Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»UNC6692 Combines Social Engineering, Malware, Cloud Abuse
    Cybersecurity

    UNC6692 Combines Social Engineering, Malware, Cloud Abuse

    adminBy adminApril 27, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    UNC6692 Combines Social Engineering, Malware, Cloud Abuse
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A new threat actor is combining social engineering techniques, abuse of legitimate cloud infrastructure, and custom malware together to create what appears to be novel attack chain. 

    Google Threat Intelligence Group (GTIG) and Mandiant on April 23 published a blog post detailing the activities of a threat actor tracked as UNC6692. While the researchers did not attribute the threat actor to any previously established identity or location ( calling it only a “newly tracked threat group”), they described a multistage intrusion campaign leveraging both persistent social engineering and custom modular malware.

    The attack also involves the abuse of legitimate cloud infrastructure in the form of an AWS S3 bucket.

    A Google spokesperson tells Dark Reading that based on observed attacker tactics, techniques, and procedures (TTPs), the researchers suspect the UNC6692 is financially motivated. “Their operations appear focused on gaining access and stealing credentials for further actions,” the blog post authors added.

    Related:Navigating the Unique Security Risks of Asia’s Digital Supply Chain

    Dark Reading asked about the attacker’s point of origin, but because it utilized AWS infrastructure, Google was unable to obtain evidence pointing to a possible attribution. Dark Reading has contacted Amazon for additional information.

    The UNC6692 Attack Chain

    In late December, UNC6692 conducted a campaign where it flooded a target’s inbox with email messages before contacting them through Microsoft Teams, posing as help desk personnel assigned to fix the problem. The attacker provided a phishing link through the Teams message, prompting the target to click a link that installs a local patch to fix and prevent email spamming. 

    The target clicked the link and opened an HTML page which “ultimately downloaded a renamed AutoHotKey binary and an AutoHotkey script, sharing the same name, from a threat actor-controlled AWS S3 bucket.”

    “If the AutoHotkey binary is named the same as a script file in its current directory, AutoHotkey will automatically run the script with no additional command line arguments,” the blog post read. “Evidence of AutoHotKey execution was recorded immediately following the downloads resulting in initial reconnaissance commands and the installation of SNOWBELT, a malicious Chromium browser extension (not distributed through the Chrome Web Store).”

    Through the Snowbelt extension now installed on the user’s computer, UNC6692 downloaded the Python tunneler Snowglaze, the Python bindshell Snowbasin (a persistent backdoor for remote code execution), AutoHotkey scripts, and “a ZIP archive containing a portable Python executable and required libraries.”

    Related:Microsoft, Salesforce Patch AI Agent Data Leak Flaws

    Once they gained initial access, the attacker used a Python script to scan the local network for ports 135, 445, and 3389 and enumerate local administrator accounts. They then used a local administrator account to initiate a remote desktop protocol (RDP) session through Snowglaze from the victim system to a backup server. 

    Now with access to the backup server, the threat actor further uses the local admin account to extract the system’s LSASS Microsoft Windows Local Security Authority Subsystem Service (LSASS) process memory. LSASS is used to enforce security policy and contains all usernames, passwords, and hashes for accounts that have accessed the target system. UNC6692 then extracted the process memory via LimeWire before using offensive security tools to extract credentials without fear of detection.

    Finally, UNC6692 used a pass-the-hash technique to move laterally to the network’s domain controller, preparing the threat actor to further stage and extract data of interest. 

    Google’s blog post contained indicators of compromise (IOCs) and YARA rules.

    UNC6692: Defender Takeaways

    UNC6692’s attack presents a blend of social engineering, technical evasion, and a multipronged malware strategy. Google highlighted the “systematic abuse of legitimate cloud services for payload delivery and exfiltration, and for command-and-control (C2) infrastructure,” in the form of the S3 bucket. 

    Related:Microsoft Bets $10B to Boost Japan’s AI, Cybersecurity

    This abuse, Google said, enables attackers to bypass traditional network reputation filters and blend into legitimate cloud traffic. 

    “Defenders must now look beyond process monitoring to gain clear visibility into browser activity and unauthorized cloud traffic,” the authors wrote. “As threat actors continue to professionalize these modular, cross-platform methodologies, the ability to correlate disparate events across the browser, local Python environments, and cloud egress points will be critical for early detection.”

    Abuse Cloud combines engineering Malware Social UNC6692
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhy AI Is Citing Third-Party Sources Instead of Your Site?
    Next Article Ginny Marvin on 20 years of change from manual PPC to AI
    admin
    • Website

    Related Posts

    Robinhood account creation flaw abused to send phishing emails

    April 28, 2026

    Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google

    April 27, 2026

    Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More

    April 27, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Congress Must Reject New Insufficient 702 Reauthorization Bill

    April 28, 2026

    Bing Previews AI Citation Share For Webmaster Tools

    April 28, 2026

    Robinhood account creation flaw abused to send phishing emails

    April 28, 2026

    How to summarize your AI visibility

    April 27, 2026
    Categories
    • Blogging (69)
    • Cybersecurity (1,544)
    • Privacy & Online Earning (186)
    • SEO & Digital Marketing (944)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (247)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Congress Must Reject New Insufficient 702 Reauthorization Bill

    April 28, 2026

    Bing Previews AI Citation Share For Webmaster Tools

    April 28, 2026

    Robinhood account creation flaw abused to send phishing emails

    April 28, 2026
    Most Popular
    • Congress Must Reject New Insufficient 702 Reauthorization Bill
    • Bing Previews AI Citation Share For Webmaster Tools
    • Robinhood account creation flaw abused to send phishing emails
    • How to summarize your AI visibility
    • Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google
    • Ginny Marvin on 20 years of change from manual PPC to AI
    • UNC6692 Combines Social Engineering, Malware, Cloud Abuse
    • Why AI Is Citing Third-Party Sources Instead of Your Site?
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.