Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Iranian APT Intrusion Masquerades as Chaos Ransomware Attack
    Cybersecurity

    Iranian APT Intrusion Masquerades as Chaos Ransomware Attack

    adminBy adminMay 7, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Iranian hacker
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The Iran-linked APT actor MuddyWater has been observed performing an intrusion masquerading as a ransomware attack, Rapid7 reports.

    As part of the intrusion observed in early 2026, the attackers relied on social engineering for initial access and performed operations typically associated with espionage campaigns, including reconnaissance, credential harvesting, and data theft, but did not deploy file-encrypting ransomware.

    The threat actors engaged with the victim organization’s employees via Microsoft Teams, establishing screen-sharing sessions for access to users’ assets. This allowed them to steal credentials, manipulate MFA protections, and compromise accounts.

    “While connected, the TA executed basic discovery commands, accessed files related to the victim’s VPN configuration, and instructed users to enter their credentials into locally created text files. In at least one instance, the TA also deployed a remote management tool (AnyDesk) to further facilitate access,” Rapid7 says.

    Next, the attackers established persistent access through RDP sessions and the DWAgent remote access tool. Using the access, the hackers deployed additional payloads, moved laterally through the environment, and harvested and exfiltrated information.

    Finally, the threat actors sent emails to multiple users for extortion, claiming to have stolen information and threatening to leak it unless a ransom was paid.

    Advertisement. Scroll to continue reading.

    The victim was directed to the Chaos ransomware’s leak site, which listed the targeted organization as a new victim. A subsequent email instructed the recipients to locate a ‘note’ containing credentials to a secure chat to continue negotiations, but the note was never found and the stolen data was leaked online.

    Throughout the intrusion, the attackers never deployed file-encrypting ransomware on the compromised machines, suggesting that Chaos artifacts were planted as false flags to hide the state-sponsored activity.

    “The inclusion of extortion and negotiation elements could serve to focus defensive efforts on immediate impact, likely delaying the identification of underlying persistence mechanisms established via remote access tools such as DWAgent or AnyDesk,” Rapid7 notes.

    Additionally, the infrastructure used in the attack was previously linked to MuddyWater, an APT also known as Mango Sandstorm, Mercury, Seedworm, and Static Kitten, and officially linked by the US to the Iranian Ministry of Intelligence and Security (MOIS).

    As part of the attack, the threat actor deployed a custom RAT dubbed Darkcomp (Game.exe), which supports command execution, file manipulation, and persistent shell execution.

    The backdoor is signed with a certificate linked to MuddyWater’s previous operations and uses a command-and-control (C&C) domain also associated with the Iranian threat actor. The social engineering tactic and the malware execution flow are also consistent with previously observed MuddyWater activity.

    “The convergence of technical and contextual evidence is consistent with attribution to MuddyWater with moderate confidence. The observed use of Chaos ransomware does not indicate a shift in the group’s underlying objectives, but rather reflects a consistent effort to obscure operational intent and complicate attribution,” Rapid7 notes.

    Related: Iranian Cyber Group Handala Targets US Troops in Bahrain

    Related: Pre-Stuxnet Sabotage Malware ‘Fast16’ Linked to US-Iran Cyber Tensions

    Related: Iranian APT Hacked US Airport, Bank, Software Company

    Related: Iran Readied Cyberattack Capabilities for Response Prior to Epic Fury

    APT Attack chaos Intrusion Iranian Masquerades ransomware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle Search Algorithm Changes: 2026 Update
    Next Article The real strategy behind negative keywords in 2026
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026

    Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’

    May 21, 2026

    12 Awesome Custom Google Analytics Reports Created by the Experts

    May 20, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,214)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (306)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Mueller Explains Why Google Uses Markdown On Dev Docs

    May 21, 2026

    Google Marketing Live 2026: Everything you need to know

    May 21, 2026

    Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’

    May 21, 2026
    Most Popular
    • Mueller Explains Why Google Uses Markdown On Dev Docs
    • Google Marketing Live 2026: Everything you need to know
    • Google unveils Gemini 3.5 Flash and a redesigned ‘intelligent Search box’
    • 12 Awesome Custom Google Analytics Reports Created by the Experts
    • Selector targets the network visibility gap in multi-cloud infrastructure
    • How to Persuade Your Boss to Send You to Ahrefs Evolve in San Diego
    • Key AEO & Content Trends for 2026
    • Google adds llms.txt check to Chrome Lighthouse
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.