Adobe Data Breach: 13M Support Tickets, Employee Records, and Bug Reports Allegedly Exposed by Hacker Mr. Raccoon

Adobe Faces Major Data Breach: 13 Million Support Tickets and Employee Records Allegedly Exposed

In a significant cybersecurity incident, a threat actor known as Mr. Raccoon has reportedly infiltrated Adobe’s systems, claiming to have exfiltrated a vast amount of sensitive data. The alleged breach encompasses 13 million support tickets containing personal information, 15,000 employee records, all submissions from the HackerOne bug bounty program, and various internal documents. These claims were detailed in a report by International Cyber Digest.

Breach Details and Methodology

According to the threat actor, the initial access point was not directly within Adobe’s infrastructure. Instead, the breach reportedly began through an Indian Business Process Outsourcing (BPO) firm contracted by Adobe. This method underscores the growing risks associated with third-party vendor relationships.

The attacker allegedly deployed a Remote Access Tool (RAT) on a BPO employee’s machine via a malicious email. Once this foothold was established, Mr. Raccoon escalated access by phishing the compromised employee’s manager, thereby broadening control within the network. The RAT deployment purportedly granted the attacker access to the employee’s webcam and the ability to intercept private communications through WhatsApp.

A particularly alarming aspect of the breach is the claim that Adobe’s support ticketing platform allowed for the exportation of all tickets in a single request from an agent. This suggests a significant access control misconfiguration, enabling bulk data extraction without triggering adequate security controls or rate-limiting mechanisms.

Scope of the Alleged Breach

The data reportedly compromised includes:

– Support Tickets: These typically contain customer names, email addresses, account details, and descriptions of technical issues. Such information is invaluable for phishing campaigns and identity theft.

– Employee Records: The exposure of 15,000 employee records raises concerns about potential identity theft and unauthorized access to Adobe’s internal systems.

– HackerOne Submissions: The inclusion of all submissions from the HackerOne bug bounty program is particularly concerning. These submissions contain unpublished vulnerability reports that could be exploited by other threat actors before patches are deployed.

– Internal Documents: The nature of these documents has not been specified, but they could potentially include proprietary information, strategic plans, and other sensitive data.

Adobe’s Response and Industry Implications

As of now, Adobe has not issued an official statement confirming or denying the breach. If verified, this incident would represent one of the most significant data exposures of 2026, raising urgent questions about third-party vendor security vetting, privileged access management in support environments, and the risks of overly permissive data export capabilities in enterprise ticketing systems.

Security teams across industries are advised to:

– Monitor Third-Party Access: Regularly audit and monitor access pathways for BPOs and contractors to ensure they adhere to stringent security protocols.

– Audit Data Export Permissions: Review and restrict bulk data export permissions to prevent unauthorized data extraction.

– Enhance Security Training: Educate employees and third-party partners about phishing tactics and the importance of maintaining robust security practices.

This incident serves as a stark reminder of the vulnerabilities inherent in complex supply chains and the critical need for comprehensive security measures across all facets of an organization.