Weekly review

ThreatNoir Afternoon Brief — April 27

2026-04-27Afternoon4 articles
Audio
Listen to the episode

Afternoon Review in IT Security — April 27, 2026

The threat landscape continues to evolve with attackers leveraging social engineering, fileless techniques, and system vulnerabilities to compromise user systems and data. Today's security briefing covers emerging malware campaigns, infostealer variants, critical Linux privilege escalation flaws, and browser vulnerabilities affecting privacy-conscious users.

UNC6692 Uses Email Bombing, Social Engineering to Deploy 'Snow' Malware

The threat actor UNC6692 has been actively deploying the Snow malware family to establish persistent access on victim systems. The campaign leverages email bombing and social engineering tactics to trick users into executing malicious payloads. The Snow malware family encompasses three distinct variants: Snowbelt, Snowglaze, and Snowbasin, each designed to maintain long-term presence within compromised environments. Source: UNC6692 Uses Email Bombing, Social Engineering to Deploy 'Snow' Malware

Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files

A new variant of the Vidar infostealer has emerged with sophisticated evasion techniques that exploit user trust in CAPTCHA verification systems. The malware distributes itself through fake CAPTCHA prompts and conceals its payload within seemingly innocuous JPEG and TXT files. Vidar employs fileless attack methodologies to avoid traditional file-based detection while targeting sensitive data including browser credentials and cryptocurrency wallet information. The malware is associated with command and control infrastructure at IP address 62.60.226.200 and shares tactics with the ClickFix malware family. Source: Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files

Easily Exploitable 'Pack2TheRoot' Linux Vulnerability Leads to Root Access

A critical privilege escalation vulnerability designated CVE-2026-41651 has been discovered in PackageKit, a fundamental Linux package management system. The flaw exploits a race condition that allows unprivileged users to escalate their privileges to root level during package installation operations. The vulnerability's ease of exploitation and presence in widely deployed Linux distributions represents a significant security risk for organizations relying on standard package management workflows. Source: Easily Exploitable 'Pack2TheRoot' Linux Vulnerability Leads to Root Access

Firefox Vulnerability Allows Tor User Fingerprinting

A privacy-critical vulnerability tracked as CVE-2026-6770 has been identified in Firefox that enables attackers to fingerprint users of the Tor anonymity network. This vulnerability undermines the privacy protections that Tor users depend upon by allowing cross-site tracking and user identification. Mozilla has addressed this issue through the release of Firefox 150, while the Tor Project has issued Tor 15.0.10 to mitigate the associated risks. Source: Firefox Vulnerability Allows Tor User Fingerprinting

Organizations should prioritize patching the PackageKit vulnerability, updating Firefox and Tor browser instances, and implementing email security controls to defend against Snow malware campaigns. User awareness training regarding fake CAPTCHA prompts and email bombing tactics remains essential to reduce the effectiveness of current attack vectors.

Sources & IOCs

Source articles and extracted indicators (defanged where appropriate).

UNC6692 Uses Email Bombing, Social Engineering to Deploy ‘Snow’ Malware
Malware4
  • Snow
    Modular malware framework comprising Snowbelt, Snowglaze, and Snowbasin components
  • Snowbelt
    JavaScript-based backdoor deployed as Chromium browser extension for persistent access
  • Snowglaze
    Python-based tunneler creating secure WebSocket tunnel to C&C, supports SOCKS proxy and traffic obfuscation
  • Snowbasin
    Persistent backdoor functioning as local HTTP server supporting command execution, screenshots, and data harvesting