The Iranian state-sponsored threat group MuddyWater (also known as Mango Sandstorm, Seedworm, and Static Kitten) has been identified as the actor behind a novel espionage campaign that leverages Microsoft Teams for social engineering and masquerades as a ransomware attack. The operation, which began in early 2026, targets organizations of strategic value to Iran. Attackers engage victims in interactive screen-sharing sessions to harvest credentials, bypass multi-factor authentication (MFA), and install remote access tools for data exfiltration and long-term persistence. This false flag operation, which mimics the Chaos ransomware group, is a deliberate tactic to mislead incident responders and delay attribution, highlighting a strategic shift towards blending state-sponsored espionage with common cybercrime techniques.
The campaign is characterized by its high-touch social engineering vector. Threat actors initiate contact and persuade targets to join a Microsoft Teams meeting. During the session, the victim is manipulated into running commands or entering credentials into a text file under the guise of a troubleshooting or collaborative exercise. This allows the attackers to capture credentials in real-time, effectively neutralizing MFA protections.
Unlike a typical ransomware attack, the primary objective is not financial extortion through data encryption. Instead, MuddyWater focuses on cyber espionage. After gaining initial access, the group deploys legitimate remote management and monitoring (RMM) tools, including DWAgent and AnyDesk, to maintain a persistent foothold on the compromised network. The use of these dual-use tools allows their malicious activity to blend in with normal administrative traffic.
The targets include government entities and other organizations of strategic interest in the United States, Western countries, the Asia-Pacific (APAC) region, and the Middle East. The use of a false ransomware persona is a calculated deception designed to create confusion and misdirect forensic analysis towards a criminal, rather than state-sponsored, origin.
Attribution to MuddyWater was established with "moderate confidence" based on several key technical indicators. A malicious executable, ms_upd.exe, was signed with a code-signing certificate issued to "Donald Gay." This specific certificate has been previously linked to MuddyWater operations. The group's TTPs in this campaign include:
T1566.004 - Spearphishing via Service: Attackers use Microsoft Teams as the delivery vehicle for their social engineering attack.T1552.001 - Credentials In Files: Attackers convince the user to type credentials into a text file, which they can then access.T1219 - Remote Access Software: The group deploys legitimate tools like DWAgent and AnyDesk to maintain access and evade detection. They also used a custom remote access trojan named Game.exe.T1036.003 - Rename System Utilities: The operation mimics the Chaos ransomware group, a classic false flag tactic.T1071.001 - Web Protocols: The deployed RATs and RMM tools communicate with C2 infrastructure over standard web protocols.The attackers also utilized off-the-shelf malware from the cybercrime ecosystem, including CastleRAT and Tsundere, further blurring the lines between their operations and those of financially motivated criminals.
The primary impact of this campaign is not business disruption from encryption but rather the long-term strategic risk associated with data exfiltration and persistent espionage. For affected organizations, the compromise could lead to the theft of sensitive government secrets, intellectual property, and confidential business information. The establishment of a persistent backdoor creates an ongoing threat, allowing MuddyWater to conduct further reconnaissance, move laterally within the network, and exfiltrate data over an extended period. The false flag nature of the attack complicates incident response, potentially leading to incorrect remediation strategies focused on ransomware recovery rather than APT eviction.
ip_address_v4172.86.126.208ip_address_v4172.86.76.127file_namems_upd.exefile_nameGame.exeSecurity teams may want to hunt for the following patterns to detect related activity:
process_nameDWAService.exeprocess_nameAnyDesk.exenetwork_traffic_pattern172.86.126.208 or 172.86.76.127command_line_patternpowershell.exe -ExecutionPolicy Bypasslog_sourceMicrosoft Teams Call/Meeting LogsDetecting this campaign requires a multi-layered approach focusing on behavior rather than just signatures.
DWAgent and AnyDesk. Create alerts for processes spawned by Microsoft Teams, especially command-line interpreters like cmd.exe or powershell.exe. D3FEND's D3-PA - Process Analysis is critical here.D3-NTA - Network Traffic Analysis to monitor for and alert on outbound connections to the known IOCs and other suspicious domains. Look for beaconing activity characteristic of RMM tools.Mitigation efforts should focus on user awareness, access controls, and hardening the environment.
M1017 - User Training.M1038 - Execution Prevention.M1032 - Multi-factor Authentication. Augment with policies that require re-authentication for sensitive actions.M1030 - Network Segmentation.Train users to recognize social engineering attempts, especially those involving requests to enter credentials or run commands during interactive sessions.
Implement application control policies to prevent the execution of unauthorized remote access software like DWAgent and AnyDesk.
Enforce MFA across all services, which remains a critical control even when attackers attempt social engineering bypasses.
Mapped D3FEND Techniques:
Use EDR tools to monitor for suspicious behavior, such as Microsoft Teams spawning command shells or unauthorized RMM tools being installed.
Mapped D3FEND Techniques:
Implement egress filtering to block outbound connections to known malicious IPs and restrict traffic from endpoints to only necessary destinations.
Mapped D3FEND Techniques:
Deploy an Endpoint Detection and Response (EDR) solution capable of deep process analysis, specifically focusing on the parent-child process relationships of collaboration tools like Microsoft Teams. In the context of this MuddyWater campaign, security teams should create specific detection rules that alert on Teams.exe spawning command-line interpreters such as cmd.exe or powershell.exe. Further, establish a baseline of legitimate RMM tools used in your environment and alert on any new or unauthorized installations of software like AnyDesk or DWAgent. Monitor for processes that rename themselves to masquerade as legitimate system files. This technique is crucial for detecting the execution phase of the attack, providing an early opportunity to intervene before persistence is fully established and significant data exfiltration occurs. Correlate process creation events with network connection data to identify processes making outbound calls to suspicious or uncategorized IP addresses.
Implement User Behavior Analysis (UBA) to detect anomalies that indicate a social engineering attack is in progress. For this specific threat, UBA tools can be configured to monitor for unusual patterns related to Microsoft Teams usage. For example, an alert could be triggered if a user suddenly engages in a lengthy screen-sharing session with an external, un-vetted participant, and this activity is immediately followed by the execution of PowerShell scripts or the installation of new software. By baselining normal user activity, the system can flag deviations that signify a compromised account or a user under duress. This technique helps bridge the gap left by traditional security controls, providing a critical layer of defense against the high-touch social engineering TTPs employed by MuddyWater. It directly addresses the initial access and execution phase by identifying the human element being manipulated.
Enforce strict outbound traffic filtering policies on perimeter firewalls and endpoint firewalls to disrupt the command-and-control (C2) and exfiltration phases of the attack. For the MuddyWater campaign, this involves creating explicit deny rules for the known C2 IPs (172.86.126.208, 172.86.76.127). More strategically, organizations should adopt a default-deny posture for egress traffic from user workstations, only allowing connections to known-good, categorized domains and IP addresses required for business functions. This would prevent unauthorized RMM tools like DWAgent and AnyDesk from connecting back to their C2 infrastructure, effectively neutralizing them even if they are successfully installed on an endpoint. This countermeasure is a powerful compensating control that can contain a breach and prevent the ultimate goal of data exfiltration, directly mapping to the MITRE mitigation M1037 (Filter Network Traffic).
The false flag ransomware operation was first observed in early 2026.
MuddyWater collaborated with DEV-1084 (DarkBit) to launch destructive attacks under the guise of ransomware.
MuddyWater targeted Israeli organizations with the Thanos ransomware.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.