Step-by-Step: How UNC6692 Used Social Engineering to Deploy Custom Malware

By ● min read

Introduction

In late December 2025, Google Threat Intelligence Group (GTIG) uncovered a sophisticated intrusion campaign by a previously unknown threat actor, UNC6692. This group combined persistent social engineering with a custom modular malware suite and skillful internal pivoting to achieve deep network penetration. The attack heavily relied on impersonating IT helpdesk staff, tricking a victim into accepting a Microsoft Teams chat invitation from an external account. This guide breaks down the exact steps UNC6692 followed, from initial distraction to final persistence, providing defenders with a clear understanding of the tactics used. All facts are derived from the original GTIG report.

Step-by-Step: How UNC6692 Used Social Engineering to Deploy Custom Malware
Source: www.mandiant.com

What You Need (Attacker Perspective)

Step-by-Step Attack Execution

  1. Step 1: Launch an Overwhelming Email Campaign
    The attackers began by sending a massive volume of emails to the target organization. This barrage was designed to flood the victim's inbox, creating a sense of panic, urgency, and distraction. The goal was to make the victim more likely to accept help when contacted later.
  2. Step 2: Impersonate IT Helpdesk via Microsoft Teams
    After the email flood, UNC6692 sent a phishing message through Microsoft Teams. The message appeared to come from the company's helpdesk, offering assistance to reduce the email volume. The chat request came from an account outside the victim's organization, but the impersonation was convincing enough to gain trust.
  3. Step 3: Direct the Victim to a Malicious Link
    The Teams message contained a link that the victim was prompted to click to install a "local patch" to prevent further email spamming. The link pointed to a URL like https://service-page-25144-30466-outlook.s3.us-west-2.amazonaws.com/update.html?email=... with a description: "Microsoft Spam Filter Updates | Install the local patch to protect your account from email spamming." This URL was hosted on a threat actor-controlled AWS S3 bucket.
  4. Step 4: Deliver the Payload via Downloaded Files
    When the victim clicked the link, their browser opened the HTML page, which triggered the download of two files from the same S3 bucket: a renamed AutoHotKey binary and an AutoHotKey script. Critically, both files shared the same name. This is because AutoHotKey automatically runs a script in the current directory if the binary is named identically—no additional command-line arguments are needed. Evidence of AutoHotKey execution was recorded immediately after the downloads.
  5. Step 5: Execute Reconnaissance and Install SNOWBELT
    The AutoHotKey script performed initial reconnaissance commands (exact commands not recovered) and installed the SNOWBELT malicious Chromium browser extension. This extension was not distributed through the Chrome Web Store but loaded directly from the local file system. SNOWBELT allowed the attacker to intercept browser activity, steal credentials, or perform man-in-the-browser attacks.
  6. Step 6: Establish Persistence
    The attackers ensured SNOWBELT survived reboots using two methods: a shortcut to the AutoHotKey script was added to the Windows Startup folder, and a scheduled task was created. The AutoHotKey script checked for the scheduled task and, if it found it, verified that SNOWBELT was still running. If the extension was active, the script would exit; otherwise, it would restart the headless Edge browser instance. The scheduled task command used: cmd /c start "" "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --user-data-dir="%LOCALAPPDATA%\Microsoft\Edge\System Data" --headless=new --load-extension="%LOCALAPPDATA%\Microsoft\..."

Tips for Defenders

Tags:

Recommended

Discover More

Tesla Semi Deploys in Southern California Port Drayage Pilot with MDB Transportation5 Essential Enhancements in Firefox's Free VPN That Users Have Been Waiting ForIO Interactive's 007: First Light Breaks from Hitman Formula, Early Impressions RevealHow Flutter's Websites Got a Unified Dart-Powered Makeover with JasprDebunking 5 Myths About Agentic Coding: The Real Risks Beneath the Hype