top of page

UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Distribute SNOW Malware

  • 4 hours ago
  • 2 min read

Key Findings


  • UNC6692 is a previously undocumented threat group using Microsoft Teams to impersonate IT helpdesk staff and deploy custom SNOW malware

  • Attack chain begins with email bombing campaigns followed by Teams-based social engineering to build false urgency

  • Victims are tricked into clicking phishing links that download AutoHotkey scripts deploying SNOWBELT browser extension

  • SNOW malware ecosystem is modular, including SNOWBELT backdoor, SNOWGLAZE tunneler, and SNOWBASIN remote access tool

  • Post-exploitation activity includes lateral movement via PsExec, credential harvesting, Pass-The-Hash attacks, and sensitive data exfiltration

  • Tactic mirrors abandoned Black Basta playbook, demonstrating effectiveness outlives original threat groups


Background


Mandiant identified UNC6692 after tracking a campaign that combines email bombing with Microsoft Teams-based helpdesk impersonation. The approach has proven effective enough that even after Black Basta shut down ransomware operations last year, other threat actors continue using the same playbook. ReliaQuest research shows the tactic is increasingly targeting senior-level employees for initial network access, with incidents against executives rising from 59% to 77% between early 2026 and April 2026.


Attack Methodology


UNC6692's infection chain starts by overwhelming a target's email inbox with spam. The threat actor then contacts the victim via Microsoft Teams, posing as IT support and offering to help with the email problem. The victim is sent a phishing link claiming to be a "Mailbox Repair and Sync Utility v2.1.5" patch download. Clicking the link triggers an AutoHotkey script download from a threat actor-controlled AWS S3 bucket. The attackers use gatekeeper scripts to ensure payloads only reach intended targets while evading security sandboxes and checking that victims are using Microsoft Edge.


SNOW Malware Components


SNOWBELT functions as a JavaScript-based backdoor that receives attacker commands and forwards them to SNOWBASIN for execution. SNOWGLAZE is a Python-based tunneler that establishes secure, authenticated WebSocket connections between the victim's internal network and the attacker's command-and-control server. SNOWBASIN operates as a persistent backdoor enabling remote command execution through cmd.exe or powershell.exe, screenshot capture, file upload and download, and self-termination capabilities. It runs as a local HTTP server on ports 8000, 8001, or 8002.


Credential Harvesting


The phishing page displays a Configuration Management Panel with a "Health Check" button. When clicked, users are prompted to enter mailbox credentials under the pretense of authentication. Instead, these credentials are harvested and exfiltrated to another Amazon S3 bucket controlled by the attackers, giving them legitimate access to compromised accounts.


Post-Exploitation Activities


Once inside the network, UNC6692 executes reconnaissance scans targeting ports 135, 445, and 3389 for lateral movement opportunities. The group establishes PsExec sessions and initiates RDP connections through SNOWGLAZE tunnels. For privilege escalation, attackers extract the LSASS process memory using Windows Task Manager. They leverage Pass-The-Hash techniques with elevated user credentials to move laterally to domain controllers, then deploy FTK Imager to capture sensitive data including Active Directory databases, writing results to accessible folders like Downloads.


Sources


  • https://thehackernews.com/2026/04/unc6692-impersonates-it-helpdesk-via.html

  • https://www.socdefenders.ai/item/74a4d24e-0a5c-4e97-97f3-3dab65c66a49

  • https://x.com/LifeboatHQ/status/2047537481415835667

  • https://xploitzone.com/unc6692-teams-snow-malware-attack/

  • https://www.reddit.com/r/SecOpsDaily/comments/1sts3d2/unc6692_impersonates_it_helpdesk_via_microsoft/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page