Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

EU invests €225 million to deliver next-generation influenza vaccines

MuddyWater uses GhostFetch, CHAR, HTTP_VIP to target MENA organizations

OpenClaw Security Crisis: Detecting AI Agent Risks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » MuddyWater uses GhostFetch, CHAR, HTTP_VIP to target MENA organizations
Identity

MuddyWater uses GhostFetch, CHAR, HTTP_VIP to target MENA organizations

userBy userFebruary 23, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 23, 2026Threat Intelligence/Artificial Intelligence

The Iranian hacker group known as MuddyWater (also known as Earth Vetala, Mango Sandstorm, and MUDDYCOAST) targeted multiple organizations and individuals primarily based in the Middle East and North Africa (MENA) region as part of a new campaign codenamed Operation Olalampo.

According to a report published by Group-IB, this activity was first observed on January 26, 2026 and resulted in the deployment of a new malware family that shares overlapping samples previously identified as being used by threat actors. These include downloaders such as GhostFetch and HTTP_VIP, as well as a Rust backdoor called CHAR, and an advanced implant dropped by GhostFetch codenamed GhostBackDoor.

“These attacks follow a similar pattern and are consistent with the kill chain previously observed in the MuddyWater attack. They begin with a phishing email attached with a Microsoft Office document containing malicious macro code that decodes the embedded payload and drops it onto the system for execution, providing the attacker with remote control of the system,” the company said.

One such attack chain uses a malicious Microsoft Excel document that prompts the user to enable macros to activate the infection and ultimately drop the CHAR. Another variant of the same attack has been found to lead to the deployment of the GhostFetch downloader, which downloads GhostBackDoor.

The third version of the attack leverages themes such as airline tickets and reports to distribute an HTTP_VIP downloader that deploys AnyDesk remote desktop software, as opposed to using a lure that mimics a Middle Eastern energy and marine services company.

A brief description of the four tools follows:

GhostFetch is a first-stage downloader that profiles the system, verifies mouse movements, checks screen resolution, checks for the presence of debuggers, virtual machine artifacts, and antivirus software, and fetches and executes secondary payloads directly in memory. GhostBackDoor is a second stage backdoor provided by GhostFetch that supports an interactive shell, file read/write, and GhostFetch rerun. HTTP_VIP, the native downloader that performs system reconnaissance, connects to an external server (“codefusiontech”).[.]org”) to authenticate and deploy AnyDesk from a C2 server. The new variant of this malware also adds the ability to obtain victim information and obtain instructions to start an interactive shell, download/upload files, capture clipboard contents, and update sleep/beacon interval. In the backdoor, change directories and run cmd.exe or PowerShell commands.

The PowerShell commands are designed to run a SOCKS5 reverse proxy or another backdoor named Kalim, upload data stolen from web browsers, and run unknown executables called “sh.exe” and “gshdoc_release_X64_GUI.exe.”

Group-IB’s analysis of CHAR’s source code revealed signs of artificial intelligence (AI)-assisted development due to the inclusion of emojis in the debug string. This is consistent with Google’s revelations last year that threat actors were experimenting with generative AI tools to support the development of custom malware that supports file transfer and remote execution.

Another thing to note is that CHAR is similar in structure and development environment to the Rust-based malware BlackBeard (also known as Archer RAT and RUSTRIC). BlackBeard was reported by CloudSEK and Seqrite Labs to be used by threat actors to target various organizations in the Middle East.

MuddyWater has also been observed exploiting recently revealed vulnerabilities on public servers as a way to gain initial access to target networks.

“The MuddyWater APT group remains an active threat within the META region, and this operation primarily targets organizations in the MENA region,” Group-IB concluded. “The group’s continued adoption of AI technology, development of custom malware and tools, and diversified command and control (C2) infrastructure underscores their dedication and intent to scale their operations.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenClaw Security Crisis: Detecting AI Agent Risks
Next Article EU invests €225 million to deliver next-generation influenza vaccines
user
  • Website

Related Posts

OpenClaw Security Crisis: Detecting AI Agent Risks

February 23, 2026

AI-assisted attackers compromise over 600 FortiGate devices in 55 countries

February 21, 2026

Anthropic launches Claude Code Security, an AI-powered vulnerability scan

February 21, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

EU invests €225 million to deliver next-generation influenza vaccines

MuddyWater uses GhostFetch, CHAR, HTTP_VIP to target MENA organizations

OpenClaw Security Crisis: Detecting AI Agent Risks

Can the creator economy survive the flood of AI?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.