Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UNC6692 Deploys Snow Malware via Email Scams and Social Tactics

UNC6692 Deploys Snow Malware via Email Scams and Social Tactics

Posted on April 27, 2026 By CWS

A new threat dubbed UNC6692 has been identified by Google Threat Intelligence Group (GTIG) for its tactic of flooding targets with emails and masquerading as IT support to deploy malicious software.

Email Flooding and Pretend IT Support

In December 2025, UNC6692 was observed inundating targets with numerous emails. The group then reached out to victims through Microsoft Teams, posing as IT support personnel to deceive them into clicking a link to a fake mailbox repair page.

This phishing page, disguised as a utility, checked for specific parameters in the email link and confirmed the use of Microsoft Edge. Once verified, it prompted the user to perform a ‘health check,’ which was a guise to capture their credentials.

Malicious Payload Deployment

Simultaneously, the fake page executed a script to download and run an AutoHotKey binary and script. This action installed the Snowbelt backdoor, a JavaScript-based malware, as a Chromium browser extension on the user’s system.

The attackers ensured persistence by adding shortcuts to the Windows startup and scheduling tasks to open a hidden Edge process that loads Snowbelt. This setup allowed them to download further malicious payloads from an AWS S3 bucket they controlled.

Network Infiltration and Data Exfiltration

Using Snowglaze, a Python-based tunneler, UNC6692 established a connection to the targeted system. They conducted reconnaissance and lateral movement by initiating a Remote Desktop Protocol session to a backup server and accessing administrator accounts.

The threat actors extracted sensitive information by dumping process memory and used LimeWire for data exfiltration. They leveraged Pass-The-Hash to infiltrate the network’s domain controller and utilized FTK Imager to access and exfiltrate critical registry files.

The Snow Malware Framework

The Snow malware framework, composed of Snowbelt, Snowglaze, and Snowbasin, facilitates attackers’ access from initial entry to internal network operations. Snowbelt executes commands and provides access for privilege escalation, while Snowglaze creates a secure connection for data transfer.

Snowbasin acts as a persistent backdoor, offering capabilities like command execution and data harvesting. This comprehensive system underscores how attackers integrate social engineering with technical stealth to penetrate secure environments.

The UNC6692 campaign exemplifies modern cyber threats’ sophistication, leveraging trusted platforms to bypass traditional defenses. As cyber threats evolve, organizations must adapt their security strategies to mitigate such risks effectively.

Security Week News Tags:credential harvesting, Cybersecurity, email scams, IT impersonation, malware deployment, persistent threat, Phishing, SNOW malware, social engineering, UNC6692

Post navigation

Previous Post: CODESYS Vulnerabilities Allow App Backdoors
Next Post: ClickFix Attack Evolves: New Tactics Bypass Detection

Related Posts

Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack Security Week News
Aisy Launches Out of Stealth to Transform Vulnerability Management Aisy Launches Out of Stealth to Transform Vulnerability Management Security Week News
NASCAR Confirms Personal Information Stolen in Ransomware Attack NASCAR Confirms Personal Information Stolen in Ransomware Attack Security Week News
Recent GeoServer Vulnerability Exploited in Attacks Recent GeoServer Vulnerability Exploited in Attacks Security Week News
Noma Security Raises 0 Million for AI Security Platform Noma Security Raises $100 Million for AI Security Platform Security Week News
Cyera Raises 0 Million at  Billion Valuation Cyera Raises $400 Million at $9 Billion Valuation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical OpenSSH Security Flaw Existed for 15 Years
  • PhantomCore Exploits Russian Video Conferencing Software
  • Vidar Malware Exploits Fake Downloads to Steal Data
  • Windows Patch Flaw Enables Zero-Click Attacks
  • AI Advances in Cybersecurity Pose New Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical OpenSSH Security Flaw Existed for 15 Years
  • PhantomCore Exploits Russian Video Conferencing Software
  • Vidar Malware Exploits Fake Downloads to Steal Data
  • Windows Patch Flaw Enables Zero-Click Attacks
  • AI Advances in Cybersecurity Pose New Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark