Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

Posted on October 22, 2025October 22, 2025 By CWS

Oct 22, 2025Ravie LakshmananMalware / Cyber Espionage
The Iranian nation-state group referred to as MuddyWater has been attributed to a brand new marketing campaign that has leveraged a compromised electronic mail account to distribute a backdoor known as Phoenix to numerous organizations throughout the Center East and North Africa (MENA) area, together with over 100 authorities entities.
The tip purpose of the marketing campaign is to infiltrate high-value targets and facilitate intelligence gathering, Singaporean cybersecurity firm Group-IB mentioned in a technical report printed immediately.
Greater than three-fourths of the marketing campaign’s targets embody embassies, diplomatic missions, overseas affairs ministries, and consulates, adopted by worldwide organizations and telecommunications corporations.

“MuddyWater accessed the compromised mailbox by means of NordVPN (a official service abused by the menace actor), and used it to ship phishing emails that gave the impression to be genuine correspondence,” mentioned safety researchers Mahmoud Zohdy and Mansour Alhmoud.
“By exploiting the belief and authority related to such communications, the marketing campaign considerably elevated its possibilities of deceiving recipients into opening the malicious attachments.”
The assault chain primarily includes the menace actor distributing weaponized Microsoft Phrase paperwork that, when opened, immediate the e-mail recipients to allow macros with a view to view the content material. As soon as the unsuspecting consumer permits the function, the doc proceeds to execute malicious Visible Primary for Software (VBA) code, ensuing within the deployment of model 4 of the Phoenix backdoor.
The backdoor is launched via a loader known as FakeUpdate that is decoded and written to disk by the VBA dropper. The loader incorporates the Superior Encryption Customary (AES)-encrypted Phoenix payload.

MuddyWater, additionally known as Boggy Serpens, Cobalt Ulster, Earth Vetala, Mango Sandstorm (previously Mercury), Seedworm, Static Kitten, TA450, TEMP.Zagros, and Yellow Nix, is assessed to be affiliated with Iran’s Ministry of Intelligence and Safety (MOIS). It is recognized to be energetic since at the least 2017.
The menace actor’s use of Phoenix was first documented by Group-IB final month, describing it as a light-weight model of BugSleep, a Python-based implant linked to MuddyWater. Two totally different variants of Phoenix (Model 3 and Model 4) have been detected within the wild.

The cybersecurity vendor mentioned the attacker’s command-and-control (C2) server (“159.198.36[.]115”) has additionally been discovered internet hosting distant monitoring and administration (RMM) utilities and a customized net browser credential stealer that targets Courageous, Google Chrome, Microsoft Edge, and Opera, suggesting their doubtless use within the operation. It is price noting that MuddyWater has a historical past of distributing distant entry software program by way of phishing campaigns through the years.
“By deploying up to date malware variants such because the Phoenix v4 backdoor, the FakeUpdate injector, and customized credential-stealing instruments alongside official RMM utilities like PDQ and Action1, MuddyWater demonstrated an enhanced capability to combine customized code with business instruments for improved stealth and persistence,” the researchers mentioned.

The Hacker News Tags:Campaign, Espionage, Global, IranLinked, MuddyWater, Organisations, Targets

Post navigation

Previous Post: Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
Next Post: Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys

Related Posts

RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories The Hacker News
New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App The Hacker News
3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics 3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics The Hacker News
Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack The Hacker News
EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware The Hacker News
Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark