Tech Made Simple

Hot Topics: All Roku Players Compared | Best iPad Keyboard Cases | How to Get Emergency Satellite Service for Your Phone

We may earn commissions when you buy from links on our site. Why you can trust us.

author photo

Hackers are flooding your inbox on purpose – then offering to help

by Suzanne Kantra on April 24, 2026

Illustration showing an IT Helpdesk message in response to multiple spam email messages.

Researchers at Google have documented a new attack campaign that weaponizes your own frustration against you. The scheme starts by burying your inbox in spam – hundreds of messages arriving in minutes. Then, right on cue, someone from "IT" reaches out over Microsoft Teams to offer help. If you take that help, you hand attackers the keys to your entire network.

The campaign, detailed in a report by Google Threat Intelligence Group (GTIG) and tracked under the name UNC6692, is a prime example of what security researchers call social engineering: attacks that exploit human behavior rather than software vulnerabilities. The technical malware involved is sophisticated, but none of it works without the victim's cooperation at the first step.

The setup: manufacture the panic

The attack begins a mass email campaign aimed at a single recipient. The goal isn't to phish anyone through email – those messages are just noise, designed to overwhelm the victim and manufacture a sense of crisis. Once the target is rattled and distracted, the attackers pivot to Microsoft Teams.

A Teams chat request arrives from an account outside your organization, posing as helpdesk personnel. The message offers to fix the very problem the attackers just created. That timing is the whole trick. When you're staring at a flooded inbox, and someone offers a solution, skepticism takes a back seat.

The fake fix: a browser trap

The helpdesk impersonator sends a link to install what they describe as a "local patch" to stop the spam. Clicking it opens a webpage designed to look like an official Microsoft Mailbox Repair and Sync Utility. It's convincing enough: professional layout, version number, on-screen buttons, the works.

Once inside the fake utility page, a "Health Check" button triggers an authentication prompt. It asks for your work email and password. And here's where the hackers are getting even sneakier. When you type them in and hit submit, the form tells you the password is wrong. You try again. Wrong again. On the third attempt, it goes through.

That rejection sequence is deliberate. Psychologically, it reinforces the illusion that the system is performing genuine validation – real login systems do reject incorrect passwords, after all. Practically, it ensures the attackers capture your credentials twice, reducing the chance that a typo makes the stolen password unusable. By the time the fake "Configuration completed successfully" message appears, your credentials are already sitting in the attacker’s hands, and the site has quietly downloaded malware to your machine in the background.

Stealing one employee's password and installing malware on their machine is just the first step. From there, UNC6692 deploys a trio of malicious tools, which researchers have named the "SNOW ecosystem", that work together to burrow deeper into your organization. From that single compromised machine, the attackers can scan your internal network and extract a trove of stored passwords and authentication data from Windows.

How to protect yourself

The technical malware here is beyond what most individuals can detect once installed. However, the attack can be stopped at step one, so awareness of this threat is key to preventing this from happening at your company.

Legitimate IT departments do not initiate contact through Microsoft Teams chat requests from outside your organization. If someone reaches out this way, offering to fix a problem, especially one that just appeared, call your actual IT helpdesk using a number you find independently, not one provided in the chat. Don't click any links sent through Teams from external accounts, and don't install anything a chat contact directs you to download.

And while this attack is current being directed at organizations, home users should remain vigilant for copycat threats.

Read nextHow to Tell if an Email Has Been Spoofed

[Image credit: Suzanne Kantra/Techlicious via ChatGPT]


Topics

News, Computers and Software, Computer Safety & Support, Blog


Discussion loading

Home | About | Meet the Team | Contact Us
Media Kit | Newsletter Sponsorships | Licensing & Permissions
Accessibility Statement
Terms of Use | Privacy & Cookie Policy

Techlicious participates in affiliate programs, including the Amazon Services LLC Associates Program, which provide a small commission from some, but not all, of the "click-thru to buy" links contained in our articles. These click-thru links are determined after the article has been written, based on price and product availability — the commissions do not impact our choice of recommended product, nor the price you pay. When you use these links, you help support our ongoing editorial mission to provide you with the best product recommendations.

© Techlicious LLC.