Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI’s Atlas is more focused on ChatGPT than the web

Amazon plans to buy thousands of pedal-assist cargo vehicles from Rivian spinoff

Apple admits it has removed controversial dating apps Tea and TeaOnHer from the App Store

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Iran-linked Muddy Water targets over 100 organizations in global espionage campaign
Identity

Iran-linked Muddy Water targets over 100 organizations in global espionage campaign

userBy userOctober 22, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 22, 2025Ravi LakshmananMalware/Cyber ​​Espionage

The Iranian nation-state group known as MuddyWater has been implicated in a new campaign that leveraged compromised email accounts to distribute a backdoor called Phoenix to various organizations in the Middle East and North Africa (MENA) region, including more than 100 government agencies.

Singapore cybersecurity firm Group IB said in a technical report released today that the ultimate goal of the campaign was to penetrate high-value targets and facilitate intelligence gathering.

More than three-quarters of the campaign’s targets include embassies, diplomatic missions, foreign ministries and consulates, followed by international organizations and telecommunications companies.

DFIR retainer service

“Muddywater accessed compromised mailboxes through NordVPN (a legitimate service exploited by threat actors) and used them to send phishing emails disguised as genuine communications,” said security researchers Mahmoud Zoudi and Mansour Alhumud.

“By exploiting the trust and authority associated with such communications, this campaign significantly increased the likelihood of tricking recipients into opening malicious attachments.”

The attack chain essentially involves the attacker distributing a weaponized Microsoft Word document that, when opened, prompts the email recipient to enable macros in order to view the content. When an unsuspecting user enables this feature, the document begins executing malicious Visual Basic for Application (VBA) code, which results in the deployment of version 4 of the Phoenix backdoor.

The backdoor is launched by a loader called FakeUpdate that is decoded and written to disk by a VBA dropper. The loader contains a Phoenix payload encrypted with Advanced Encryption Standard (AES).

MuddyWater, also known as Boggy Serpens, Cobalt Ulster, Earth Vetala, Mango Sandstorm (formerly known as Mercury), Seedworm, Static Kitten, TA450, TEMP.Zagros, and Yellow Nix, is assessed to be affiliated with Iran’s Ministry of Intelligence and Security (MOIS). It is known to have been active since at least 2017.

The threat actor’s use of Phoenix was first documented by Group-IB last month, describing it as a lightweight version of BugSleep, a Python-based implant linked to MuddyWater. Two different variants of Phoenix (version 3 and version 4) have been detected in the wild.

CIS build kit

According to the cybersecurity vendor, the attacker’s command and control (C2) server (“159.198.36”)[.]115″) was also found hosting a remote monitoring and management (RMM) utility and a custom web browser credential stealer targeting Brave, Google Chrome, Microsoft Edge, and Opera, suggesting that these may be used in the operation. It is worth noting that MuddyWater has a long history of distributing remote access software through phishing campaigns.

“By deploying updated malware variants such as the Phoenix v4 backdoor, FakeUpdate injector, and custom credential theft tools alongside legitimate RMM utilities such as PDQ and Action1, MuddyWater demonstrated an enhanced ability to integrate custom code with commercial tools to improve stealth and persistence,” the researchers said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUkraine aid group targeted through fake Zoom meetings and weaponized PDF files
Next Article Apple admits it has removed controversial dating apps Tea and TeaOnHer from the App Store
user
  • Website

Related Posts

Ukraine aid group targeted through fake Zoom meetings and weaponized PDF files

October 22, 2025

Weeks after Microsoft’s July patch, Chinese attackers exploit ToolShell SharePoint flaw

October 22, 2025

Closing the remediation gap: Introducing Penera Resolve

October 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s Atlas is more focused on ChatGPT than the web

Amazon plans to buy thousands of pedal-assist cargo vehicles from Rivian spinoff

Apple admits it has removed controversial dating apps Tea and TeaOnHer from the App Store

Iran-linked Muddy Water targets over 100 organizations in global espionage campaign

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.