UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy Malware in Enterprise Attacks

A newly identified threat cluster known as UNC6692 has been observed conducting sophisticated cyberattacks by impersonating IT helpdesk staff through Microsoft Teams, highlighting a growing trend of exploiting workplace communication tools for initial access. The campaign relies heavily on social engineering tactics to trick employees into trusting malicious interactions.

The attackers initiate contact by sending Microsoft Teams messages from external accounts, posing as internal IT support personnel. Victims are convinced to accept chat requests and follow instructions, often under the pretext of resolving technical issues such as spam or system errors. This method allows attackers to bypass traditional email security controls and directly engage employees in real time.

A key tactic used in the campaign involves overwhelming targets with spam emails to create urgency and confusion. Once the victim seeks help, the attacker—posing as IT staff—provides a phishing link or instructs them to install a supposed fix. In many cases, this leads to the download of malicious files, including AutoHotkey scripts hosted on attacker-controlled infrastructure.

The malware deployed in these attacks, referred to as SNOW, enables threat actors to gain persistent access to compromised systems. From there, they can carry out a range of malicious activities, including credential theft, lateral movement within networks, data exfiltration, and potential ransomware deployment. This makes the campaign particularly dangerous for enterprise environments.

Research indicates that the attacks are increasingly targeting senior-level employees, who often have broader access to sensitive systems and data. Between March 1 and April 1, 2026, around 77% of observed incidents were directed at executives and high-level staff, showing a deliberate focus on high-value targets.

The campaign underscores a broader shift in cyberattack strategies, where threat actors are leveraging trusted collaboration platforms like Microsoft Teams to bypass traditional defenses. As organizations adopt more digital communication tools, attackers are adapting their tactics to exploit human trust and real-time interactions, making security awareness and verification processes more critical than ever.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the report 2026

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch