Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

Posted on October 22, 2025October 22, 2025 By CWS

Oct 22, 2025Ravie LakshmananMalware / Cyber Espionage
The Iranian nation-state group referred to as MuddyWater has been attributed to a brand new marketing campaign that has leveraged a compromised electronic mail account to distribute a backdoor known as Phoenix to numerous organizations throughout the Center East and North Africa (MENA) area, together with over 100 authorities entities.
The tip purpose of the marketing campaign is to infiltrate high-value targets and facilitate intelligence gathering, Singaporean cybersecurity firm Group-IB mentioned in a technical report printed immediately.
Greater than three-fourths of the marketing campaign’s targets embody embassies, diplomatic missions, overseas affairs ministries, and consulates, adopted by worldwide organizations and telecommunications corporations.

“MuddyWater accessed the compromised mailbox by means of NordVPN (a official service abused by the menace actor), and used it to ship phishing emails that gave the impression to be genuine correspondence,” mentioned safety researchers Mahmoud Zohdy and Mansour Alhmoud.
“By exploiting the belief and authority related to such communications, the marketing campaign considerably elevated its possibilities of deceiving recipients into opening the malicious attachments.”
The assault chain primarily includes the menace actor distributing weaponized Microsoft Phrase paperwork that, when opened, immediate the e-mail recipients to allow macros with a view to view the content material. As soon as the unsuspecting consumer permits the function, the doc proceeds to execute malicious Visible Primary for Software (VBA) code, ensuing within the deployment of model 4 of the Phoenix backdoor.
The backdoor is launched via a loader known as FakeUpdate that is decoded and written to disk by the VBA dropper. The loader incorporates the Superior Encryption Customary (AES)-encrypted Phoenix payload.

MuddyWater, additionally known as Boggy Serpens, Cobalt Ulster, Earth Vetala, Mango Sandstorm (previously Mercury), Seedworm, Static Kitten, TA450, TEMP.Zagros, and Yellow Nix, is assessed to be affiliated with Iran’s Ministry of Intelligence and Safety (MOIS). It is recognized to be energetic since at the least 2017.
The menace actor’s use of Phoenix was first documented by Group-IB final month, describing it as a light-weight model of BugSleep, a Python-based implant linked to MuddyWater. Two totally different variants of Phoenix (Model 3 and Model 4) have been detected within the wild.

The cybersecurity vendor mentioned the attacker’s command-and-control (C2) server (“159.198.36[.]115”) has additionally been discovered internet hosting distant monitoring and administration (RMM) utilities and a customized net browser credential stealer that targets Courageous, Google Chrome, Microsoft Edge, and Opera, suggesting their doubtless use within the operation. It is price noting that MuddyWater has a historical past of distributing distant entry software program by way of phishing campaigns through the years.
“By deploying up to date malware variants such because the Phoenix v4 backdoor, the FakeUpdate injector, and customized credential-stealing instruments alongside official RMM utilities like PDQ and Action1, MuddyWater demonstrated an enhanced capability to combine customized code with business instruments for improved stealth and persistence,” the researchers mentioned.

The Hacker News Tags:Campaign, Espionage, Global, IranLinked, MuddyWater, Organisations, Targets

Post navigation

Previous Post: Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
Next Post: Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys

Related Posts

Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization The Hacker News
Helping CISOs Speak the Language of Business Helping CISOs Speak the Language of Business The Hacker News
Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access The Hacker News
Iranian Cyber Threats Target U.S. Infrastructure Iranian Cyber Threats Target U.S. Infrastructure The Hacker News
BKA Unveils Key Figures in REvil Ransomware Operations BKA Unveils Key Figures in REvil Ransomware Operations The Hacker News
Why Organizations Are Turning to RPAM Why Organizations Are Turning to RPAM The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark