The campaign recently attributed to MuddyWater - also known in literature as Mango Sandstorm, Seedworm or Static Kitten - replaces a dangerous trend on the table: state-backed actors who adopt the tactics and tools of cybercrime to camouflage intelligence operations. What was initially presented as a Ransomware-as-a-service (RaaS) attack under the Chaos label, according to media-shared reports, has the prints of a directed intrusion that prioritized the sustained exfiltration and persistence above the classic mass cryptation.
The input vector described in the research shows an intensive use of social engineering through Microsoft Teams, where attackers made interactive sessions of shared screen to capture credentials and manipulate multifactor authentication mechanisms. This way of operating explores confidence in collaborative tools and the willingness to accept requests for technical assistance in remote environments, a weakness that defenders still underestimate despite the safety recommendations published by several suppliers.

One of the key signs that distinguishes this incident is the absence of massive file encryption during the active phase; instead, the opponent deployed RATs and remote management tools such as AnyDesk or DWAgent to maintain persistent access and extract data. This pattern suggests that the so-called "ransomware" may have been used as Strategic denial screen, designed to divert the immediate response to the negotiation and isolate the forensic investigation, while strengthening the presence on the network.
Response teams must understand that convergence between state operations and criminal market complicates the attribution and prioritization of mitigation. The use of code signature certificates reused by the same malicious cluster, the adoption of legitimate projects (such as WebView2 samples) and the download of payloads from external hosts are tactics designed to dilute indicators and make it difficult to correlation between incidents. These observations are consistent with previous analyses of research houses such as Rapid7 and Check Point; to deepen technical mechanisms, public documentation of industrial platforms and reports can be consulted, for example at Rapid7 and Check Point Research.
In practical terms, organizations should realign their controls over tools for collaboration and remote assistance: not any request for assistance by Teams is legitimate. This involves hardening external chat policies, controlling who can start screen sessions with privileged users, and requiring off-channel validations (e.g. verified calls) before allowing any credentials transfer or support software installation. Microsoft's WebView2 and application ecosystem guides can be used to identify legitimate uses against bottlenecks: https: / / learn.microsoft.com.
From technical defense, it is essential to implement controls that detect behaviors beyond simple hashes: monitor persistent connections to C2 with periodic polling patterns, alert by the emergence of processes that emulate WebView2 or ms _ upp.exe, and correlate AnyDesk / DWAgent activity with increased privileges and lateral movements. Network segmentation and the limitation of RDP / direct internet downloads reduce the range of attacks that can scale to serious commitments.
In the area of authentication, it should be noted that the manipulation of MFA via social engineering requires technical countermeasures: to implement physical-resistant methods such as FIDO2 or client certificates, to apply geographical / risk blocking policies in conditional access and to review Azure AD logs or equivalent solutions for anomalies detectors in interactive early session. These measures raise the operational cost for an attacker who trusts to deceive a human operator.

In addition to technological containment, I recommend that organizations integrate Teams viewing simulation exercises and clear protocols to report and verify support requests; exercises should include non-technical personnel who, because of their role, are often targeted. It is equally important that the response to incidents is not caught up in negotiations of a extortive nature if there are signs of exfiltration with strategic objectives: to preserve persistent artifacts and to duplicate evidence before disruptions that can erase traces.
The current campaign also highlights a broader lesson for the community: the borders between state actors and organized crime are blurred when the first buys operational coverage in illicit markets. To understand and counter this phenomenon, there is a need for greater collaboration between intelligence providers, cybersecurity companies and public bodies, as well as a security policy that equates a free response to extortion with the in-depth investigation of persistent chains. Stay informed through specialized sources and share IoCs and TTPCs reduces the collective exposure window.
Finally, if your organization detects similar activity - external contacts by Teams requesting assistance, unusual facilities such as ms _ upp.exe, or persistent outgoing connections to external hosts - immediately activate your incident playbook: isolate compromised systems, preserve records and binary for analysis, notify your EDR / security providers and, if appropriate, coordinate with the competent authorities. The combination of operational rigour, technical controls and human training is the strongest defense against campaigns using camouflage and coercion techniques.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...