Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How Samsung Knox prevents network security breaches

Puragen unveils PFAS treatment technology during UK ministerial visit

Rendezvous and close-in operations in crowded Earth orbit

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Muddy Water deploys UDPGangster backdoor in campaigns targeting Turkey, Israel, and Azerbaijan
Identity

Muddy Water deploys UDPGangster backdoor in campaigns targeting Turkey, Israel, and Azerbaijan

userBy userDecember 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 8, 2025Ravi LakshmananNetwork security/vulnerabilities

An Iranian hacker group known as MuddyWater was observed leveraging a new backdoor called UDPGangster that uses User Datagram Protocol (UDP) for command and control (C2) purposes.

According to a Fortinet FortiGuard Labs report, the cyber espionage campaign targeted users in Türkiye, Israel, and Azerbaijan.

“This malware allows remote control of compromised systems by allowing attackers to execute commands, extract files, and deploy additional payloads. All of these communications occur over UDP channels designed to evade traditional network defenses,” said security researcher Cara Lin.

This attack chain involves a spear-phishing tactic that distributes a booby-trapped Microsoft Word document that triggers the execution of a malicious payload when a macro is enabled. Some of the phishing messages impersonate the Ministry of Foreign Affairs of the Turkish Republic of Northern Cyprus and aim to invite recipients to a webinar titled “Presidential Election and Its Results.”

cyber security

The email includes a ZIP file (“seminer.zip”) and a Word document (“seminer.doc”) attached. The ZIP file also contains the same Word file, which, when opened, prompts the user to enable macros that secretly run embedded VBA code.

The VBA script in the dropper file has the ability to hide any signs of malicious activity by displaying decoy images in Hebrew from the Israeli telecommunications provider Bezeq regarding the expected disconnection period for the first week of November 2025 in various cities in the country.

“This macro runs automatically using the Document_Open() event to decode Base64-encoded data from a hidden form field (UserForm1.bodf90.Text) and writes the decoded content to C:\Users\Public\ui.txt,” Lin explained. “Then run this file using the Windows API CreateProcessA to launch the UDPGangster payload.”

UDPGangster establishes persistence through Windows registry modifications and boasts various anti-analysis checks to resist demolition efforts by security researchers. This includes –

Determine whether a process is being debugged Analyze the CPU configuration of a sandbox or virtual machine Determine if the system has less than 2048 MB of RAM Obtain network adapter information and verify whether the MAC address prefix matches a list of known virtual machine vendors Verify whether the computer is part of the default Windows workgroup rather than a joined domain VBoxService.exe, VBoxTray.exe, vmware.exe, and vmtoolsd.exe Run a registry scan for matches with known virtualization vendor IDs such as VBox, VMBox, QEMU, VIRTUAL, VIRTUALBOX, VMWARE, and Xen. Search for known sandboxing or debugging tools to see if the file is running in an analysis environment.

cyber security

Only after these checks are met will UDPGangster begin collecting system information and connect to the external server (‘157.20.182’).[.]75″) over UDP port 1269 to extract the collected data, execute commands using “cmd.exe”, send files, update the C2 server, and drop and execute additional payloads.

“UDPGangster uses a macro-based dropper for initial access and incorporates extensive anti-analysis routines to evade detection,” Lin said. “Users and organizations should be wary of unsolicited documents, especially those that request macro activation.”

This development comes days after ESET reported that attackers distributed another backdoor called MuddyViper in attacks across Israel’s academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNetflix co-CEO reportedly discussed Warner Bros. deal with Trump
Next Article How microbiome science is shaping the next frontier against PFAS
user
  • Website

Related Posts

How Samsung Knox prevents network security breaches

February 6, 2026

Compromised dYdX npm and PyPI packages deliver wallet stealer and RAT malware

February 6, 2026

Claude Opus 4.6 discovers over 500 high-severity flaws across major open source libraries

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How Samsung Knox prevents network security breaches

Puragen unveils PFAS treatment technology during UK ministerial visit

Rendezvous and close-in operations in crowded Earth orbit

Compromised dYdX npm and PyPI packages deliver wallet stealer and RAT malware

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.