<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite | Google Cloud Blog]]></title><description><![CDATA[<p>How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite | Google Cloud Blog</p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://cloud.google.com/blog/topics/threat-intelligence/unc6692-social-engineering-custom-malware" title="How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite | Google Cloud Blog">
<img src="https://storage.googleapis.com/gweb-cloudblog-publish/images/03_ThreatIntelligenceWebsiteBannerIdeas_BA.max-2600x2600.png" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://cloud.google.com/blog/topics/threat-intelligence/unc6692-social-engineering-custom-malware">
How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite | Google Cloud Blog
</a>
</h5>
<p class="card-text line-clamp-3">UNC6692 uses social engineering via email spamming and Microsoft Teams phishing to deploy a modular malware suite.</p>
</div>
<a href="https://cloud.google.com/blog/topics/threat-intelligence/unc6692-social-engineering-custom-malware" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://www.gstatic.com/cloud/images/icons/favicon.ico" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0">Google Cloud Blog <span class="text-secondary">(cloud.google.com)</span></p>
</a>
</div><p></p><p>Read on HackerWorkspace: <a href="https://hackerworkspace.com/article/how-unc6692-employed-social-engineering-to-deploy-a-custom-malware-suite-google-cloud-blog" rel="nofollow noopener"><span>https://</span><span>hackerworkspace.com/article/ho</span><span>w-unc6692-employed-social-engineering-to-deploy-a-custom-malware-suite-google-cloud-blog</span></a></p><p><a href="https://infosec.exchange/tags/malware" rel="tag">#<span>malware</span></a> <a href="https://infosec.exchange/tags/databreach" rel="tag">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/threatintelligence" rel="tag">#<span>threatintelligence</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/a43a1062-3f1f-4913-93ec-2305e9e353b1/how-unc6692-employed-social-engineering-to-deploy-a-custom-malware-suite-google-cloud-blog</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:34:45 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/a43a1062-3f1f-4913-93ec-2305e9e353b1.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 25 Apr 2026 18:02:20 GMT</pubDate><ttl>60</ttl></channel></rss>