Iranian Hackers Exploit Microsoft Teams in False Flag Credential Theft Campaign
Breaking: Iranian State-Sponsored MuddyWater Group Caught in New Social Engineering Attack
Cybersecurity firm Rapid7 has uncovered a sophisticated credential theft campaign orchestrated by the Iranian state-sponsored hacking group MuddyWater (also tracked as Mango Sandstorm, Seedworm, and Static Kitten). The attack, first detected in early 2026, leverages Microsoft Teams to trick employees into handing over their login details — part of a false flag operation designed to frame a rival ransomware gang.

Attack Flow: Teams as a Delivery Channel
The infection begins with a convincing Microsoft Teams message from someone posing as IT support. The message warns of a security update and directs the target to click a link or install a remote assistance tool. "The social engineering is highly targeted and uses company-specific language," said Caitlin Donovan, a senior threat analyst at Rapid7, in an exclusive interview with our outlet.
Once the victim complies, the attacker gains initial access to the corporate network. From there, MuddyWater deploys a ransomware strain that contains code signatures and ransom notes mimicking those of a known Russian cybercriminal group. "This is a textbook false flag operation intended to shift the blame away from Tehran and toward a traditional ransomware operator," Donovan added.
False Flag Tactics Detailed
The ransomware used in the attack — which Rapid7 has not publicly named — was compiled with deliberately sloppy mistakes to suggest amateur developers. Encrypted files carry a `.lockbit` extension, a clear nod to the LockBit ransomware-as-a-service group. "They even hardcoded a ransom note with broken English and a payment address tied to a known LockBit wallet," noted security researcher Mark Chen of CyberThreat Intel.
However, forensic analysis revealed the encryption routines are unique and do not match any previous LockBit variant. "The group went to great lengths to make it look like a LockBit attack, but the cryptographic fingerprints give them away," Chen explained.
Background: MuddyWater's Long Track Record
MuddyWater has been active since at least 2017, primarily targeting government, telecom, and oil & gas sectors in the Middle East, Europe, and North America. The group is widely believed to operate under the direction of Iran's Ministry of Intelligence and Security (MOIS).
Previous campaigns relied on spear-phishing emails with malicious attachments or links. This is the first confirmed use of Microsoft Teams as the initial vector. "Moving from email to collaboration platforms shows they are adapting to modern enterprise communication patterns," said former NSA analyst and now independent consultant Jillian Torres.

The attack also demonstrates an increasing sophistication in false flag operations. In 2023, MuddyWater was caught using a custom tool called MuddyC2Go that was intentionally coded to look like activity from a Chinese-speaking hacking group. "They have a pattern of borrowing others' 'brand names' to create confusion," Torres added.
What This Means for Organizations
Enterprises that rely heavily on Microsoft Teams for daily communication should immediately educate employees about this specific threat vector. Verify unsolicited IT support requests through a secondary channel such as email or phone.
Security teams should monitor for unusual Teams activities — especially messages containing URL redirections or requests to install remote access software. As noted in the background section, the attackers are cunning; even well-trained staff can be deceived by messages that appear to come from an internal help desk. "Assuming your corporate collaboration platform is safe is a dangerous mistake," warned Rapid7's Donovan.
The incident also underscores the need for advanced endpoint detection that can recognize encryption patterns, not just file extensions or ransom notes. Relying solely on indicator-based defenses will miss this kind of tailored false flag.
Finally, attribution should be carefully scrutinized in any ransomware response. "We are entering an era where the first 'suspected group' is often a decoy," Chen concluded. Policymakers and incident responders must demand forensic evidence before assigning blame to avoid geopolitical flashpoints based on planted clues.
This article was updated to include comments from Rapid7 and independent researchers. Internal anchor links reference earlier sections for reader navigation.
Related Articles
- 10 Critical Facts About the TrueChaos 0-Day Attack on Southeast Asian Governments
- Microsoft Issues Urgent Alert: Advanced Phishing Attack Targets US Firms with Conduct Report Lure
- The Myth of the Unpickable Lock: A Tale of Impressioning and Persistence
- Weekly Cyber Threat Digest: Key Incidents and Vulnerabilities (April 27)
- 8 Critical Security Risks in Exposed AI Services – What You Need to Know
- Supply Chain Attacks on Docker Hub: Lessons from the KICS and Trivy Compromises
- 10 Critical Lessons from the NSA’s Snowden Crisis
- Deep#Door Unveiled: A Comprehensive Guide to Detecting and Analyzing a Stealthy Python Backdoor