Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MuddyWater Exploits Teams for Credential Theft in Covert Attack

MuddyWater Exploits Teams for Credential Theft in Covert Attack

Posted on May 6, 2026 By CWS

The hacking group MuddyWater, allegedly backed by the Iranian state, has been implicated in a sophisticated cyberattack that utilizes Microsoft Teams to steal credentials. This operation, noted by Rapid7 in early 2026, employs social engineering strategies to initiate attacks, masquerading as a typical ransomware operation under the guise of the Chaos brand. Despite initial appearances, evidence suggests a targeted operation aimed at obscuring its true origins.

Advanced Social Engineering Tactics

Through Microsoft Teams, attackers engage targets in a high-touch phase of the attack, utilizing screen-sharing to capture credentials and manipulate multi-factor authentication (MFA). Once inside, rather than encrypting files, they focus on data exfiltration and establish extended access using tools like DWAgent. This approach signifies a shift in MuddyWater’s strategy, favoring readily available cybercrime tools to complicate attribution.

Ctrl-Alt-Intel, Broadcom, Check Point, and JUMPSEC have all noted an increase in MuddyWater’s use of such tools, indicating a broader trend in their operations. This includes the deployment of CastleRAT and Tsundere, as observed in recent months, showcasing a tactical shift towards obfuscating their attacks’ true nature.

Historical Context and Recent Developments

MuddyWater’s history with ransomware dates back to 2020, targeting Israeli entities with PowGoop loaders and Thanos ransomware. In 2023, they collaborated with the DarkBit persona for destructive campaigns. By 2025, Qilin ransomware was reportedly used against an Israeli hospital, further illustrating their evolving tactics.

Their use of ransomware as a cover for state-sponsored objectives was highlighted by Check Point, suggesting that involvement in programs like Qilin’s may serve both operational and camouflage purposes. This dual nature complicates defenses, as attacks appear financially driven but serve strategic national goals.

The Role of Chaos Ransomware

Chaos, a ransomware-as-a-service (RaaS) initiative that emerged in 2025, is known for its multiple extortion methods. The group employs a combination of phishing and impersonation tactics to gain initial access, often through Microsoft Teams, and deploys remote access tools like Microsoft Quick Assist to deepen their reach.

Chaos affiliates also use DDoS threats and other extortion tactics, making their operations complex and multifaceted. As of March 2026, the group claimed numerous victims, primarily in the U.S., targeting sectors like construction and manufacturing.

Technical Insights and Attribution Challenges

Rapid7’s analysis revealed MuddyWater’s use of RDP to download malicious software, initiating a multi-stage infection that delivers payloads like remote access trojans disguised as legitimate applications. The campaign’s links to MuddyWater are reinforced by the use of known code-signing certificates.

The convergence of state-sponsored tactics with cybercriminal methodologies poses significant challenges for attribution, often delaying defensive responses. The absence of file encryption in some cases suggests a shift towards using ransomware for obfuscation rather than as a primary attack vector.

Recent discoveries by Hunt.io and ongoing activities by pro-Iranian hacktivists underscore the persistent and escalating nature of these cyber threats, highlighting the interconnectedness of cyber and physical domains in modern conflicts.

The Hacker News Tags:Chaos ransomware, credential theft, cyberattack techniques, Cybercrime, Cybersecurity, data exfiltration, false flag operation, Iranian hackers, Microsoft Teams, MuddyWater, Ransomware, remote access tools, social engineering, state-sponsored hacking

Post navigation

Previous Post: Herd Security Secures $3M to Enhance AI Training Platform
Next Post: Iranian Cyber Threat Poses as Ransomware Attack

Related Posts

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE The Hacker News
FCC Restricts New Import of Foreign Routers Over Security Risks FCC Restricts New Import of Foreign Routers Over Security Risks The Hacker News
Badges, Bytes and Blackmail Badges, Bytes and Blackmail The Hacker News
Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack Malware Injected into 6 npm Packages After Maintainer Tokens Stolen in Phishing Attack The Hacker News
Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor The Hacker News
Meta Starts Showing Ads on WhatsApp After 6-Year Delay From 2018 Announcement Meta Starts Showing Ads on WhatsApp After 6-Year Delay From 2018 Announcement The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Salesforce Fixes Major Marketing Cloud Security Flaws
  • Iranian Cyber Threat Poses as Ransomware Attack
  • MuddyWater Exploits Teams for Credential Theft in Covert Attack
  • Herd Security Secures $3M to Enhance AI Training Platform
  • Announcing Cybersecurity Stars Awards 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Salesforce Fixes Major Marketing Cloud Security Flaws
  • Iranian Cyber Threat Poses as Ransomware Attack
  • MuddyWater Exploits Teams for Credential Theft in Covert Attack
  • Herd Security Secures $3M to Enhance AI Training Platform
  • Announcing Cybersecurity Stars Awards 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark