UNC6692 Snow Malware Attack Uses Social Engineering to Compromise Networks

An avalanche.
Lily Morris
Contributing Writer
UNC6692, Snow, Social engineering, malware

The UNC6692 campaign, identified by Google’s Threat Intelligence Group, is a multi-stage intrusion that combines social engineering with a custom malware suite known as “Snow.”

It starts with attackers posing as IT helpdesk staff through tools like Microsoft Teams, then unfolds through a sequence of payload delivery, persistence techniques, and internal reconnaissance to maintain access inside the environment.

The Snow malware suite works as a set of connected parts that move an attack forward. It starts by gaining access through a web browser, then keeps a hidden line of communication open with outside systems, and finally carries out actions on the infected device through a backdoor.

Together, this setup lets attackers go beyond the initial breach, giving them room to move deeper into systems and eventually access sensitive data.

Why It Matters: This campaign shows how widely used enterprise tools and routine workflows can be repurposed to introduce malware and sustain access. By blending into normal activity and trusted cloud traffic, it makes detection and response far more difficult.

  • Coordinated Social Engineering and Phishing Workflow: Attackers initiated contact through email flooding to create confusion, then followed with a Microsoft Teams message posing as IT support. Victims were directed to a phishing page that enforced conditions such as a required email parameter and Microsoft Edge usage. A staged login process prompted users to enter credentials multiple times, improving accuracy of stolen data, which was then transmitted to attacker-controlled cloud storage.
  • Structured Infection Chain Using AutoHotKey and Browser Extensions: The phishing page delivered files from an AWS S3 bucket, including an AutoHotKey executable and script that executed automatically when named identically. This led to the installation of SNOWBELT, a malicious browser extension. Persistence was maintained through startup shortcuts and scheduled tasks, including launching a hidden Microsoft Edge instance that continuously loaded the extension and managed its execution.
  • Integrated Malware Ecosystem Enabling Command Execution and Control: The Snow toolkit consists of SNOWBELT, SNOWGLAZE, and SNOWBASIN. SNOWBELT operates inside the browser, relaying commands and maintaining access. SNOWGLAZE establishes a WebSocket tunnel that supports proxying of network traffic and communication with external infrastructure. SNOWBASIN runs as a local HTTP server, executing system commands, capturing screenshots, handling files, and returning results through the same communication path.
  • Internal Reconnaissance and Privilege Escalation Techniques: After gaining access, attackers scanned the network for services such as SMB and RDP using Python scripts. They used PsExec to execute commands remotely and identified administrative accounts. Credential extraction was performed by dumping LSASS memory, followed by pass-the-hash authentication to access additional systems, including domain controllers.
  • Data Extraction Through Trusted Tools and Cloud Infrastructure: Once elevated access was achieved, attackers used FTK Imager to collect Active Directory data, including NTDS.dit and registry hives such as SAM and SYSTEM. These files were staged locally and exfiltrated through cloud services and tools like LimeWire. Command-and-control communication relied on AWS S3 and WebSocket connections, with encryption and encoding techniques used to blend traffic with normal activity.

Go Deeper -> Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite – Google Cloud

Trusted insights for technology leaders

Our readers are CIOs, CTOs, and senior IT executives who rely on The National CIO Review for smart, curated takes on the trends shaping the enterprise, from GenAI to cybersecurity and beyond.

Subscribe to our 4x a week newsletter to keep up with the insights that matter.

☀️ Subscribe to the Early Morning Byte! Begin your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

☀️ Your latest edition of the Early Morning Byte is here! Kickstart your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

ADVERTISEMENT

×
You have free article(s) left this month courtesy of the CIO Professional Network.

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Would You Like To Save Articles?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Thanks for subscribing!

We’re excited to have you on board. Stay tuned for the latest technology news delivered straight to your inbox.

Save My Spot For TNCR LIVE!

Thursday April 18th

9 AM Pacific / 11 PM Central / 12 PM Eastern

Register for Unlimited Access

Already a member?

Digital Monthly

$12.00/ month

Billed Monthly

Digital Annual

$10.00/ month

Billed Annually

Would You Like To Save Books?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Log In To Access Premium Features

Sign Up For A Free Account

Name
Newsletters