- SnowbeltJavaScript-based backdoor deployed as Chromium browser extension for persistent access
- SnowglazePython-based tunneler creating secure WebSocket tunnel to C&C, supports SOCKS proxy and traffic obfuscation
- SnowbasinPersistent backdoor functioning as local HTTP server supporting command execution, screenshots, and data harvesting
- SnowModular malware framework comprising Snowbelt, Snowglaze, and Snowbasin components
ThreatNoir Morning Brief — April 28
Morning Review in IT Security — April 28, 2026
The threat landscape continues to evolve with sophisticated attack techniques targeting both traditional and cloud-based infrastructure. Today's briefing covers emerging malware campaigns leveraging social engineering, critical Linux vulnerabilities, and cloud identity compromise vectors that demand immediate attention from security teams.
UNC6692 Uses Email Bombing, Social Engineering to Deploy 'Snow' Malware
Threat actor UNC6692 has been observed conducting campaigns that combine email bombing tactics with social engineering techniques to distribute the Snow malware family. The malware variants identified in these attacks include Snowbelt, Snowglaze, and Snowbasin, each designed to establish persistent access on compromised systems. Source: UNC6692 Uses Email Bombing, Social Engineering to Deploy 'Snow' Malware
The campaign demonstrates how attackers continue to rely on human factors as the primary infection vector. By overwhelming targets with malicious emails and leveraging social engineering pretexts, UNC6692 increases the likelihood that victims will execute malicious payloads. Organizations should prioritize user awareness training and implement robust email filtering controls to mitigate this threat.
Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files
A new variant of the Vidar infostealer malware has emerged, employing fake CAPTCHA prompts as a distribution mechanism while concealing malicious code within seemingly benign JPEG and TXT files. The malware utilizes fileless attack techniques and targets sensitive data including browser credentials and cryptocurrency wallet information. Source: Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files
The use of fake CAPTCHAs represents an evolution in social engineering tactics, exploiting user trust in verification mechanisms. Associated infrastructure includes the IP address 62.60.226.200. The malware's ability to hide within common file formats and execute without traditional process injection makes detection significantly more challenging for endpoint security tools.
Easily Exploitable 'Pack2TheRoot' Linux Vulnerability Leads to Root Access
A critical privilege escalation vulnerability designated CVE-2026-41651 has been identified in PackageKit, affecting Linux systems. The flaw exploits a race condition that permits unprivileged users to escalate their privileges during package installation operations, potentially granting complete root access to attackers. Source: Easily Exploitable 'Pack2TheRoot' Linux Vulnerability Leads to Root Access
The ease of exploitation combined with the severity of the impact makes this vulnerability particularly dangerous in environments where Linux systems are widely deployed. System administrators should prioritize patching PackageKit across their infrastructure to prevent unauthorized privilege escalation attacks.
Microsoft Entra Agent ID Flaw Enabled Tenant Takeover via Privilege Escalation
A privilege escalation vulnerability in Microsoft Entra's Agent ID implementation has been discovered and subsequently patched by Microsoft. The flaw allowed attackers to abuse Service Principal accounts to achieve unauthorized privilege escalation and complete tenant takeover of cloud environments. Source: Microsoft Entra Agent ID Flaw Enabled Tenant Takeover via Privilege Escalation
This vulnerability highlights the critical importance of identity and access management security in cloud infrastructure. Organizations utilizing Microsoft Entra should ensure all available patches have been applied immediately to eliminate the risk of tenant compromise through Service Principal abuse.
Security teams should remain vigilant regarding these emerging threats and ensure their detection and response capabilities are adequately tuned to identify the tactics, techniques, and procedures described in today's briefing.
Sources & IOCs
Source articles and extracted indicators (defanged where appropriate).
- Vidar infostealerMulti-stage infostealer variant using steganography and fileless attacks
- ClickFixFake CAPTCHA pages exploiting WordPress sites to trigger infection chain
62.60.226.200C2/payload delivery infrastructure downloading malicious JPEG and TXT files
- TOCTOU race condition in PackageKit allowing privilege escalation to root