<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Iranian Apt — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/iranian-apt/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/iranian-apt/feed.xml" rel="self" type="application/rss+xml"/><item><title>MuddyWater Disguises Cyber-Espionage as Chaos Ransomware Attack</title><link>https://feed.craftedsignal.io/briefs/2026-05-muddywater-chaos-ransomware/</link><pubDate>Thu, 07 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-muddywater-chaos-ransomware/</guid><description>The MuddyWater group is disguising its cyber-espionage operations as Chaos ransomware attacks, using Microsoft Teams social engineering for initial access and establishing persistence, likely to complicate attribution and mask their true objectives.</description><content:encoded><![CDATA[<p>MuddyWater, an Iranian state-sponsored cyber-espionage group known for aligning with the country&rsquo;s Ministry of Intelligence and Security (MOIS), is disguising its operations as Chaos ransomware attacks. Starting in 2025, they have used Microsoft Teams social engineering to gain initial access and establish persistence within targeted organizations. The attackers engage in credential theft, data exfiltration, and extortion emails, while also making an entry on the Chaos leak portal. Rapid7 researchers believe the ransomware component serves as a decoy to complicate attribution and conceal their true cyber-espionage objectives. The group has previously deployed ransomware, such as Qilin in late 2025, to mask their activities, possibly pivoting to Chaos to avoid attribution following the Qilin incident.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attackers initiate chats with employees via Microsoft Teams, using social engineering to establish screen-sharing sessions.</li>
<li>Credential theft occurs via phishing pages masquerading as Microsoft Quick Assist or by tricking victims into typing their passwords into local text files.</li>
<li>Compromised accounts are used to authenticate to internal systems, including the domain controller.</li>
<li>Persistence is established using RDP, DWAgent, and AnyDesk for remote access to the compromised systems.</li>
<li>A malware loader (ms_upd.exe) is used to drop a custom backdoor (Game.exe), disguised as a Microsoft WebView2 application.</li>
<li>The backdoor malware performs anti-analysis and anti-VM checks.</li>
<li>The backdoor supports 12 commands, including PowerShell and CMD command execution, file upload and deletion, and persistent shell access.</li>
<li>Data exfiltration occurs alongside the deployment of Chaos ransomware and an extortion attempt, likely to obfuscate the true objective of cyber espionage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The MuddyWater group&rsquo;s activities can lead to significant data breaches, system compromise, and potential financial losses for targeted organizations. While the Chaos ransomware component suggests a financial motive, the primary goal is believed to be cyber espionage aligned with the interests of the Iranian government. Past operations attributed to MuddyWater have targeted organizations in various sectors, and this shift to using ransomware as a decoy could broaden their target scope. If successful, these attacks can result in the theft of sensitive information, disruption of critical services, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for <code>ms_upd.exe</code> dropping <code>Game.exe</code>, disguised as a Microsoft WebView2 application, and deploy the Sigma rule &ldquo;Detect MuddyWater Backdoor Deployment&rdquo; to identify this activity.</li>
<li>Monitor network connections for processes associated with AnyDesk and DWAgent, and review for unusual network connections to external IP addresses to detect persistence mechanisms.</li>
<li>Implement and enforce multi-factor authentication (MFA) to mitigate the impact of credential theft, and educate employees on the risks of social engineering via Microsoft Teams to prevent initial access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>muddywater</category><category>chaos ransomware</category><category>cyberespionage</category><category>data theft</category><category>iranian apt</category></item></channel></rss>