Live
eineurope/
Home/Global/Topic · UNC6692 deploys Snow malware via Teams impersonation
Global2d ago

UNC6692 deploys Snow malware via Teams impersonation

Threat group UNC6692 uses Microsoft Teams impersonation to deliver modular Snow malware to corporate networks.

Sources
1 verified
Location
Updated
Sunday, 26 April 2026 at 05:57 UTC
No media · text-only dispatch
Synthesis · 1 sources
UNC6692 conducts a campaign that impersonates IT helpdesk staff in Microsoft Teams messages, prompting victims to install malicious patches. The patches deploy the Snow malware suite, including the SnowBelt browser extension, SnowGlaze tunneler, and SnowBasin backdoor, establishing persistent WebSocket tunnels for command execution. The group also performs LSASS memory extraction, pass‑the‑hash authentication, and exfiltrates Active Directory data. Mandiant’s analysis provides indicators of compromise and YARA rules to detect the toolset, noting its use of headless browsers to evade detection. The operation highlights advanced tradecraft targeting credential theft and lateral movement toward domain controllers.
e/eineurope · topic · T-07177