since at least December 2025, using socially engineered PDF lures (like “Invoice540.pdf”) to entice victims into opening malicious files. These PDFs execute obfuscated JavaScript upon opening (requiring no further user interaction) and abuse unpatched functionality to invoke privileged Acrobat APIs (including util.readFileIntoStream and RSS.addFeed), enabling extensive local data harvesting, system fingerprinting, and exfiltration to attacker-controlled infrastructure. The campaign, identified by EXPMON researcher Haifei Li, has been observed targeting users for months and is confirmed to work against fully updated Adobe Reader versions, significantly elevating its risk profile. The exploit operates as a multi-stage framework capable of retrieving additional payloads and facilitating follow-on activity, including potential remote code execution (RCE) and sandbox escape (SBX), which could ultimately grant full system control. Analysis also reveals the use of Russian-language phishing lures tied to oil and gas sector events, indicating targeted social engineering. With the final payload conditions still unclear and no patch currently available, defenders are advised to monitor for indicators such as “Adobe Synchronizer” in HTTP/HTTPS User-Agent strings and restrict untrusted PDF execution, as the campaign represents a high-confidence, actively exploited threat requiring immediate vigilance.

📧 Never Miss a Briefing

Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure. 

© Copyright 2026. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with