Allen
Jones

MuddyWater APT Teams attack: When a trusted work chat becomes an intrusion path

Allen Jones

May 7, 2026

6 min read

MuddyWater APT Teams attack - cover

TL; DR

In early 2026, an intrusion linked with moderate confidence to MuddyWater showed how a trusted workplace tool can become part of the attack path. In this MuddyWater APT Teams attack, employees were contacted through Microsoft Teams, pulled into live screen-sharing sessions, and guided into actions that exposed credentials, enabled MFA manipulation, and gave attackers access to VPN-related files. The activity also used Chaos ransomware branding and extortion emails, but file encryption was not observed. That made it look less like typical ransomware and more like an access, data theft, and persistence operation. The key lesson is that email security alone is not enough. Organizations need to control unapproved remote access tools, monitor suspicious endpoint behavior, and make access decisions based on both identity and device trust.

Think about the last time someone from IT messaged you on Teams. You probably did not treat it like a phishing email. You may have glanced at the name, trusted the platform, and responded.

That trust is what attackers are learning to abuse.

In early 2026, an intrusion linked moderately to MuddyWater showed how a familiar collaboration tool can become an entry point. Particularly in the MuddyWater APT Teams attack, employees were contacted through Microsoft Teams, pulled into live screen-sharing sessions, and guided into actions that exposed credentials, enabled MFA manipulation, and gave attackers access to VPN-related files.

In this blog, we’ll unpack how the attack worked, why trusted collaboration tools are becoming a security risk, and how organizations can reduce exposure across devices, identity, and access.

Protect endpoint access and device compliance with Hexnode

Who is MuddyWater?

MuddyWater is an Iran-linked advanced persistent threat group known for cyber-espionage. It is also tracked as Seedworm, Mango Sandstorm, MERCURY, and Static Kitten. Active since at least 2017, the group has targeted government and private-sector organizations across the Middle East, Asia, Africa, Europe, and North America, including telecom, finance, local government, defense, and oil and natural gas organizations.

Inside the Teams-led Intrusion

The intrusion did not rely only on a typical phishing email. Instead, the attacker contacted employees through Microsoft Teams and used live conversation to make the request feel legitimate.

Once the victim engaged, the attacker moved the interaction into screen-sharing. During the session, victims were guided into entering credentials, modifying MFA settings, and exposing VPN-related files. The attacker then used compromised accounts and remote access methods to continue activity inside the environment.

How Persistence Came into Play

The intrusion did not stop at the Teams conversation. After credentials and access details were exposed, the attacker used compromised accounts, RDP, and remote access tooling to continue operating inside the environment. AnyDesk was deployed in at least one instance, showing how legitimate remote management tools can be abused after a successful social engineering attempt.

The sequence below shows how the activity moved from a trusted chat interaction to credential exposure, access expansion, and ransomware-style deception.

Stage What happened
Teams contact Employees were contacted through Microsoft Teams external chat.
Live interaction The attacker used conversation and screen-sharing to guide the victim.
Credential exposure Victims were instructed to enter credentials into local text files.
MFA manipulation MFA settings were modified to include attacker-controlled devices.
VPN-related access Files related to VPN configuration were accessed.
Remote access RDP and remote access tooling, including AnyDesk in at least one instance, were used to support access and control.
Extortion cover Extortion emails and Chaos ransomware branding were used.
Key difference File encryption was not observed, which made the activity different from typical ransomware.

Why This Attack Changes the Security Conversation

The MuddyWater APT Teams attack shows why security teams cannot treat collaboration, identity, endpoint, and remote access as separate problems.

The attacker did not rely on one weakness. They used a trusted chat platform to reach the user, screen-sharing to guide the interaction, MFA changes to support attacker-controlled access, VPN-related files that could support later access attempts, and remote access tools to maintain control.

That means blocking malware alone is not enough. Organizations need to control which apps can run, detect suspicious behavior on endpoints, and make sure access depends on both the user and the device. When a trusted tool becomes part of the attack path, security has to follow the full chain, from the first message to the final access attempt.

Building Defense across Device, Endpoint, and Identity with Hexnode

Hexnode helps reduce this risk by focusing on three areas: device control, endpoint detection, and identity with device trust.

1. Hexnode UEM: Control Apps and Devices

Hexnode UEM helps IT teams manage what is allowed on corporate devices. This matters because, in attacks like this, legitimate remote access tools can be abused after the first social engineering step.

With Hexnode UEM, organizations can:

  • Block or allowlist applications on managed devices
  • Restrict unapproved remote access tools
  • Apply stricter app policies to high-risk users and departments
  • Limit approved support tools to authorized IT admin devices
  • Use kiosk or managed modes for devices that need tighter control

This can reduce the chance that a socially engineered user installs or runs tools that give attackers long-term access.

2. Hexnode XDR: Detect Suspicious Endpoint Behavior

The attack may begin in Teams, but the real damage happens when that interaction turns into endpoint activity. That could include scripts, installers, remote access sessions, unusual processes, or attempts to maintain persistence.

Hexnode XDR helps security teams detect, investigate, and respond to suspicious endpoint behavior. IT teams can look for signs such as:

  • Unexpected remote access activity
  • Suspicious scripts or processes
  • Unknown installers launched after a support-style interaction
  • Abnormal endpoint behavior from a standard user device
  • Indicators that a device may need containment

When a device shows signs of compromise, response actions such as isolating the endpoint, killing malicious processes, or quarantining files can help limit the impact.

Why XDR Is Stronger With UEM
Featured Resource

Why XDR Is Stronger With UEM

Learn more on how Hexnode XDR's performance can be enhanced and elevated with deep integration with Hexnode UEM.

Get the Whitepaper

3. Hexnode IdP: Connect Access to Device Trust

In this campaign, credentials and MFA settings were part of the attack path. That is why access should not depend on identity alone.

Hexnode IdP helps bring user identity and device posture together. This allows organizations to make access decisions based on both who the user is and whether the device is trusted and compliant.

For a Teams-based social engineering scenario, this matters because stolen credentials should not be enough to access internal resources. When access is tied to managed and compliant devices, organizations can make it harder for attackers to use stolen credentials from an unmanaged machine.

Together, Hexnode UEM, XDR, and IdP help reduce risk at different stages of the attack: before unauthorized tools run, while suspicious behavior is happening, and when access is requested.

Make Trusted Tools Harder to Abuse

The MuddyWater APT Teams attack shows how quickly a normal work conversation can become a security incident. A Teams message, a screen-sharing session, an MFA change, and access to VPN-related files can give attackers more than an initial foothold. It can support continued access attempts.

That is why prevention has to start before the user is targeted and continue after the first suspicious action. Organizations should limit unapproved remote access tools, monitor endpoint behavior, and make access depend on both identity and device trust.

Hexnode supports this approach through UEM, XDR, and IdP. UEM helps control apps and devices. XDR helps detect and respond to suspicious endpoint activity. IdP helps tie access decisions to identity and device posture.

The goal is simple: let employees collaborate, but make it much harder for attackers to turn that trust into access.

Share

Allen Jones

Curious, constantly learning, and turning complex tech concepts into meaningful narratives through thoughtful storytelling. Here I write about endpoint security that are grounded in real IT use cases.