<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>cybercrime.club</title><link>https://cybercrime.club/tags/microsoft-teams/</link><description>Infrastructure security news for people who build infrastructure.</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sun, 10 May 2026 23:08:58 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/microsoft-teams/" rel="self" type="application/rss+xml"/><item><title>MuddyWater Wears Chaos Ransomware as a Disguise — Teams Screen-Sharing Funnels Iranian Espionage Through Fake Extortion</title><link>https://cybercrime.club/posts/muddywater-chaos-false-flag-teams-darkcomp-espionage/</link><pubDate>Sun, 10 May 2026 23:08:58 -0400</pubDate><guid>https://cybercrime.club/posts/muddywater-chaos-false-flag-teams-darkcomp-espionage/</guid><description>Rapid7 attributes a Chaos-branded ransomware intrusion to Iran's MuddyWater. No files were ever encrypted — the ransom note was cover for Stagecomp/Darkcomp espionage delivered via Microsoft Teams screen-share.</description><category>threat-intel</category></item></channel></rss>