Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

OpenAI To Extend Cyber Program to Government Agencies

May 7, 2026

Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

May 7, 2026

Iran-Linked APT Posed as Chaos Ransomware Member in Espionage Campaign

May 6, 2026
Facebook X (Twitter) Instagram
Thursday, May 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Iran-Linked APT Posed as Chaos Ransomware Member in Espionage Campaign
News

Iran-Linked APT Posed as Chaos Ransomware Member in Espionage Campaign

Team-CWDBy Team-CWDMay 6, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


An APT group linked to the Iranian government pretended to be a Chaos ransomware affiliate in order to provide plausible deniability for geopolitical espionage and prepositioning, Rapid7 has claimed.

The security vendor made the revelations in a new report published on May 6, Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware.

Rapid7 branded an intrusion which occurred in early 2026 as a false flag operation by the MuddyWater (aka Seedworm, Static Kitten and Mango Sandstorm) group affiliated with the Iranian Ministry of Intelligence and Security.

Read more on Chaos: New Chaos Ransomware Emerges, Launches Wave of Attacks.

The intrusion itself, which took place at an unnamed organization, began with social engineering of an employee via Microsoft Teams screen sharing.

“By operating interactively through compromised users, the attacker [TA] conducted initial discovery, harvested credentials, including MFA manipulation, and quickly transitioned to using legitimate accounts for internal access,” Rapid7 explained.

“From there, the TA established persistence using remote access tools such as DWAgent and AnyDesk, before deploying additional payloads and further control of the environment. Following this, the TA exfiltrated data from the compromised environment and subsequently contacted the victim via email, claiming data theft and initiating ransom negotiations.”

Obfuscation Can’t Hide Iran Links

Although the threat actor alleged successful data exfiltration, the Chaos group operates a “blind” countdown timer, meaning no victim details could be viewed on the RaaS outfit’s data leak site (DLS).

The actor also claimed to have placed a note in the victim organization’s desktop directory containing “access credentials” for a secure chat – however, Rapid7 was unable to locate it.

“Despite these inconsistencies in the initial proof-of-compromise, the TA later published the stolen data on its DLS in line with modern extortion tactics,” the report continued.

While the leaked data was assessed to be legitimate, the group didn’t deploy a ransomware payload, which a regular financially motivated Chaos affiliate would be expected to.

Aside from this unusual behavior, Rapid7 discovered several links to previous infrastructure used by MuddyWater including:

  • A code-signing certificate (“Donald Gay”) used to validate the malware samples
  • The moonzonet[.]com domain, which supported command-and-control (C2) infrastructure
  • Use of pythonw.exe to inject code into suspended processes
  • Use of interactive Microsoft Teams sessions to harvest MFA and credentials

MuddyWater has previous when it comes to impersonating RaaS groups. In late 2025 it was linked to activity involving the Qilin RaaS ecosystem in an attack targeting an Israeli organization, Rapid7 noted.

It may have switched to Chaos to further reduce the risk of attribution, the report claimed.

“The use of a RaaS framework in this context may enable the actor to blur distinctions between state-sponsored activity and financially motivated cybercrime, thereby complicating attribution,” Rapid7 said.

“Furthermore, the inclusion of extortion and negotiation elements could serve to focus defensive efforts on immediate impact, likely delaying the identification of underlying persistence mechanisms established via remote access tools such as DWAgent or AnyDesk.”

The lesson for investigators is to look “beyond overt ransomware indicators” and study the intrusion lifecycle closely, the report concluded.

“Ultimately, this activity is best understood as a hybrid intrusion model, in which ransomware is leveraged not as an end goal but as a mechanism for concealment, coercion, and operational flexibility within a broader intelligence-driven campaign,” it said.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Playbooks For a Zero-Window Era
Next Article Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE
Team-CWD
  • Website

Related Posts

News

OpenAI To Extend Cyber Program to Government Agencies

May 7, 2026
News

Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE

May 7, 2026
News

New Playbooks For a Zero-Window Era

May 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Common Apple Pay scams, and how to stay safe

January 22, 2026

How cybercriminals are targeting content creators

November 26, 2025

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.