Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

Posted on October 22, 2025October 22, 2025 By CWS

Oct 22, 2025Ravie LakshmananMalware / Cyber Espionage
The Iranian nation-state group referred to as MuddyWater has been attributed to a brand new marketing campaign that has leveraged a compromised electronic mail account to distribute a backdoor known as Phoenix to numerous organizations throughout the Center East and North Africa (MENA) area, together with over 100 authorities entities.
The tip purpose of the marketing campaign is to infiltrate high-value targets and facilitate intelligence gathering, Singaporean cybersecurity firm Group-IB mentioned in a technical report printed immediately.
Greater than three-fourths of the marketing campaign’s targets embody embassies, diplomatic missions, overseas affairs ministries, and consulates, adopted by worldwide organizations and telecommunications corporations.

“MuddyWater accessed the compromised mailbox by means of NordVPN (a official service abused by the menace actor), and used it to ship phishing emails that gave the impression to be genuine correspondence,” mentioned safety researchers Mahmoud Zohdy and Mansour Alhmoud.
“By exploiting the belief and authority related to such communications, the marketing campaign considerably elevated its possibilities of deceiving recipients into opening the malicious attachments.”
The assault chain primarily includes the menace actor distributing weaponized Microsoft Phrase paperwork that, when opened, immediate the e-mail recipients to allow macros with a view to view the content material. As soon as the unsuspecting consumer permits the function, the doc proceeds to execute malicious Visible Primary for Software (VBA) code, ensuing within the deployment of model 4 of the Phoenix backdoor.
The backdoor is launched via a loader known as FakeUpdate that is decoded and written to disk by the VBA dropper. The loader incorporates the Superior Encryption Customary (AES)-encrypted Phoenix payload.

MuddyWater, additionally known as Boggy Serpens, Cobalt Ulster, Earth Vetala, Mango Sandstorm (previously Mercury), Seedworm, Static Kitten, TA450, TEMP.Zagros, and Yellow Nix, is assessed to be affiliated with Iran’s Ministry of Intelligence and Safety (MOIS). It is recognized to be energetic since at the least 2017.
The menace actor’s use of Phoenix was first documented by Group-IB final month, describing it as a light-weight model of BugSleep, a Python-based implant linked to MuddyWater. Two totally different variants of Phoenix (Model 3 and Model 4) have been detected within the wild.

The cybersecurity vendor mentioned the attacker’s command-and-control (C2) server (“159.198.36[.]115”) has additionally been discovered internet hosting distant monitoring and administration (RMM) utilities and a customized net browser credential stealer that targets Courageous, Google Chrome, Microsoft Edge, and Opera, suggesting their doubtless use within the operation. It is price noting that MuddyWater has a historical past of distributing distant entry software program by way of phishing campaigns through the years.
“By deploying up to date malware variants such because the Phoenix v4 backdoor, the FakeUpdate injector, and customized credential-stealing instruments alongside official RMM utilities like PDQ and Action1, MuddyWater demonstrated an enhanced capability to combine customized code with business instruments for improved stealth and persistence,” the researchers mentioned.

The Hacker News Tags:Campaign, Espionage, Global, IranLinked, MuddyWater, Organisations, Targets

Post navigation

Previous Post: Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
Next Post: Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys

Related Posts

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit The Hacker News
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business The Hacker News
The Hidden Weaknesses in AI SOC Tools that No One Talks About The Hacker News
Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild The Hacker News
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors The Hacker News
Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset
  • Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys
  • Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign
  • Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
  • Here’s How to Solve It 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset
  • Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys
  • Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign
  • Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
  • Here’s How to Solve It 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News