← All Threat Actors
Nation-State high Iran

MuddyWater

Iranian state-sponsored (MOIS) · Espionage / intelligence collection / false flag operations

Reports 2
Active Since 2017
Last Reported 23 May 2026
Sectors Targeted finance, healthcare, communications, critical-infrastructure

Tactics, Techniques & Procedures (TTPs)

  • Social engineering via Microsoft Teams — screen-sharing sessions to harvest credentials
  • False flag operations using criminal ransomware branding (Chaos ransomware) to obscure espionage
  • MFA manipulation — instructing victims to register attacker-controlled devices as MFA factors
  • Credential file social engineering (victims directed to type passwords into credentials.txt)
  • MOIS-linked C2 infrastructure (moonzonet domain cluster)
  • Living-off-the-land techniques to minimise custom malware footprint

Known Targets

Construction and manufacturing companiesBusiness services organisationsUS and European enterprises (UK, Germany, Sweden, Austria, Poland, Italy)Israeli government and organisationsMiddle Eastern government entities

Analyst Notes

Operates under Iran's Ministry of Intelligence and Security (MOIS). Persistent user of social engineering and living-off-the-land techniques. The 2026 Chaos ransomware false flag campaign represents a tactical evolution — using criminal ransomware branding to obscure state-directed espionage objectives and complicate attribution. Organisations investigating what appears to be ransomware activity may incorrectly apply criminal incident response playbooks rather than state-actor ones, allowing MuddyWater footholds to persist after apparent remediation.

Also Known As

SeedwormMango SandstormStatic KittenMERCURYITG17