Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Trump nominates US cyber agency CISA head, asks for resignation

OpenAI releases GPT-5.5, taking the company one step closer to becoming an AI “super app”

UNC6692 Deploying SNOW malware by impersonating IT helpdesk via Microsoft Teams

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » UNC6692 Deploying SNOW malware by impersonating IT helpdesk via Microsoft Teams
Identity

UNC6692 Deploying SNOW malware by impersonating IT helpdesk via Microsoft Teams

By April 23, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A previously undocumented cluster of threat activity known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams to deploy custom malware suites on compromised hosts.

“Like many other intrusions in recent years, UNC6692 relied heavily on impersonating IT help desk employees to persuade victims to accept Microsoft Teams chat invitations from accounts outside their organization,” Mandiant, a Google company, said in a report released today.

UNC6692 is believed to be the result of a large-scale email campaign that aims to overwhelm a target’s inbox with spam emails and create a false sense of urgency. The threat actor then approaches the target via Microsoft Teams by sending a message from the IT support team and offering assistance with the email bomb issue.

It is worth noting that the combination of attacks on victims’ email inboxes followed by impersonation of Microsoft Teams-based help desks is a tactic that has been employed by former Black Basta affiliates for years. Although the group stopped its ransomware operations early last year, its strategy shows no signs of slowing down.

ReliaQuest revealed in a report published last week that this approach is being used to target executives and senior-level employees for initial access to corporate networks for potential data theft, lateral movement, ransomware deployment, and extortion. In some cases, chats started just 29 seconds apart.

The purpose of the conversation is to trick the victim into installing and gaining access to a legitimate remote monitoring and management (RMM) tool, such as Quick Assist or Supremo Remote Desktop, which can then be used as a weapon to drop additional payloads.

“From March 1 to April 1, 2026, 77% of observed incidents targeted senior-level employees, up from 59% in the first two months of 2026,” said ReliaQuest researchers John Dilgen and Alexa Femminella. “This activity shows that a threat group’s most effective tactics can outlive the group itself.”

The attack chain detailed by Mandiant, on the other hand, deviates from this approach by instructing victims to click on a phishing link shared via Teams chat to install a local patch that fixes the spam issue. When clicked, an AutoHotkey script is downloaded from an AWS S3 bucket controlled by the threat actor. The name of the phishing page is “Mailbox Repair and Sync Utility v2.1.5.”

This script is designed to install the malicious Chromium-based browser extension SNOWBELT on the Edge browser by performing initial reconnaissance and launching it in headless mode using the “–load-extension” command line switch.

Mandiant researchers JP Glab, Tufail Ahmed, Josh Kelley and Muhammad Umair said: “The attackers used gatekeeper scripts designed to ensure payloads were delivered only to their intended targets, while bypassing automated security sandboxes.”

“The script also checks the victim’s browser. If the user is not using Microsoft Edge, the page displays a persistent overlay warning. UNC6692 used the SNOWBELT extension to download additional files, including SNOWGLAZE, SNOWBASIN, AutoHotkey scripts, and a ZIP archive containing a portable Python executable and required libraries.”

The phishing page is also designed to function as a configuration management panel with a prominent “health check” button that, when clicked, ostensibly prompts the user to enter mailbox credentials for authentication purposes, but is actually used to collect and exfiltrate data to another Amazon S3 bucket.

The SNOW malware ecosystem is a modular toolkit that works together to accomplish the attacker’s objectives. SNOWBELT is a JavaScript-based backdoor that receives commands and relays them to SNOWBASIN for execution, while SNOWGLAZE is a Python-based tunneler that creates a secure authenticated WebSocket tunnel between the victim’s internal network and the attacker’s command and control (C2) server.

The third component is SNOWBASIN, which acts as a persistent backdoor and allows remote command execution via ‘cmd.exe’ or ‘powershell.exe’, screenshot capture, file upload/download, and self-termination. It runs as a local HTTP server on port 8000, 8001, or 8002.

Some of the other post-exploitation actions performed by UNC6692 after gaining initial access are:

A Python script is used to scan ports 135, 445, and 3389 on the local network for lateral movement, establish a PsExec session to the victim system through the SNOWGLAZE tunneling utility, and initiate an RDP session through the SNOWGLAZE tunnel from the victim system to the backup server. Using the local administrator account, extract the system’s LSASS process memory in Windows Task Manager and perform privilege elevation. Using the Pass-The-Hash technique, use the elevated user’s password hash to move laterally to a domain controller in your network, download and run FTK Imager to capture sensitive data (such as Active Directory database files), write it to the \Downloads folder, and use the LimeWire file upload tool to extract the data.

“The UNC6692 campaign shows an interesting evolution in tactics, particularly the use of social engineering, custom malware, and malicious browser extensions, which take advantage of victims’ inherent trust in multiple different enterprise software providers,” the tech giant said.

“A key element of this strategy is the systematic exploitation of legitimate cloud services for payload delivery and exfiltration and command-and-control (C2) infrastructure. By hosting malicious components on trusted cloud platforms, attackers are often able to bypass traditional network reputation filters and blend in with large volumes of legitimate cloud traffic.”

The disclosure comes as Cato Networks details a voice phishing-based campaign on Microsoft Teams that leverages a similar help desk impersonation to lure victims into running a WebSocket-based Trojan called PhantomBackdoor via an obfuscated PowerShell script retrieved from an external server.

“This incident shows that help desk impersonation delivered through a Microsoft Teams meeting can replace traditional phishing and still result in the same outcome: staged PowerShell execution and subsequent WebSocket backdoor,” the cybersecurity firm said.

“Defenders must treat collaboration tools as a first-class attack surface by enhancing help desk validation workflows, increasing controls for screen sharing with external teams, and hardening PowerShell.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleArtemis II heat shield accelerates intense atmospheric reentry, reveals ghostly underwater photos
Next Article OpenAI releases GPT-5.5, taking the company one step closer to becoming an AI “super app”

Related Posts

Bitwarden CLI compromised in ongoing Checkmarx supply chain campaign

April 23, 2026

$290M DeFi Hack, macOS LoL Abuse, ProxySmart SIM Farms +25 New Stories

April 23, 2026

Defeat automated exploits at the speed of AI

April 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Trump nominates US cyber agency CISA head, asks for resignation

OpenAI releases GPT-5.5, taking the company one step closer to becoming an AI “super app”

UNC6692 Deploying SNOW malware by impersonating IT helpdesk via Microsoft Teams

Artemis II heat shield accelerates intense atmospheric reentry, reveals ghostly underwater photos

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.