- SnowModular malware framework comprising Snowbelt, Snowglaze, and Snowbasin components
- SnowbeltJavaScript-based backdoor deployed as Chromium browser extension for persistent access
- SnowglazePython-based tunneler creating secure WebSocket tunnel to C&C, supports SOCKS proxy and traffic obfuscation
- SnowbasinPersistent backdoor functioning as local HTTP server supporting command execution, screenshots, and data harvesting
ThreatNoir Afternoon Brief — April 27
Afternoon Review in IT Security — April 27, 2026
The threat landscape continues to evolve with attackers leveraging social engineering, fileless techniques, and system vulnerabilities to compromise user systems and data. Today's security briefing covers emerging malware campaigns, infostealer variants, critical Linux privilege escalation flaws, and browser vulnerabilities affecting privacy-conscious users.
UNC6692 Uses Email Bombing, Social Engineering to Deploy 'Snow' Malware
The threat actor UNC6692 has been actively deploying the Snow malware family to establish persistent access on victim systems. The campaign leverages email bombing and social engineering tactics to trick users into executing malicious payloads. The Snow malware family encompasses three distinct variants: Snowbelt, Snowglaze, and Snowbasin, each designed to maintain long-term presence within compromised environments. Source: UNC6692 Uses Email Bombing, Social Engineering to Deploy 'Snow' Malware
Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files
A new variant of the Vidar infostealer has emerged with sophisticated evasion techniques that exploit user trust in CAPTCHA verification systems. The malware distributes itself through fake CAPTCHA prompts and conceals its payload within seemingly innocuous JPEG and TXT files. Vidar employs fileless attack methodologies to avoid traditional file-based detection while targeting sensitive data including browser credentials and cryptocurrency wallet information. The malware is associated with command and control infrastructure at IP address 62.60.226.200 and shares tactics with the ClickFix malware family. Source: Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files
Easily Exploitable 'Pack2TheRoot' Linux Vulnerability Leads to Root Access
A critical privilege escalation vulnerability designated CVE-2026-41651 has been discovered in PackageKit, a fundamental Linux package management system. The flaw exploits a race condition that allows unprivileged users to escalate their privileges to root level during package installation operations. The vulnerability's ease of exploitation and presence in widely deployed Linux distributions represents a significant security risk for organizations relying on standard package management workflows. Source: Easily Exploitable 'Pack2TheRoot' Linux Vulnerability Leads to Root Access
Firefox Vulnerability Allows Tor User Fingerprinting
A privacy-critical vulnerability tracked as CVE-2026-6770 has been identified in Firefox that enables attackers to fingerprint users of the Tor anonymity network. This vulnerability undermines the privacy protections that Tor users depend upon by allowing cross-site tracking and user identification. Mozilla has addressed this issue through the release of Firefox 150, while the Tor Project has issued Tor 15.0.10 to mitigate the associated risks. Source: Firefox Vulnerability Allows Tor User Fingerprinting
Organizations should prioritize patching the PackageKit vulnerability, updating Firefox and Tor browser instances, and implementing email security controls to defend against Snow malware campaigns. User awareness training regarding fake CAPTCHA prompts and email bombing tactics remains essential to reduce the effectiveness of current attack vectors.
Sources & IOCs
Source articles and extracted indicators (defanged where appropriate).
- Vidar infostealerMulti-stage infostealer variant using steganography and fileless attacks
- ClickFixFake CAPTCHA pages exploiting WordPress sites to trigger infection chain
62.60.226.200C2/payload delivery infrastructure downloading malicious JPEG and TXT files
- TOCTOU race condition in PackageKit allowing privilege escalation to root
- Firefox IndexedDB fingerprinting vulnerability affecting Tor and Private Browsing