What Happened
Newly Tracked Group Abuses Cloud Infrastructure And Custom Malware
A newly discovered threat actor, tracked as UNC6692, is using a combination of social engineering techniques, abuse of legitimate cloud infrastructure, and custom malware to conduct a multipronged campaign. The threat actor, which is believed to be financially motivated, has been observed using Microsoft Teams, AWS S3 buckets, and custom ‘Snow’ malware. According to a blog post by Google Threat Intelligence Group and Mandiant, the attack chain involves a multistage intrusion campaign, including the installation of a malicious Chromium browser extension and the use of a Python tunneler. This was first reported by Dark Reading.