Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UNC6692 Deploys Snow Malware via Email Scams and Social Tactics

UNC6692 Deploys Snow Malware via Email Scams and Social Tactics

Posted on April 27, 2026 By CWS

A new threat dubbed UNC6692 has been identified by Google Threat Intelligence Group (GTIG) for its tactic of flooding targets with emails and masquerading as IT support to deploy malicious software.

Email Flooding and Pretend IT Support

In December 2025, UNC6692 was observed inundating targets with numerous emails. The group then reached out to victims through Microsoft Teams, posing as IT support personnel to deceive them into clicking a link to a fake mailbox repair page.

This phishing page, disguised as a utility, checked for specific parameters in the email link and confirmed the use of Microsoft Edge. Once verified, it prompted the user to perform a ‘health check,’ which was a guise to capture their credentials.

Malicious Payload Deployment

Simultaneously, the fake page executed a script to download and run an AutoHotKey binary and script. This action installed the Snowbelt backdoor, a JavaScript-based malware, as a Chromium browser extension on the user’s system.

The attackers ensured persistence by adding shortcuts to the Windows startup and scheduling tasks to open a hidden Edge process that loads Snowbelt. This setup allowed them to download further malicious payloads from an AWS S3 bucket they controlled.

Network Infiltration and Data Exfiltration

Using Snowglaze, a Python-based tunneler, UNC6692 established a connection to the targeted system. They conducted reconnaissance and lateral movement by initiating a Remote Desktop Protocol session to a backup server and accessing administrator accounts.

The threat actors extracted sensitive information by dumping process memory and used LimeWire for data exfiltration. They leveraged Pass-The-Hash to infiltrate the network’s domain controller and utilized FTK Imager to access and exfiltrate critical registry files.

The Snow Malware Framework

The Snow malware framework, composed of Snowbelt, Snowglaze, and Snowbasin, facilitates attackers’ access from initial entry to internal network operations. Snowbelt executes commands and provides access for privilege escalation, while Snowglaze creates a secure connection for data transfer.

Snowbasin acts as a persistent backdoor, offering capabilities like command execution and data harvesting. This comprehensive system underscores how attackers integrate social engineering with technical stealth to penetrate secure environments.

The UNC6692 campaign exemplifies modern cyber threats’ sophistication, leveraging trusted platforms to bypass traditional defenses. As cyber threats evolve, organizations must adapt their security strategies to mitigate such risks effectively.

Security Week News Tags:credential harvesting, Cybersecurity, email scams, IT impersonation, malware deployment, persistent threat, Phishing, SNOW malware, social engineering, UNC6692

Post navigation

Previous Post: CODESYS Vulnerabilities Allow App Backdoors
Next Post: ClickFix Attack Evolves: New Tactics Bypass Detection

Related Posts

Cyber Insights 2026: External Attack Surface Management Cyber Insights 2026: External Attack Surface Management Security Week News
React2Shell Attacks Linked to North Korean Hackers React2Shell Attacks Linked to North Korean Hackers Security Week News
Google Gemini Tricked Into Showing Phishing Message Hidden in Email  Google Gemini Tricked Into Showing Phishing Message Hidden in Email  Security Week News
AI Agents Exploit Supply Chains in New Cyber Attacks AI Agents Exploit Supply Chains in New Cyber Attacks Security Week News
US Offering  Million Reward for RedLine Malware Developer US Offering $10 Million Reward for RedLine Malware Developer Security Week News
US Organizations Warned of Chinese Malware Used for Long-Term Persistence US Organizations Warned of Chinese Malware Used for Long-Term Persistence Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Advances in Cybersecurity Pose New Challenges
  • Fake Tax Notices Lure Indian Taxpayers into Malware Trap
  • Google Warns of Rising Malicious AI Prompt Injection Attacks
  • ClickFix Attack Evolves: New Tactics Bypass Detection
  • UNC6692 Deploys Snow Malware via Email Scams and Social Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Advances in Cybersecurity Pose New Challenges
  • Fake Tax Notices Lure Indian Taxpayers into Malware Trap
  • Google Warns of Rising Malicious AI Prompt Injection Attacks
  • ClickFix Attack Evolves: New Tactics Bypass Detection
  • UNC6692 Deploys Snow Malware via Email Scams and Social Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark