Categories: Insur. Cyber

UNC6692 Combines Social Engineering, Malware, Cloud Abuse


A new threat actor is combining social engineering techniques, abuse of legitimate cloud infrastructure, and custom malware together to create what appears to be novel attack chain.

Google Threat Intelligence Group (GTIG) and Mandiant on April 23 published a blog post detailing the activities of a threat actor tracked as UNC6692. While the researchers did not attribute the threat actor to any previously established identity or location ( calling it only a “newly tracked threat group”), they described a multistage intrusion campaign leveraging both persistent social engineering and custom modular malware.

The attack also involves the abuse of legitimate cloud infrastructure in the form of an AWS S3 bucket.

A Google spokesperson tells Dark Reading that based on observed attacker tactics, techniques, and procedures (TTPs), the researchers suspect the UNC6692 is financially motivated. “Their operations appear focused on gaining access and stealing credentials for further actions,” the blog post authors added.

Related:Navigating the Unique Security Risks of Asia’s Digital Supply Chain

Dark Reading asked about the attacker’s point of origin, but because it utilized AWS infrastructure, Google was unable to obtain evidence pointing to a possible attribution. Dark Reading has contacted Amazon for additional information.

The UNC6692 Attack Chain

In late December, UNC6692 conducted a campaign where it flooded a target’s inbox with email messages before contacting them through Microsoft Teams, posing as help desk personnel assigned to fix the problem. The attacker provided a phishing link through the Teams messageprompting the target to click a link that installs a local patch to fix and prevent email spamming.

The target clicked the link and opened an HTML page which “ultimately downloaded a renamed AutoHotKey binary and an AutoHotkey script, sharing the same name, from a threat actor-controlled AWS S3 bucket.”

“If the AutoHotkey binary is named the same as a script file in its current directory, AutoHotkey will automatically run the script with no additional command line arguments,” the blog post read. “Evidence of AutoHotKey execution was recorded immediately following the downloads resulting in initial reconnaissance commands and the installation of SNOWBELT, a malicious Chromium browser extension (not distributed through the Chrome Web Store).”

Through the Snowbelt extension now installed on the user’s computer, UNC6692 downloaded the Python tunnels Snowglaze, the Python bindshell Snowbasin (a persistent backdoor for remote code execution), AutoHotkey scripts, and “a ZIP archive containing a portable Python executable and required libraries.”

Related:Microsoft, Salesforce Patch AI Agent Data Leak Flaws

Once they gained initial access, the attacker used a Python script to scan the local network for ports 135, 445, and 3389 and enumerate local administrator accounts. They then used a local administrator account to initiate a remote desktop protocol (RDP) session through Snowglaze from the victim system to a backup server.

Now with access to the backup server, the threat actor further uses the local admin account to extract the system’s LSASS Microsoft Windows Local Security Authority Subsystem Service (LSASS) process memory. LSASS is used to enforce security policy and contains all usernames, passwords, and hashes for accounts that have accessed the target system. UNC6692 then extracted the process memory via LimeWire before using offensive security tools to extract credentials without fear of detection.

Finally, UNC6692 used a pass-the-hash technique to move laterally to the network’s domain controller, preparing the threat actor to further stage and extract data of interest.

Google’s blog post contained indicators of compromise (IOCs) and YARA rules.

UNC6692: Defender Takeaways

UNC6692’s attack presents a blend of social engineeringtechnical evasion, and a multipronged malware strategy. Google highlighted the “systematic abuse of legitimate cloud services for payload delivery and exfiltration, and for command-and-control (C2) infrastructure,” in the form of the S3 bucket.

Related:Microsoft Bets $10B to Boost Japan’s AI, Cybersecurity

This abuse, Google said, enables attackers to bypass traditional network reputation filters and blend into legitimate cloud traffic.

“Defenders must now look beyond process monitoring to gain clear visibility into browser activity and unauthorized cloud traffic,” the authors wrote. “As threat actors continue to professionalize these modular, cross-platform methodologies, the ability to correlate disparate events across the browser, local Python environments, and cloud egress points will be critical for early detection.”



Source link

nabeelhassan565@gmail.com

Share
Published by
nabeelhassan565@gmail.com

Recent Posts

Fuel Tank Breaches Expand Scope of Iran’s Cyber Offensive

Iranian hackers reportedly breached systems that monitor fuel levels in storage tanks serving gas stations…

7 minutes ago

It’s a Good Thing? Martha Stewart to Get Into Home Insurance With Hint

Hint, a self-described “home management platform,” has launched with a $10 million seed round of…

33 minutes ago

CFC appoints former Truist head as chair

Specialist insurer CFC on Monday said it has named former Truist Insurance head John Howard…

1 heure ago

Willis names growth leaders – Business Insurance

Willis, the retail broking unit of Willis Towers Watson, said Monday it appointed former Marsh…

2 heures ago

⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

Ravie LakshmananMay 18, 2026Cybersecurity / Hacking Monday opens with a trust problem. A mail server…

3 heures ago

Lloyd’s boss concerned over rapidly falling rates

Rachel Turk, Lloyd’s chief of performance and strategy, said market rates are falling faster than…

3 heures ago