Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

Posted on October 22, 2025October 22, 2025 By CWS

Oct 22, 2025Ravie LakshmananMalware / Cyber Espionage
The Iranian nation-state group referred to as MuddyWater has been attributed to a brand new marketing campaign that has leveraged a compromised electronic mail account to distribute a backdoor known as Phoenix to numerous organizations throughout the Center East and North Africa (MENA) area, together with over 100 authorities entities.
The tip purpose of the marketing campaign is to infiltrate high-value targets and facilitate intelligence gathering, Singaporean cybersecurity firm Group-IB mentioned in a technical report printed immediately.
Greater than three-fourths of the marketing campaign’s targets embody embassies, diplomatic missions, overseas affairs ministries, and consulates, adopted by worldwide organizations and telecommunications corporations.

“MuddyWater accessed the compromised mailbox by means of NordVPN (a official service abused by the menace actor), and used it to ship phishing emails that gave the impression to be genuine correspondence,” mentioned safety researchers Mahmoud Zohdy and Mansour Alhmoud.
“By exploiting the belief and authority related to such communications, the marketing campaign considerably elevated its possibilities of deceiving recipients into opening the malicious attachments.”
The assault chain primarily includes the menace actor distributing weaponized Microsoft Phrase paperwork that, when opened, immediate the e-mail recipients to allow macros with a view to view the content material. As soon as the unsuspecting consumer permits the function, the doc proceeds to execute malicious Visible Primary for Software (VBA) code, ensuing within the deployment of model 4 of the Phoenix backdoor.
The backdoor is launched via a loader known as FakeUpdate that is decoded and written to disk by the VBA dropper. The loader incorporates the Superior Encryption Customary (AES)-encrypted Phoenix payload.

MuddyWater, additionally known as Boggy Serpens, Cobalt Ulster, Earth Vetala, Mango Sandstorm (previously Mercury), Seedworm, Static Kitten, TA450, TEMP.Zagros, and Yellow Nix, is assessed to be affiliated with Iran’s Ministry of Intelligence and Safety (MOIS). It is recognized to be energetic since at the least 2017.
The menace actor’s use of Phoenix was first documented by Group-IB final month, describing it as a light-weight model of BugSleep, a Python-based implant linked to MuddyWater. Two totally different variants of Phoenix (Model 3 and Model 4) have been detected within the wild.

The cybersecurity vendor mentioned the attacker’s command-and-control (C2) server (“159.198.36[.]115”) has additionally been discovered internet hosting distant monitoring and administration (RMM) utilities and a customized net browser credential stealer that targets Courageous, Google Chrome, Microsoft Edge, and Opera, suggesting their doubtless use within the operation. It is price noting that MuddyWater has a historical past of distributing distant entry software program by way of phishing campaigns through the years.
“By deploying up to date malware variants such because the Phoenix v4 backdoor, the FakeUpdate injector, and customized credential-stealing instruments alongside official RMM utilities like PDQ and Action1, MuddyWater demonstrated an enhanced capability to combine customized code with business instruments for improved stealth and persistence,” the researchers mentioned.

The Hacker News Tags:Campaign, Espionage, Global, IranLinked, MuddyWater, Organisations, Targets

Post navigation

Previous Post: Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
Next Post: Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys

Related Posts

A Technical Gap Analysis of Last-Mile Protection The Hacker News
Can Your Security Stack See ChatGPT? Why Network Visibility Matters The Hacker News
Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising The Hacker News
AI Agents Act Like Employees With Root Access—Here’s How to Regain Control The Hacker News
What 2025 Is Teaching Us About Cloud Defense The Hacker News
Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys
  • Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign
  • Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
  • Here’s How to Solve It 
  • Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys
  • Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign
  • Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
  • Here’s How to Solve It 
  • Critical Argument Injection Vulnerability in Popular AI Agents Let Attackers Execute Remote Code

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News