Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

MuddyWater Launches Global Spying

October 23, 2025
Reading Time: 3 mins read
in Alerts
Gift Card Heist Via Cloud Hackers

The Iranian nation-state threat group known as MuddyWater has launched a new, targeted campaign across the Middle East and North Africa (MENA) region, utilizing a previously compromised email account to distribute the Phoenix backdoor. This sophisticated operation has infiltrated over 100 organizations, with the vast majority of targets—more than three-fourths—being high-value entities such as embassies, diplomatic missions, foreign affairs ministries, and consulates, followed by international organizations and telecommunications firms. Cybersecurity firm Group-IB, which documented the campaign, assesses the ultimate goal is to facilitate intelligence gathering by infiltrating these critical organizations.

MuddyWater accessed the compromised mailbox through NordVPN, a legitimate service the threat actor is abusing, and then exploited it to send phishing emails that mimicked authentic correspondence. Security researchers noted that by leveraging the trust and authority inherent in such communications, the campaign significantly increased its chances of tricking recipients into opening the malicious attachments. The attack chain begins with the distribution of weaponized Microsoft Word documents that prompt the recipients to enable macros in order to view the content. Enabling this feature executes malicious Visual Basic for Application (VBA) code, which then facilitates the deployment of Version 4 of the Phoenix backdoor.

The Phoenix backdoor, which is a lightweight variant of the Python-based BugSleep implant previously linked to MuddyWater, is deployed via a loader called FakeUpdate. This loader is decoded, written to the disk by the VBA dropper, and contains the Advanced Encryption Standard (AES)-encrypted Phoenix payload. Two variants of the backdoor have been observed, with both Version 3 and Version 4 offering capabilities essential for espionage, including gathering system information, establishing persistence, launching an interactive shell, and uploading or downloading files. MuddyWater, which is assessed to be affiliated with Iran’s Ministry of Intelligence and Security (MOIS), has been active since at least 2017 under various aliases.

Analysis of the attacker’s command-and-control (C2) server also revealed that it was hosting remote monitoring and management (RMM) utilities alongside a custom web browser credential stealer designed to target popular browsers such as Brave, Google Chrome, Microsoft Edge, and Opera. This suggests the likely use of these tools in the overall operation. The deployment of RMM software, which can be easily used for legitimate purposes, aligns with MuddyWater’s established history of distributing remote access software through phishing campaigns over the years to maintain covert access.

In summary, the researchers concluded that by deploying updated malware variants like the Phoenix v4 backdoor and the FakeUpdate injector, as well as integrating custom credential-stealing tools with legitimate commercial RMM utilities like PDQ and Action1, MuddyWater has demonstrated an enhanced ability to blend custom code with commercial tools for improved stealth and persistence. This strategy allows the threat actor to maintain a low profile while successfully executing its intelligence-gathering mission against high-value targets across the MENA region.

Reference:

  • Iran Linked Hackers Target Over 100 Organizations In Worldwide Espionage Operation
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Gift Card Heist Via Cloud Hackers

Gift Card Heist Via Cloud Hackers

October 23, 2025
Gift Card Heist Via Cloud Hackers

Fake Zoom Calls Target Ukraine Aid

October 23, 2025
PolarEdge Expands Router Botnet

PolarEdge Expands Router Botnet

October 22, 2025
PolarEdge Expands Router Botnet

Google Finds New Russian Malware

October 22, 2025
PolarEdge Expands Router Botnet

Copilot Flaw Exposes Sensitive Data

October 22, 2025
WatchGuard Devices At Risk Of RCE

BitLocker May Lock Your Data Silently

October 21, 2025

Latest Alerts

Gift Card Heist Via Cloud Hackers

MuddyWater Launches Global Spying

Fake Zoom Calls Target Ukraine Aid

Copilot Flaw Exposes Sensitive Data

PolarEdge Expands Router Botnet

Google Finds New Russian Malware

Subscribe to our newsletter

    Latest Incidents

    Ransomware Hits Jewett Cameron

    Salt Typhoon Hacks European Telecom

    JFL Loses 800K Weekly After Hack

    Union Cyberattack Raises Concerns

    Romanian Prisoner Hacks Prison IT

    Hackers Claim Data On NSA Officials

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial