<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Advanced-Persistent-Threat on Blog - Comfidentia</title><link>https://blog.comfidentia.cl/en/tags/advanced-persistent-threat/</link><description>Recent content in Advanced-Persistent-Threat on Blog - Comfidentia</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 06 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.comfidentia.cl/en/tags/advanced-persistent-threat/index.xml" rel="self" type="application/rss+xml"/><item><title>MuddyWater uses 'false flag' ransomware in Iranian state-sponsored attacks</title><link>https://blog.comfidentia.cl/en/2026/05/06/muddywater-utiliza-falsa-bandera-de-ransomware-en-ataques-patrocinados-por-el-estado-irani/</link><pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate><guid>https://blog.comfidentia.cl/en/2026/05/06/muddywater-utiliza-falsa-bandera-de-ransomware-en-ataques-patrocinados-por-el-estado-irani/</guid><description>&lt;p&gt;&lt;img alt="Hacking group using Microsoft Teams to attacks" loading="lazy" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVjDsxh9wAjgeuY-DR1pNCwLSXG-x4vStK9pXlZHOGorecolrG32u587NfG2hbhOnTNCS-RbgshrxzTEFECXOjjzYCeDxZFqFDHvzrekLKuvnBtIT7WW82tpEwd-Sr18pt-7Xb-5A2sTtbS1SaPTA_UK7UcSeDCBNiGmYa2vkqzekkU7WrNZCZzlrZKmUK/s1600/overview.jpg"&gt;&lt;/p&gt;
&lt;p&gt;The Iranian state-sponsored hacking group known as MuddyWater (also as Mango Sandstorm, Seedworm, and Static Kitten) has been implicated in a &amp;ldquo;false flag&amp;rdquo; ransomware attack, according to a report from Rapid7. This incident, observed in early 2026, shows increasing sophistication and an attempt to blur attribution by adopting cybercrime tactics.&lt;/p&gt;
&lt;h2 id="false-flag-attack-and-sophisticated-tactics"&gt;False Flag Attack and Sophisticated Tactics&lt;/h2&gt;
&lt;p&gt;The initial attack appeared consistent with a ransomware-as-a-service (RaaS) group operating under the Chaos brand. However, evidence suggests this is a state-backed targeted attack disguised as opportunistic extortion.&lt;/p&gt;</description></item></channel></rss>