Iranian hackers launch ransomware campaign looking to steal details via Microsoft Teams



  • Iranian APT MuddyWater posed as IT staff via Microsoft Teams, tricking victims into granting remote access
  • They deployed infostealers, altered MFA, exfiltrated data, and staged a Chaos ransomware infection as cover
  • Researchers concluded the true motive was espionage, not profit, highlighting state‑sponsored tradecraft overlap with criminal tactics

Iranian state-sponsored hackers ran a cyber-espionage campaign, and then tried to throw investigators off track with a ransomware infection, experts have warned.

An investigation into a recent attack from security researchers Rapid7 found how an unnamed victim was recently approached via Microsoft Teams, by someone from outside their organization. They posed as IT technicians, discussed solving a technical problem with the victim, and managed to get them to install and run an AnyDesk session.

https://cdn.mos.cms.futurecdn.net/vYudEZBys4GmaiVtkss4s4-2560-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

Leave a reply

Please enter your comment!
Please enter your name here

spot_imgspot_img