Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Boggy Serpens Intensifies Cyberattacks on Global Targets

Boggy Serpens Intensifies Cyberattacks on Global Targets

Posted on March 18, 2026 By CWS

An Iranian-backed cyber group, Boggy Serpens, also referred to as MuddyWater, has significantly ramped up its espionage activities in recent months. This group has been targeting diplomatic entities, energy firms, maritime operators, and financial institutions in a coordinated cyber offensive. Known to be associated with Iran’s Ministry of Intelligence and Security (MOIS), Boggy Serpens has been in operation since 2017. However, its recent activities showcase a notable advancement in both their strategic approach and technical capabilities.

Strategic Evolution and Technical Enhancements

Historically, Boggy Serpens employed loud and high-volume spear-phishing campaigns, focusing more on speed than stealth. Their tactics included the use of remote monitoring tools like Atera and ScreenConnect, as well as utilities such as LaZagne and CrackMapExec. Initially, these campaigns were broad and lacked sophistication. However, the group has since transitioned to more calculated operations.

Recent analyses by Unit 42 have highlighted a significant shift in the group’s behavior, with a move towards long-term persistence and the compromise of trusted relationships. Boggy Serpens now utilizes custom implants created with Rust, a language known for its memory safety, complicating reverse engineering efforts. Furthermore, they have incorporated generative AI into their development processes to expedite the creation of new malware families.

Wide-reaching Impact and Coordinated Attacks

The group’s campaigns have had a broad geographical impact, affecting entities in Israel, Hungary, Turkey, Saudi Arabia, the UAE, Turkmenistan, Egypt, and South America. These attacks have spanned various sectors, including government, aviation, maritime, and finance. A notable example is a four-wave attack against a UAE-based marine and energy company associated with Saudi Aramco, which persisted from August 2025 to February 2026.

In August 2025, Boggy Serpens exploited a compromised email account at the Omani Ministry of Foreign Affairs to send fake diplomatic invitations to embassies and international organizations under the guise of a ‘Sustainable Peace’ seminar. This campaign illustrates the group’s ability to craft complex social engineering tactics that evade both automated filters and human vigilance.

Advanced Social Engineering Techniques

The group’s two-stage deception model begins with the use of legitimate, hijacked email accounts from government agencies or corporations. Messages from these accounts bypass spam filters due to their authenticated origins. Such tactics were employed against a telecommunications provider in Turkmenistan and Israeli organizations, where the group sent attachments disguised as ‘Cybersecurity Guidelines’ and HR-related documents.

Upon opening the attachment, the victim is prompted to ‘Enable Content,’ triggering a VBA macro that silently installs a payload, subsequently revealing a convincing document. This sophisticated approach ensures the victim perceives the interaction as routine and secure.

To mitigate these threats, organizations are advised to enforce strict macro execution policies and implement behavioral endpoint monitoring. Multi-factor authentication should be mandatory for all email accounts to minimize hijacking risks. Additionally, email controls that evaluate behavioral patterns beyond sender reputation are essential for detecting internal phishing attempts.

Regular threat hunting for UDP-based communications, process injections, and unusual registry modifications can help identify and neutralize active threats before they establish persistent access.

Cyber Security News Tags:AI in malware, Boggy Serpens, cyber espionage, Cybersecurity, diplomatic missions, energy sector, Espionage, financial institutions, Iran, maritime operations, MOIS, MuddyWater, multi-factor authentication, phishing prevention, Rust programming

Post navigation

Previous Post: Ubuntu Security Flaw CVE-2026-3888 Enables Root Access
Next Post: Malware Targets Argentine Courts with Fake Documents

Related Posts

UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia Cyber Security News
Bob Flores, Former CTO of the CIA, Joins Brinker Bob Flores, Former CTO of the CIA, Joins Brinker Cyber Security News
Aembit Reveals NHIcon 2026 Agenda & Speakers Aembit Reveals NHIcon 2026 Agenda & Speakers Cyber Security News
Malware Found in Top OpenClaw Skill Exposes Major Security Flaws Malware Found in Top OpenClaw Skill Exposes Major Security Flaws Cyber Security News
Banking Trojan Anatsa Found in Google Play App Banking Trojan Anatsa Found in Google Play App Cyber Security News
Chinese National Jailed for Laundering Over £5 Billion by Defrauding Over 128,000 Victims Chinese National Jailed for Laundering Over £5 Billion by Defrauding Over 128,000 Victims Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Hackers Exploit Stolen Credentials in Stryker Cyberattack
  • Understanding Magecart Threats in Web Supply Chains
  • Remote Code Execution Risk in Telnetd Impacts Security
  • Mesh CSMA: Breaking Attack Paths to Sensitive Data
  • Vidar 2.0 Malware Targets Gamers via Fake Cheats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Hackers Exploit Stolen Credentials in Stryker Cyberattack
  • Understanding Magecart Threats in Web Supply Chains
  • Remote Code Execution Risk in Telnetd Impacts Security
  • Mesh CSMA: Breaking Attack Paths to Sensitive Data
  • Vidar 2.0 Malware Targets Gamers via Fake Cheats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark