Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

951+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack
MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack
NEWS

MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack

Iran-linked MuddyWater has been caught using Microsoft Teams social engineering to gain initial access, harvest credentials, and exfiltrate data — then deploying Chaos ransomware as a decoy to mask the true espionage objective.

Dylan H.

News Desk

May 6, 2026
5 min read

MuddyWater, the Iranian state-sponsored hacking group operating under Iran's Ministry of Intelligence and Security (MOIS), has been observed executing a sophisticated false flag ransomware campaign that uses Microsoft Teams as the entry point. The operation, detailed by Rapid7 researchers and reported by The Hacker News, reveals a deliberate deception strategy: conduct intelligence collection under the cover of a financially motivated ransomware attack.

The group used Teams-based social engineering to persuade employees to install legitimate remote management software, then systematically harvested credentials and exfiltrated data before deploying Chaos ransomware — leaving defenders scrambling over encryption while missing the deeper intrusion.

Attack Overview

The campaign unfolds in five clear phases:

1. Teams-Based Social Engineering

Attackers contact employees directly via Microsoft Teams, impersonating IT support staff or helpdesk personnel. The messages claim urgent action is needed — account security issues, compliance failures, or system maintenance. Because Teams messages arrive from within the apparent corporate environment, targets extend higher trust than they would to cold emails.

2. Remote Management Tool Installation

Targets are instructed to install one of several legitimate remote management tools:

  • ScreenConnect (ConnectWise)
  • AnyDesk
  • SimpleHelp
  • Level.io

These tools give attackers interactive remote sessions without dropping malicious binaries — dramatically reducing the chance of AV or EDR detection at this stage.

3. Credential Harvesting

Once inside via the remote session, the threat actor:

  • Accesses LSASS to dump Active Directory credentials
  • Pulls saved passwords from browser credential stores (Chrome, Edge, Firefox)
  • Targets Windows Credential Manager entries
  • Harvests Exchange/Outlook email account credentials

The harvested credentials enable lateral movement to servers, file shares, email archives, and cloud services.

4. Data Exfiltration (True Objective)

Before any ransomware is deployed, the attackers spend time identifying and exfiltrating intelligence-relevant data. MuddyWater's historical targeting suggests primary interest in:

  • Government and defense communications
  • Personnel databases and organizational charts
  • VPN and remote access configurations
  • Policy documents and strategic planning materials

5. Chaos Ransomware Deployment (Decoy)

With the espionage mission complete, the group deploys Chaos ransomware — a publicly available .NET-based ransomware builder — across the environment. This serves multiple strategic purposes:

PurposeEffect
Attribution confusionChaos is widely used by financially motivated actors; ties to nation-state are obscured
Incident response distractionDefenders focus on restoring from backups instead of forensic investigation
Evidence destructionFile encryption overwrites metadata, complicating timeline reconstruction
False narrativeVictim and media frame the event as a ransomware attack, not state espionage

Why Microsoft Teams?

The pivot to Teams as an attack vector reflects a deliberate adaptation to enterprise security improvements. Traditional spear-phishing faces:

  • Enhanced email gateway filtering
  • Attachment sandboxing
  • User awareness training focused on suspicious emails

Microsoft Teams bypasses these controls entirely. Traffic is legitimate, the platform is trusted, and users are less trained to be suspicious of Teams messages requesting action. The channel also supports real-time back-and-forth that allows the attacker to overcome hesitation and answer objections — making social engineering significantly more effective.

MuddyWater Background

MuddyWater (also tracked as MERCURY, Seedworm, Boggy Serpent, and Static Kitten) has been active since at least 2017. The group primarily targets:

  • Middle Eastern government ministries and defense contractors
  • Telecommunications providers globally
  • Critical infrastructure operators
  • Think tanks with policy relevance to Iranian interests

The US Treasury sanctioned the group in 2022, and multiple joint advisories from CISA, the FBI, NSA, and allied intelligence services have documented their evolving tactics.

Defensive Recommendations

Restrict external Teams access. Configure Microsoft Teams to limit or require approval for external user communications. Log all external-initiated sessions.

Audit remote management tool installations. Only permit IT-approved tools from an explicit allowlist. Alert on installation of AnyDesk, ScreenConnect, SimpleHelp, and Level.io outside of change windows.

Do not close the incident after ransomware remediation. The ransomware component is the cover — treat the underlying credential theft and access as a separate, ongoing incident requiring full scope investigation.

Rotate all credentials after incident. Any environment where MuddyWater-style activity is suspected should treat all credentials — AD, cloud, VPN, service accounts — as compromised, not just the accounts confirmed in logs.

Enable Teams audit logging. Enable AuditLogs for Microsoft Teams in the Microsoft 365 Compliance Center. Review external contact initiation events, especially those leading to remote session requests.

Detection Signals

StageSignal
Initial accessTeams messages from external or guest accounts requesting remote sessions
Tool installationNew remote management software not in approved list
Credential accessLSASS read access by non-system processes
Lateral movementAnomalous admin logins; pass-the-hash/ticket events
ExfiltrationHigh-volume file access or data staging to compressed archives
RansomwareVSS deletion commands; mass file rename or encryption activity

References

  • The Hacker News — MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack
  • Rapid7 — MuddyWater Campaign Analysis
  • CISA — MuddyWater Advisory
  • US Treasury — OFAC Sanctions on MOIS-Linked Actors
#Ransomware#Microsoft#Iran#MuddyWater#The Hacker News#Cybercrime#Espionage#Social Engineering

Related Articles

MuddyWater Hackers Use Chaos Ransomware as a Decoy in Attacks

The Iranian state-linked MuddyWater hacking group is disguising espionage operations as Chaos ransomware attacks, using Microsoft Teams social engineering to gain initial access before harvesting credentials, stealing data, and deploying ransomware as a distraction.

6 min read

Iranian APT Intrusion Masquerades as Chaos Ransomware Attack

Security researchers have uncovered an Iranian APT campaign, likely attributed to MuddyWater, that deployed Chaos ransomware as a smokescreen to conceal its true espionage objectives of credential harvesting, persistent access, and data theft.

5 min read

2026: The Year AI Became the Attacker's Favorite Co-Pilot

From a teenager in Osaka using AI to steal data from 7 million users to nation-state actors automating exploit chains in hours, 2026 marks a turning point — AI is no longer just a defender's tool.

6 min read
Back to all News