
Most people think of the helpdesk as the cavalry. They are the folks you call when your password expires or when your laptop refuses to connect to the printer. They are designed to be helpful. In fact, their entire performance is usually measured by how quickly and kindly they can solve your problems. That helpfulness is exactly what sophisticated hackers are now using against you.
The cybersecurity for business landscape has shifted significantly over the last few years. We used to worry mostly about malware or unpatched servers. Now, the biggest risk might be a polite person on the other end of a phone line. This isn't just theory. We are seeing a massive surge in attacks targeting helpdesks and Business Process Outsourcing (BPO) centers. These groups are systematically dismantling even the most expensive security stacks by simply asking for the keys.
As a technology advisor, I spend a lot of time helping businesses look past the shiny brochures of security vendors. The reality is that if your human processes are flawed, the most expensive software in the world won't save you. We need to talk about the "Helpdesk Trap" and how you can avoid it.
The Rise of Mr. Raccoon and UNC6783
There is a group currently being tracked by researchers under names like UNC6783, though some in the industry refer to the broader activity as "Mr. Raccoon." These aren't your stereotypical hackers in hoodies. These are highly organized professionals who treat cybercrime like a corporate sales job. They have scripts, they have managers, and they have incredible patience.
Their primary targets are the helpdesks of large organizations or the third-party BPO companies that handle support for dozens of other businesses. The strategy is simple but devastating. They call the helpdesk and pretend to be an employee who has lost access to their account. They use a technique called vishing, or voice phishing, to build rapport with the support agent.
They don't just guess passwords. They use information gleaned from social media and data breaches to answer security questions. Once they have convinced the agent of their identity, they ask for the one thing they need to take over the company. They ask the agent to register a new device for Multi-Factor Authentication (MFA).
The Illusion of Safety in Push Notifications
For a long time, we told everyone that push-based MFA was the gold standard. You enter your password, your phone buzzes, and you tap "Approve." It felt secure. However, attackers have found two very effective ways around this.
The first is MFA fatigue. The attacker triggers dozens of push notifications to the real employee’s phone in the middle of the night. Eventually, the annoyed employee taps "Approve" just to make the buzzing stop.
The second method is more technical and much more dangerous. It is called Adversary-in-the-Middle (AiTM). The attacker sets up a fake login page that looks identical to a company’s Okta or Microsoft 365 portal. When the employee enters their credentials on the fake page, the attacker captures them in real time. The fake page then prompts the user for their MFA code. When the user enters it, the attacker passes that code to the real login site immediately.
At this point, the attacker has a session token. They are effectively "logged in" as the employee, and they don't need the password or the phone anymore. When this happens at the helpdesk level, the attacker can reset the MFA for any user in the company.

Why Traditional IT Consulting Often Misses This
Many IT consulting firms focus heavily on the "stack." They want to sell you the newest firewall or the most advanced endpoint detection tool. While those tools are important, they often fail to address the social engineering aspect of the helpdesk.
When an attacker calls a BPO helpdesk, they are exploiting a human vulnerability. The support agent is often overworked and underpaid. They are being pushed to close tickets quickly. If a "VP" calls in sounding stressed and needs to get into their email for a "board meeting," the agent is naturally inclined to bypass a few steps to be helpful.
This is where the business IT solutions need to evolve. We have to stop assuming that a successful login means the person is who they say they are. We have to move toward identity-centric security that assumes every request could be a trap.
The Vishing Playbook
Let’s look at how a typical vishing attack plays out. The attacker calls the helpdesk and explains they are a new hire who hasn't received their login credentials. They might have the name of a real manager they found on LinkedIn. They might even use AI-powered voice cloning to sound more convincing.
If the helpdesk agent asks for verification, the attacker provides a "leaked" employee ID number or the last four digits of a social security number. Much of this data is readily available on the dark web. Once the agent is satisfied, the attacker directs them to a fake Okta page they have set up. The agent, thinking they are helping a colleague, might even provide internal information that helps the attacker move laterally through the network.
This is a nightmare scenario for any business. It bypasses the perimeter and places the attacker directly into the heart of the system. From there, they can deploy ransomware, steal sensitive client data, or conduct corporate espionage.
Strengthening the Human Firewall
So, how do we fix this? It starts with acknowledging that push-based MFA is no longer enough for high-risk users or helpdesk functions. We need to move toward phishing-resistant MFA. This includes hardware keys like YubiKeys or biometric systems that use FIDO2 standards. These cannot be intercepted by fake login pages.
We also need to change how we measure helpdesk success. If we only reward speed, we are incentivizing agents to cut corners on security. We need to implement strict "out-of-band" verification processes. If someone calls to reset their MFA, the helpdesk should be required to call them back on a verified number already on file or use a video call to verify their identity visually.

A Checklist for Business Owners
If you want to protect your organization from the helpdesk trap, consider these steps.
- Audit your helpdesk procedures to ensure that MFA resets require a high level of identity verification.
- Move your executive team and IT staff to phishing-resistant hardware security keys.
- Train your employees specifically on vishing and how to recognize social engineering over the phone.
- Monitor your logs for "impossible travel" or logins from new, unrecognized devices.
- Evaluate your BPO partners to see what security protocols they have in place for their own staff.
- Limit the number of people who have the authority to authorize an MFA bypass or reset.
Partnering for a Secure Future
The world of technology is moving fast, and the threats are moving even faster. It can be overwhelming to keep up with names like UNC6783 or the latest AiTM techniques. This is why having an independent broker and advisor is so valuable. You don't need someone to sell you another piece of software. You need someone to help you design a strategy that accounts for both the technical and the human elements of your business.
At Zoller Consulting, powered by OTG Consulting, we take a vendor-neutral approach. We aren't here to push a specific brand. We are here to help you navigate the hundreds of pre-vetted global providers to find the solutions that actually fit your needs and your budget. Whether it is cloud security, SASE, or revitalizing your network infrastructure, we focus on the outcomes that keep your business running safely.
If you are worried about who is watching the shop while you are focused on growth, it might be time to have a conversation about your security posture. You can read more about my thoughts on this in my article about who's watching the shop.
Cybersecurity is not a "set it and forget it" project. It is a continuous process of evaluation and adjustment. The helpdesk trap is a reminder that our greatest strength, our desire to be helpful and efficient, can also be our greatest weakness if we aren't careful.

Let’s make sure your support team stays on the right side of the security line. By implementing better verification and moving toward more robust authentication methods, you can close the door on groups like Mr. Raccoon before they even have a chance to knock.
Ray Zoller, President of Zoller Consulting, is an independent Broker/Advisor. Zoller Consulting, powered by OTG Consulting, provides access to hundreds of global providers and all major colocation facilities. We specialize in AI, security, network infrastructure, and more. Our process includes design, multi-quote proposals, selection, and long-term support to ensure your business stays ahead of the curve.
To learn more about how we can streamline your technology, visit our blog or check out our guide on SASE vs. SD-WAN.
Ready to talk technology?
Whether you're evaluating AI, cybersecurity, networking, or any business technology — Zoller Consulting can help you find the right solution without vendor bias.
Schedule a Free Consultation →