UNC6692 Impersonates IT Helpdesk via Microsoft Teams with SNOW Malware
SCW notes a new threat cluster, UNC6692, is actively deploying custom malware named SNOW. The Hacker News reports that UNC6692 employs social engineering via Microsoft Teams, impersonating IT helpdesk personnel. This tactic convinces victims to accept chat invitations and subsequently deploy the malware.
The attack vector is straightforward: an attacker, posing as internal IT, initiates a Teams chat. Once the victim accepts, the social engineering begins, leading to the deployment of the SNOW malware. This highlights a persistent vulnerability in enterprise communication platforms where trust in internal identities is often exploited.
For defenders, this underscores the critical need for enhanced scrutiny of internal communications, even from seemingly legitimate sources. The attackerβs calculus is clear: leverage inherent trust in IT to bypass technical controls. This isnβt a complex zero-day; itβs a social attack that exploits human factors, making it highly effective.
What This Means For You
- If your organization uses Microsoft Teams, immediately reinforce user training on social engineering tactics, especially those impersonating IT helpdesk. Implement strict policies for verifying identity before accepting any unsolicited requests or downloads, even from internal accounts. Audit your Teams environment for suspicious chat invitations and unexpected file transfers.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| UNC6692-SNOW-Malware | Impersonation of IT helpdesk employees via Microsoft Teams | |
| UNC6692-SNOW-Malware | Malware Deployment | Custom malware suite named 'SNOW' |
| UNC6692-SNOW-Malware | Initial Access | Microsoft Teams chat invitation from a malicious account |