Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MuddyWater Intensifies Cyber Attacks in MENA with New Malware

MuddyWater Intensifies Cyber Attacks in MENA with New Malware

Posted on February 23, 2026 By CWS

The Iranian cyber threat group known as MuddyWater, also identified as Earth Vetala, Mango Sandstorm, and MUDDYCOAST, has launched a series of cyber attacks targeting entities and individuals in the Middle East and North Africa (MENA). This new wave of attacks, termed Operation Olalampo, began on January 26, 2026, and employs sophisticated malware to infiltrate and control systems within the region.

New Malware Deployment in Operation Olalampo

According to a report by Group-IB, MuddyWater has introduced several new malware families that exhibit similarities to previous tools employed by the group. These include initial access tools like GhostFetch and HTTP_VIP, a Rust-based backdoor known as CHAR, and an advanced implant called GhostBackDoor, which is delivered by GhostFetch. These tools enable the attackers to gain persistent access and control over compromised systems.

Phishing Attacks and Malware Capabilities

The attack strategy often starts with phishing emails containing Microsoft Office documents with malicious macros. These macros decode and execute embedded payloads, granting remote control over the victim’s system. One variant involves a malicious Excel document that, once macros are enabled, deploys the CHAR backdoor. Another approach uses themes such as flight tickets to trick users into deploying the HTTP_VIP downloader, which subsequently installs AnyDesk software for remote system access.

Technical Insights into Malware Functionality

GhostFetch acts as a first-stage downloader, conducting system profiling and executing secondary payloads in memory. GhostBackDoor, deployed by GhostFetch, offers functionalities such as file operations and system control. HTTP_VIP, another downloader, performs system reconnaissance and communicates with external servers to deploy AnyDesk and retrieve further instructions. CHAR, a Rust-based backdoor, is controlled via a Telegram bot and can execute various commands, establish proxies, and upload stolen data.

Group-IB’s analysis highlighted the use of artificial intelligence (AI) in the development of CHAR, evidenced by unique debug strings. This aligns with previous findings from Google indicating MuddyWater’s experimentation with generative AI to craft custom malware solutions.

Implications and Future Outlook

MuddyWater’s campaign underscores the persistent threat they pose in the META region, particularly within the MENA area. Their integration of AI in malware development and exploitation of new vulnerabilities marks a significant evolution in their tactics. As they continue to enhance their capabilities and infrastructure, organizations in the region must bolster their cybersecurity measures to defend against these advanced threats.

The Hacker News Tags:artificial intelligence, CHAR, cyber threats, Cybersecurity, GhostFetch, HTTP_VIP, Malware, MENA region, MuddyWater, threat intelligence

Post navigation

Previous Post: Google Enhances Security, Blocks 1.75 Million Malicious Apps
Next Post: Silver Fox APT Employs Advanced Malware Tactics in Asia

Related Posts

Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks The Hacker News
The New JavaScript Injection Playbook The New JavaScript Injection Playbook The Hacker News
Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware The Hacker News
Critical SolarWinds Vulnerability Listed as Actively Exploited Critical SolarWinds Vulnerability Listed as Actively Exploited The Hacker News
Business Case for Agentic AI SOC Analysts Business Case for Agentic AI SOC Analysts The Hacker News
React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Powered Cyber Attacks Accelerate Threat Landscape
  • Ransomware Hits 65% of Financial Firms in 2024
  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Powered Cyber Attacks Accelerate Threat Landscape
  • Ransomware Hits 65% of Financial Firms in 2024
  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News