A newly discovered threat actor, tracked by Mandiant as UNC6692, is pioneering a highly effective social engineering attack that weaponizes Microsoft Teams. The campaign begins with a clever distraction: the attacker initiates an 'email bomb,' flooding the target's inbox with thousands of spam messages. Amid this confusion, UNC6692 sends a Teams chat request from an external account, posing as an IT help desk technician offering assistance. This ruse is used to guide the victim to a credential phishing site. Upon capturing credentials, the attack chain deploys a custom malware suite known as the SNOW ecosystem. This modular malware provides the attackers with a persistent backdoor, data exfiltration capabilities, and tools for lateral movement, ultimately leading to the compromise of domain controllers.
The attack, observed since late 2025, demonstrates a deep understanding of corporate workflows and user psychology. It subverts the trust employees place in both their IT department and internal collaboration tools like Teams.
Attack Chain:
T1499.003 - Endpoint Denial of Service: Application Exhaustion Flood), creating a sense of urgency and a plausible reason for IT to reach out.T1566.002 - Phishing: Spearphishing Link). This is a novel vector that bypasses traditional email security gateways.T1204.002 - User Execution: Malicious File).The SNOW malware ecosystem is a custom-built, modular toolkit:
T1176 - Browser Extensions).T1572 - Protocol Tunneling).Post-compromise, UNC6692 has been observed performing credential dumping from the LSASS process (T1003.001 - OS Credential Dumping: LSASS Memory) and moving laterally to domain controllers.
This campaign is highly dangerous due to its sophisticated blend of social engineering and custom malware. By targeting senior-level employees, UNC6692 aims to gain access to the most sensitive corporate data and privileged systems. A successful attack can lead to a full domain compromise, widespread data breach, and potential deployment of ransomware. The use of Microsoft Teams as an initial contact vector is particularly alarming, as many organizations have not yet developed robust security policies and detection mechanisms for this type of threat.
No specific technical indicators of compromise were mentioned in the source articles.
Security teams should hunt for the following patterns:
Microsoft Teams Audit Logsmsedge.exemsedge.exe running with the --headless or --no-startup-window flags, which could indicate a malicious extension being loaded for persistence.*\AppData\Local\Microsoft\Edge\User Data\*\ExtensionsAutoHotkey.exe *.ahkSystem File Analysis (D3-SFA) can be applied to browser extension directories.LSASS memory access from non-standard processes.Executable Allowlisting (D3-EAL).LSASS process, making it significantly harder for attackers to dump credentials from memory.Educate users about novel social engineering tactics, including the abuse of collaboration platforms like Microsoft Teams.
Use application control to prevent the execution of unauthorized scripting tools like AutoHotkey.
Ingest and monitor audit logs from collaboration platforms to detect suspicious external communications.
Enable features like Windows Credential Guard to protect the LSASS process from credential dumping attempts.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats