<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Iranian-backed MuddyWater is using Microsoft Teams to steal credentials, combining the attack with false flag ransomware to hide its espionage activities.#MuddyWater #MicrosoftTeams #CyberAttack #DataBreach]]></title><description><![CDATA[<p>Iranian-backed MuddyWater is using Microsoft Teams to steal credentials, combining the attack with false flag ransomware to hide its espionage activities.<br /><a href="https://infosec.exchange/tags/MuddyWater" rel="tag">#<span>MuddyWater</span></a> <a href="https://infosec.exchange/tags/MicrosoftTeams" rel="tag">#<span>MicrosoftTeams</span></a> <a href="https://infosec.exchange/tags/CyberAttack" rel="tag">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/DataBreach" rel="tag">#<span>DataBreach</span></a></p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://verisizintisi.com/en/blog/2026-05-06-muddywater-microsoft-teams-credential-theft-false-flag" title="MuddyWater Exploits Microsoft Teams to Steal Credentials – Veri Sızıntısı">
<img src="https://verisizintisi.com/img/blog/2026-05-06-muddywater-uses-microsoft-teams-to-steal-credentials-in-fals.jpeg" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://verisizintisi.com/en/blog/2026-05-06-muddywater-microsoft-teams-credential-theft-false-flag">
MuddyWater Exploits Microsoft Teams to Steal Credentials – Veri Sızıntısı
</a>
</h5>
<p class="card-text line-clamp-3">The Iranian-backed APT group MuddyWater is conducting credential theft via Microsoft Teams under the cover of a false flag ransomware attack. Learn the details.</p>
</div>
<a href="https://verisizintisi.com/en/blog/2026-05-06-muddywater-microsoft-teams-credential-theft-false-flag" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://verisizintisi.com/images/favicon.svg" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />





<p class="d-inline-block text-truncate mb-0">Veri Sızıntısı <span class="text-secondary">(verisizintisi.com)</span></p>
</a>
</div><p></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/529/649/069/771/542/original/48eefd237573950a.jpeg" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/4334a6ba-6436-4e31-a63c-2e6c9fc3cfb2/iranian-backed-muddywater-is-using-microsoft-teams-to-steal-credentials-combining-the-attack-with-false-flag-ransomware-to-hide-its-espionage-activities.-muddywater-microsoftteams-cyberattack-databreach</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:18:46 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/4334a6ba-6436-4e31-a63c-2e6c9fc3cfb2.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 06 May 2026 21:02:15 GMT</pubDate><ttl>60</ttl></channel></rss>