Skip to content
Tech News
← Back to articles

Threat actor uses Microsoft Teams to deploy new “Snow” malware

read original get Microsoft Teams Security Badge → more articles
Why This Matters

The use of Microsoft Teams by threat actors to deploy sophisticated malware like Snow highlights the increasing risks of social engineering attacks leveraging popular communication platforms. This underscores the need for enhanced security awareness and monitoring tools to protect consumers and organizations from targeted cyber threats.

Key Takeaways

A threat group tracked as UNC6692 uses social engineering to deploy a new, custom malware suite named “Snow,” which includes a browser extension, a tunneler, and a backdoor.

Their goal is to steal sensitive data after deep network compromise through credential theft and domain takeover.

According to Google’s Mandiant researchers, the attacker uses “email bombing” tactics to create urgency, then contact targets via Microsoft Teams, posing as IT helpdesk agents.

A recent Microsoft report highlighted the growing popularity of this tactic in the cybercrime space, tricking users into granting attackers remote access via Quick Assist or other remote access tools.

In the case of UNC6692, the victim is prompted to click a link to install a patch that would block email spam. In reality, the victims get a dropper that executes AutoHotkey scripts loading “SnowBelt,” a malicious Chrome extension.

Malicious page used in the attacks

Source: Google

The extension executes on a headless Microsoft Edge instance, so the victim doesn’t notice anything, while scheduled tasks and a startup folder shortcut are also created for persistence.

SnowBelt serves as a persistence mechanism and a relay mechanism for commands the operator sends to a Python-based backdoor named SnowBasin.

Commands are delivered through a WebSocket tunnel established by a tunneler tool called SnowGlaze, to mask communications between the host and the command-and-control (C2) infrastructure.

... continue reading