Iranian hackers launch ransomware campaign seeking to steal details through Microsoft Teams



  • The Iranian MuddyWater APT posed as IT staff via Microsoft Teams, tricking victims into granting them remote access.
  • They deployed data stealers, disrupted MFA, exfiltrated data, and organized a Chaos ransomware infection as cover.
  • Investigators concluded that the real motive was espionage, not profit, highlighting the overlap of state-sponsored commercial tactics and criminal tactics.

Iranian state-sponsored hackers carried out a cyber espionage campaign and then tried to mislead researchers with a ransomware infection, experts warned.

An investigation into a recent attack by security researchers Rapid7 uncovered how an anonymous victim was recently approached by someone outside their organization via Microsoft Teams. They posed as IT technicians, discussed troubleshooting a technical issue with the victim, and got them to install and run an AnyDesk session.

Leave a Comment

Your email address will not be published. Required fields are marked *