InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Iran-linked Muddy Water targets over 100 organizations in global espionage campaign
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Iran-linked Muddy Water targets over 100 organizations in global espionage campaign
Technology

Iran-linked Muddy Water targets over 100 organizations in global espionage campaign

October 22, 2025 3 Min Read
Share

Iranian nation-state group known as muddy water The cause of the infection is believed to be a new campaign that leverages compromised email accounts to distribute a backdoor called Phoenix to various organizations in the Middle East and North Africa (MENA) region, including more than 100 government agencies.

Singapore cybersecurity firm Group IB said in a technical report released today that the ultimate goal of the campaign was to penetrate high-value targets and facilitate intelligence gathering.

More than three-quarters of the campaign’s targets include embassies, diplomatic missions, foreign ministries and consulates, followed by international organizations and telecommunications companies.

“Muddywater accessed compromised mailboxes through NordVPN (a legitimate service exploited by threat actors) and used them to send phishing emails disguised as genuine communications,” said security researchers Mahmoud Zoudi and Mansour Alhumud.

“By exploiting the trust and authority associated with such communications, this campaign significantly increased the likelihood of tricking recipients into opening malicious attachments.”

The attack chain essentially involves the attacker distributing a weaponized Microsoft Word document that, when opened, prompts the email recipient to enable macros in order to view the content. When an unsuspecting user enables this feature, the document begins executing malicious Visual Basic for Application (VBA) code, which results in the deployment of version 4 of the Phoenix backdoor.

The backdoor is launched by a loader called FakeUpdate that is decoded and written to disk by a VBA dropper. The loader contains a Phoenix payload encrypted with Advanced Encryption Standard (AES).

MuddyWater, also known as Boggy Serpens, Cobalt Ulster, Earth Vetala, Mango Sandstorm (formerly known as Mercury), Seedworm, Static Kitten, TA450, TEMP.Zagros, and Yellow Nix, is assessed to be affiliated with Iran’s Ministry of Intelligence and Security (MOIS). It is known to have been active since at least 2017.

See also  Malicious VSX extension 'SleepyDuck' uses Ethereum to keep command server alive

The threat actor’s use of Phoenix was first documented by Group-IB last month, describing it as a lightweight version of BugSleep, a Python-based implant linked to MuddyWater. Two different variants of Phoenix (version 3 and version 4) have been detected in the wild.

The cybersecurity vendor said it also found that the attacker’s command and control (C2) server (‘159.198.36(.)115’) hosted a remote monitoring and management (RMM) utility and a custom web browser credential stealer targeting Brave, Google Chrome, Microsoft Edge, and Opera, suggesting these may have been used in the operation. It’s worth noting that MuddyWater has a long history of distributing remote access software through phishing campaigns.

“By deploying updated malware variants such as the Phoenix v4 backdoor, FakeUpdate injector, and custom credential theft tools alongside legitimate RMM utilities such as PDQ and Action1, MuddyWater demonstrated an enhanced ability to integrate custom code with commercial tools to improve stealth and persistence,” the researchers said.

Share This Article
Twitter Copy Link
Previous Article Thunderfolk is one of the few games I've played that feels like actual DnD, and its new free update just added one shot Thunderfolk is one of the few games I’ve played that feels like actual DnD, and its new free update just added one shot
Next Article Sanctuary Policy and Activists Don't Risk Lives During ICE Raid - ICE Sanctuary Policy and Activists Don’t Risk Lives During ICE Raid – ICE

You Might Also Like

DPRK hackers use Clickfix to deliver Beavertail malware with Crypto Job Scams
Technology

DPRK hackers use Clickfix to deliver Beavertail malware with Crypto Job Scams

12 Min Read
New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT
Technology

New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

4 Min Read
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse
Technology

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

4 Min Read
React2Shell exploit delivers crypto miners and new malware across multiple sectors
Technology

React2Shell exploit delivers crypto miners and new malware across multiple sectors

6 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?