
🎯Basically, hackers pretend to be helpdesk staff on Microsoft Teams to steal your passwords.
What Happened
A new cybercrime group, tracked as UNC6692, has emerged, employing social engineering tactics to exploit Microsoft Teams. They impersonate helpdesk personnel to trick users into revealing sensitive credentials. This attack began with a large email campaign that overwhelmed target organizations, leading to confusion and a higher likelihood of user interaction with the attackers.
How It Works
The attackers send out a barrage of emails, and once users are overwhelmed, they pose as helpdesk staff via Microsoft Teams. They offer assistance with the email volume, prompting users to click on a link that leads to a fake Mailbox Repair Utility. This page requests users to authenticate with their email and password, using a psychological trick that makes them believe their credentials are being validated.
Who's Being Targeted
Organizations that utilize Microsoft Teams for communication are prime targets. The attackers take advantage of the trust users place in helpdesk communications, making this a widespread threat across various sectors.
Signs of Infection
Victims may notice unusual activity on their accounts, such as unauthorized access or changes to settings. Additionally, if users have installed any unexpected browser extensions, especially those masquerading as legitimate tools, they should investigate further.
How to Protect Yourself
Detection
- 1.Be cautious with unsolicited helpdesk communications. Always verify the identity of anyone claiming to be from IT support.
- 2.Avoid clicking on suspicious links. If you receive a link from a helpdesk, confirm it through official channels before clicking.
Removal
- 3.Use multi-factor authentication (MFA). This adds an extra layer of security, making it harder for attackers to gain access even if they have your credentials.
- 4.Educate your team. Regular training on recognizing phishing attempts and social engineering tactics can greatly reduce the risk of falling victim to such attacks.
Technical Details
The malware used in this attack includes several components:
- SnowBelt: A malicious Chromium browser extension that maintains persistence and allows the attacker to control the infected system.
- SnowGlaze: A Python-based tunneler that manages communication between the victim's network and the attacker's infrastructure.
- SnowBasin: A bindshell that provides interactive control over the infected system, allowing for remote command execution.
Conclusion
The rise of UNC6692 highlights the evolving tactics of cybercriminals, especially in leveraging trusted platforms like Microsoft Teams. Organizations must remain vigilant and proactive in their cybersecurity measures to combat these sophisticated threats.
🔒 Pro insight: The use of social engineering combined with legitimate platforms like Teams underscores the need for enhanced user training and multi-factor authentication.





