Inside UNC6692's Playbook: A Step-by-Step Breakdown of the Social Engineering-Driven Malware Deployment

What You Need to Understand the Attack

Before diving into the steps, it's important to know the key components the attackers used:

Inside UNC6692's Playbook: A Step-by-Step Breakdown of the Social Engineering-Driven Malware Deployment
Source: www.mandiant.com

Step 1: Flood the Victim with Emails

In late December 2025, UNC6692 launched a large email campaign aimed at overwhelming the target. The goal was to create a sense of urgency and distraction, making the victim more likely to accept help from someone posing as IT support.

Key tactic: The sheer volume of emails forced the victim to seek assistance, setting the stage for the next step.

Step 2: Impersonate IT Helpdesk via Microsoft Teams

Shortly after the email barrage, the attacker sent a phishing message through Microsoft Teams, pretending to be helpdesk personnel. The message offered to help reduce the spam volume and included a link to a 'local patch'.

The chat invitation came from an account outside the organization, but the attacker exploited the victim's trust in the helpdesk role and the urgency of the situation.

Step 3: Lure the Victim to Click a Malicious Link

The Teams message included a URL pointing to an AWS S3 bucket hosted HTML page. The link appeared legitimate, describing itself as 'Microsoft Spam Filter Updates' and urging installation of a 'local patch' to protect the account from spamming.

When clicked, the browser opened update.html?email=<victim email>, which triggered the download of a renamed AutoHotKey binary and a script file sharing the same name.

Step 4: Execute AutoHotKey with the Malicious Script

AutoHotKey has a built-in feature: if the executable and a script file have the same name and reside in the same directory, the script runs automatically without extra command-line arguments. The attackers exploited this to launch their code silently.

Although the initial AutoHotKey script was not recovered by Mandiant, evidence shows it performed:

Step 5: Deploy the SNOWBELT Browser Extension

SNOWBELT is a custom malicious Chromium extension that was not distributed through the Chrome Web Store. It likely allowed remote control of browser activity, credential theft, or data exfiltration. The extension was loaded using a specific Edge browser command with a custom user data directory.

Inside UNC6692's Playbook: A Step-by-Step Breakdown of the Social Engineering-Driven Malware Deployment
Source: www.mandiant.com

Step 6: Establish Persistence

The attackers used multiple methods to ensure SNOWBELT and the malicious infrastructure remained active after a reboot:

The AutoHotKey script contained logic to search for the existing scheduled task and, if found, execute the browser command to load SNOWBELT in a headless Edge instance.

Tips for Defenders

Understanding each step of the UNC6692 campaign helps defenders anticipate similar attacks and fortify their defenses against social engineering chains.

Recommended

Discover More

Why HBO's 'Rome' Remains a Masterpiece of Historical Drama and a Hidden GemFrom Farm to Fast Track: A Landholder’s Guide to Securing Federal Environmental Approval for a Big Battery in Under a MonthApple vs. India: 10 Key Facts Behind the $38 Billion Antitrust BattleEU Weighs Methane Exemptions for Fossil Fuel Firms as Renewables Investment SurgesHow Grafana Assistant Pre-Builds Infrastructure Context for Faster Troubleshooting