Adobe breach claim puts 13 million support tickets and employee records in focus


Adobe has not publicly confirmed a new breach, but a threat actor calling himself “Mr. Raccoon” claims to have stolen 13 million support tickets, about 15,000 employee records, internal documents, and Adobe’s HackerOne submissions. Right now, the claim remains unverified, and most public reporting traces back to International Cyber Digest and follow-up coverage rather than a confirmed Adobe disclosure.

That distinction matters. A breach claim can still signal real risk, especially when the alleged data includes support records and bug bounty submissions, but readers should not treat the full scope as established fact until Adobe, HackerOne, or another independent source confirms it. Cybernews reported that Adobe had not addressed the claims as of its coverage and said it reached out to the company for comment.

If the claim proves accurate, the exposure could be serious. Support tickets often contain names, email addresses, account details, product issues, and conversation history, while bug bounty submissions can include technical vulnerability reports that attackers could study for unpatched or poorly understood weaknesses. Adobe’s own public materials show it runs a bug bounty and vulnerability disclosure process through HackerOne, which makes the alleged reference to HackerOne submissions especially sensitive.

What the attacker claims happened

According to the public allegation, the intrusion began through a third-party BPO provider rather than Adobe directly. The reported attack chain says a malicious email infected a support worker’s machine with a remote access tool, after which the attacker moved deeper by compromising additional accounts and abusing support-side access.

The central claim is that the attacker could export large volumes of support tickets in one request from an agent-facing environment. If that description holds up, it would point to a major access control problem around data export permissions, rate limiting, or monitoring inside a support workflow. At this stage, though, no official Adobe advisory has confirmed that such a weakness existed.

Directories open to access (Source:International Cyber Digest )

Public Adobe security pages show the company maintains a Product Security Incident Response Team, a Trust Center, and active bug bounty intake channels. Those pages outline Adobe’s formal security reporting process, but I could not find a public Adobe breach statement tied to this “Mr. Raccoon” claim on Adobe’s official newsroom, Trust Center, or PSIRT pages during this check.

Why this alleged leak would matter

If customer support data got exposed at this scale, the fallout would reach beyond Adobe. Support systems often hold long conversational histories, case attachments, internal notes, and account identifiers, which can help criminals build highly convincing phishing lures or impersonation attempts against both customers and staff. This type of data also gives attackers context they can reuse in later fraud and social engineering campaigns.

The alleged inclusion of employee records raises a second concern. Employee contact data and organizational details can make follow-on phishing, credential theft, or help desk impersonation much easier, especially if an attacker already understands how contractors, managers, and internal tools connect across a support operation. That risk grows when a third-party provider sits inside the workflow.

Then there is the HackerOne angle. Adobe’s official bug bounty program pages confirm the company uses HackerOne for public vulnerability disclosure and rewards. If unpublished submissions were actually taken, the incident could create a window where attackers gain insight into reported security flaws before fixes, mitigations, or coordinated disclosure steps finish.

Quick breakdown

ItemCurrent status
Company named in claimAdobe
Threat actor alias“Mr. Raccoon”
Alleged exposed data13 million support tickets, 15,000 employee records, internal documents, HackerOne submissions
Claimed initial accessThird-party BPO environment
Official Adobe confirmation foundNo public confirmation found during this check
Independent verificationLimited
Main public sources so farInternational Cyber Digest and follow-up reports

What to watch next

  • A direct statement from Adobe confirming, denying, or narrowing the claim
  • Any notice from HackerOne about affected submissions or researcher communications
  • Signs of leaked ticket data, employee records, or internal documents appearing on criminal forums
  • Updated guidance for Adobe customers, support staff, or researchers
  • Evidence of third-party vendor compromise rather than a direct Adobe network intrusion

FAQ

What happened to Adobe?

A threat actor claims Adobe data was stolen, but Adobe has not publicly confirmed the breach during this check.

Has Adobe confirmed the breach?

I did not find a public Adobe confirmation on Adobe’s official security or trust pages related to this claim.

What data was allegedly taken?

The public claim mentions support tickets, employee records, internal documents, and HackerOne submissions. That scope remains unverified.

Why are support tickets so sensitive?

Support records can contain personal data, account details, issue histories, and context that attackers can reuse in phishing or fraud.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages