UNC6692 Spreads ‘Snow’ Malware via Email Bombing and Social Engineering Tactics
UNC6692 Uses Bombing, Social Engineering to Deploy Snow Malware
A sophisticated threat actor has been observed employing a multi-stage attack campaign involving email bombing and social engineering to deploy a complex malware framework called Snow.
- The attack, attributed to the UNC6692 group, targets organizations by initially overwhelming victims with emails and then convincing them to execute malicious code, according to a report by the Google Threat Intelligence Group (GTIG).
Attack Campaign Details
In December 2025, UNC6692 began targeting its victims by sending a barrage of emails and posing as an IT support employee via Microsoft Teams.
This page checked for specific parameters in the link, verified the victim’s browser was Microsoft Edge, and presented a panel posing as the repair utility.
A fake progress bar was also displayed to avoid suspicion.
Malware Deployment
The attackers used the malicious extension to gain access to the targeted system.
One of these accounts was then used to initiate a Remote Desktop Protocol (RDP) session to a backup server via the Snowglaze tunnel.
Data Exfiltration and Domain Control Access
The threat actor then dumped the LSASS process memory from the backup server and exfiltrated it via LimeWire to extract usernames, passwords, and user account hashes from it.
Snow Malware Framework
The Snow malware framework, consisting of Snowbelt, Snowglaze, and Snowbasin, forms a coordinated pipeline that facilitates the attacker’s journey from initial browser-based access to the internal network of the organization.
- Snowbelt intercepts commands and delivers them to Snowbasin for execution, providing authenticated access to the environment and enabling lateral movement and privilege escalation.
- Snowglaze creates a secure, authenticated WebSocket tunnel to the attackers’ command-and-control (C&C) server, facilitates SOCKS proxy operations, and hides malicious traffic.
- Snowbasin functions as a persistent backdoor, supporting command execution, screenshot capture, and data harvesting.
Hosted Malicious Components on Trusted Cloud Platforms
By hosting malicious components on trusted cloud platforms, attackers can often bypass traditional network reputation filters and blend into the high volume of legitimate cloud traffic, as demonstrated by the UNC6692 campaign.
