MuddyWater APT Leverages Microsoft Teams and False Flag Ransomware Tactics for Data Exfiltration

Iranian APT MuddyWater Masquerades as Ransomware Group in Microsoft Teams-Based Espionage Campaign

HIGH
May 7, 2026
5m read
Threat ActorCyberattackPhishing

Related Entities

Threat Actors

MuddyWater Mango SandstormSeedwormStatic KittenDEV-1084

Products & Tech

Other

ChaosDWAgentCastleRATTsundereThanosDarkBitGame.exeRouterHosting

Full Report

Executive Summary

The Iranian state-sponsored threat group MuddyWater (also known as Mango Sandstorm, Seedworm, and Static Kitten) has been identified as the actor behind a novel espionage campaign that leverages Microsoft Teams for social engineering and masquerades as a ransomware attack. The operation, which began in early 2026, targets organizations of strategic value to Iran. Attackers engage victims in interactive screen-sharing sessions to harvest credentials, bypass multi-factor authentication (MFA), and install remote access tools for data exfiltration and long-term persistence. This false flag operation, which mimics the Chaos ransomware group, is a deliberate tactic to mislead incident responders and delay attribution, highlighting a strategic shift towards blending state-sponsored espionage with common cybercrime techniques.


Threat Overview

The campaign is characterized by its high-touch social engineering vector. Threat actors initiate contact and persuade targets to join a Microsoft Teams meeting. During the session, the victim is manipulated into running commands or entering credentials into a text file under the guise of a troubleshooting or collaborative exercise. This allows the attackers to capture credentials in real-time, effectively neutralizing MFA protections.

Unlike a typical ransomware attack, the primary objective is not financial extortion through data encryption. Instead, MuddyWater focuses on cyber espionage. After gaining initial access, the group deploys legitimate remote management and monitoring (RMM) tools, including DWAgent and AnyDesk, to maintain a persistent foothold on the compromised network. The use of these dual-use tools allows their malicious activity to blend in with normal administrative traffic.

The targets include government entities and other organizations of strategic interest in the United States, Western countries, the Asia-Pacific (APAC) region, and the Middle East. The use of a false ransomware persona is a calculated deception designed to create confusion and misdirect forensic analysis towards a criminal, rather than state-sponsored, origin.

Technical Analysis

Attribution to MuddyWater was established with "moderate confidence" based on several key technical indicators. A malicious executable, ms_upd.exe, was signed with a code-signing certificate issued to "Donald Gay." This specific certificate has been previously linked to MuddyWater operations. The group's TTPs in this campaign include:

  • Initial Access: T1566.004 - Spearphishing via Service: Attackers use Microsoft Teams as the delivery vehicle for their social engineering attack.
  • Execution: The victim is tricked into executing commands or scripts provided by the attacker during the Teams session.
  • Credential Access: T1552.001 - Credentials In Files: Attackers convince the user to type credentials into a text file, which they can then access.
  • Defense Evasion & Persistence: T1219 - Remote Access Software: The group deploys legitimate tools like DWAgent and AnyDesk to maintain access and evade detection. They also used a custom remote access trojan named Game.exe.
  • Masquerading: T1036.003 - Rename System Utilities: The operation mimics the Chaos ransomware group, a classic false flag tactic.
  • Command and Control: T1071.001 - Web Protocols: The deployed RATs and RMM tools communicate with C2 infrastructure over standard web protocols.

The attackers also utilized off-the-shelf malware from the cybercrime ecosystem, including CastleRAT and Tsundere, further blurring the lines between their operations and those of financially motivated criminals.

Impact Assessment

The primary impact of this campaign is not business disruption from encryption but rather the long-term strategic risk associated with data exfiltration and persistent espionage. For affected organizations, the compromise could lead to the theft of sensitive government secrets, intellectual property, and confidential business information. The establishment of a persistent backdoor creates an ongoing threat, allowing MuddyWater to conduct further reconnaissance, move laterally within the network, and exfiltrate data over an extended period. The false flag nature of the attack complicates incident response, potentially leading to incorrect remediation strategies focused on ransomware recovery rather than APT eviction.

IOCs — Directly from Articles

Type
ip_address_v4
Value
172.86.126.208
Description
Command and Control (C2) server.
Type
ip_address_v4
Value
172.86.76.127
Description
RouterHosting VPS used in the attack infrastructure.
Type
file_name
Value
ms_upd.exe
Description
Malicious executable signed with a certificate previously used by MuddyWater.
Type
file_name
Value
Game.exe
Description
Custom Remote Access Trojan.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns to detect related activity:

Type
process_name
Value
DWAService.exe
Description
Process associated with the DWAgent RMM tool.
Context
Endpoint Detection and Response (EDR) logs, Process monitoring.
Type
process_name
Value
AnyDesk.exe
Description
Process associated with the AnyDesk RMM tool, especially if installed outside of normal procedure.
Context
EDR logs, Software inventory.
Type
network_traffic_pattern
Value
Outbound connections to 172.86.126.208 or 172.86.76.127
Description
Network traffic to known malicious infrastructure.
Context
Firewall logs, Netflow, SIEM.
Type
command_line_pattern
Value
powershell.exe -ExecutionPolicy Bypass
Description
Suspicious PowerShell execution, often used to load malicious scripts.
Context
Windows Event ID 4688, EDR command line logging.
Type
log_source
Value
Microsoft Teams Call/Meeting Logs
Description
Correlate suspicious endpoint activity with recent Teams sessions involving external parties.
Context
Microsoft 365 audit logs.

Detection & Response

Detecting this campaign requires a multi-layered approach focusing on behavior rather than just signatures.

  1. Endpoint Monitoring: Use an EDR solution to monitor for the installation and execution of unauthorized remote access tools like DWAgent and AnyDesk. Create alerts for processes spawned by Microsoft Teams, especially command-line interpreters like cmd.exe or powershell.exe. D3FEND's D3-PA - Process Analysis is critical here.
  2. Network Traffic Analysis: Implement D3-NTA - Network Traffic Analysis to monitor for and alert on outbound connections to the known IOCs and other suspicious domains. Look for beaconing activity characteristic of RMM tools.
  3. Log Auditing: Ingest Microsoft 365 audit logs into a SIEM. Correlate security alerts on endpoints with Teams meeting logs to identify potential social engineering sessions. Monitor for suspicious file creation and script execution following interactive sessions with external users.
  4. Incident Response: If an infection is suspected, treat it as an APT incident, not a standard ransomware case. The goal is eviction, not just recovery. Isolate affected hosts, preserve forensic evidence, and conduct a thorough investigation to identify the full scope of the compromise, including lateral movement and data staging.

Mitigation

Mitigation efforts should focus on user awareness, access controls, and hardening the environment.

  1. User Training: This is the most critical defense. Educate users about social engineering tactics, especially those involving interactive sessions and requests to run commands or enter credentials. Implement M1017 - User Training.
  2. Application Control: Use application allowlisting policies to prevent the execution of unauthorized software, including unapproved RMM tools. This aligns with M1038 - Execution Prevention.
  3. MFA Hardening: While the attack bypasses MFA through credential theft, continue to enforce it universally. This is a foundational control as per M1032 - Multi-factor Authentication. Augment with policies that require re-authentication for sensitive actions.
  4. Network Segmentation: Restrict outbound traffic from workstations to only what is necessary for business operations. This can help block C2 communications from unauthorized tools. This is a form of M1030 - Network Segmentation.
  5. Endpoint Hardening: Configure PowerShell to use Constrained Language Mode and enable script block logging to make malicious script execution more difficult and visible.

Timeline of Events

1
September 1, 2020
MuddyWater targeted Israeli organizations with the Thanos ransomware.
2
January 1, 2023
MuddyWater collaborated with DEV-1084 (DarkBit) to launch destructive attacks under the guise of ransomware.
3
January 1, 2026
The false flag ransomware operation was first observed in early 2026.
4
May 7, 2026
This article was published

MITRE ATT&CK Mitigations

Train users to recognize social engineering attempts, especially those involving requests to enter credentials or run commands during interactive sessions.

Implement application control policies to prevent the execution of unauthorized remote access software like DWAgent and AnyDesk.

Mapped D3FEND Techniques:

Enforce MFA across all services, which remains a critical control even when attackers attempt social engineering bypasses.

Mapped D3FEND Techniques:

Use EDR tools to monitor for suspicious behavior, such as Microsoft Teams spawning command shells or unauthorized RMM tools being installed.

Mapped D3FEND Techniques:

Implement egress filtering to block outbound connections to known malicious IPs and restrict traffic from endpoints to only necessary destinations.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Deploy an Endpoint Detection and Response (EDR) solution capable of deep process analysis, specifically focusing on the parent-child process relationships of collaboration tools like Microsoft Teams. In the context of this MuddyWater campaign, security teams should create specific detection rules that alert on Teams.exe spawning command-line interpreters such as cmd.exe or powershell.exe. Further, establish a baseline of legitimate RMM tools used in your environment and alert on any new or unauthorized installations of software like AnyDesk or DWAgent. Monitor for processes that rename themselves to masquerade as legitimate system files. This technique is crucial for detecting the execution phase of the attack, providing an early opportunity to intervene before persistence is fully established and significant data exfiltration occurs. Correlate process creation events with network connection data to identify processes making outbound calls to suspicious or uncategorized IP addresses.

Implement User Behavior Analysis (UBA) to detect anomalies that indicate a social engineering attack is in progress. For this specific threat, UBA tools can be configured to monitor for unusual patterns related to Microsoft Teams usage. For example, an alert could be triggered if a user suddenly engages in a lengthy screen-sharing session with an external, un-vetted participant, and this activity is immediately followed by the execution of PowerShell scripts or the installation of new software. By baselining normal user activity, the system can flag deviations that signify a compromised account or a user under duress. This technique helps bridge the gap left by traditional security controls, providing a critical layer of defense against the high-touch social engineering TTPs employed by MuddyWater. It directly addresses the initial access and execution phase by identifying the human element being manipulated.

Enforce strict outbound traffic filtering policies on perimeter firewalls and endpoint firewalls to disrupt the command-and-control (C2) and exfiltration phases of the attack. For the MuddyWater campaign, this involves creating explicit deny rules for the known C2 IPs (172.86.126.208, 172.86.76.127). More strategically, organizations should adopt a default-deny posture for egress traffic from user workstations, only allowing connections to known-good, categorized domains and IP addresses required for business functions. This would prevent unauthorized RMM tools like DWAgent and AnyDesk from connecting back to their C2 infrastructure, effectively neutralizing them even if they are successfully installed on an endpoint. This countermeasure is a powerful compensating control that can contain a breach and prevent the ultimate goal of data exfiltration, directly mapping to the MITRE mitigation M1037 (Filter Network Traffic).

Timeline of Events

1
January 1, 2026

The false flag ransomware operation was first observed in early 2026.

2
January 1, 2023

MuddyWater collaborated with DEV-1084 (DarkBit) to launch destructive attacks under the guise of ransomware.

3
September 1, 2020

MuddyWater targeted Israeli organizations with the Thanos ransomware.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

MuddyWaterMango SandstormMicrosoft TeamsFalse FlagEspionageSocial EngineeringRMMAPTIran

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.