Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MuddyWater Intensifies Cyber Attacks in MENA with New Malware

MuddyWater Intensifies Cyber Attacks in MENA with New Malware

Posted on February 23, 2026 By CWS

The Iranian cyber threat group known as MuddyWater, also identified as Earth Vetala, Mango Sandstorm, and MUDDYCOAST, has launched a series of cyber attacks targeting entities and individuals in the Middle East and North Africa (MENA). This new wave of attacks, termed Operation Olalampo, began on January 26, 2026, and employs sophisticated malware to infiltrate and control systems within the region.

New Malware Deployment in Operation Olalampo

According to a report by Group-IB, MuddyWater has introduced several new malware families that exhibit similarities to previous tools employed by the group. These include initial access tools like GhostFetch and HTTP_VIP, a Rust-based backdoor known as CHAR, and an advanced implant called GhostBackDoor, which is delivered by GhostFetch. These tools enable the attackers to gain persistent access and control over compromised systems.

Phishing Attacks and Malware Capabilities

The attack strategy often starts with phishing emails containing Microsoft Office documents with malicious macros. These macros decode and execute embedded payloads, granting remote control over the victim’s system. One variant involves a malicious Excel document that, once macros are enabled, deploys the CHAR backdoor. Another approach uses themes such as flight tickets to trick users into deploying the HTTP_VIP downloader, which subsequently installs AnyDesk software for remote system access.

Technical Insights into Malware Functionality

GhostFetch acts as a first-stage downloader, conducting system profiling and executing secondary payloads in memory. GhostBackDoor, deployed by GhostFetch, offers functionalities such as file operations and system control. HTTP_VIP, another downloader, performs system reconnaissance and communicates with external servers to deploy AnyDesk and retrieve further instructions. CHAR, a Rust-based backdoor, is controlled via a Telegram bot and can execute various commands, establish proxies, and upload stolen data.

Group-IB’s analysis highlighted the use of artificial intelligence (AI) in the development of CHAR, evidenced by unique debug strings. This aligns with previous findings from Google indicating MuddyWater’s experimentation with generative AI to craft custom malware solutions.

Implications and Future Outlook

MuddyWater’s campaign underscores the persistent threat they pose in the META region, particularly within the MENA area. Their integration of AI in malware development and exploitation of new vulnerabilities marks a significant evolution in their tactics. As they continue to enhance their capabilities and infrastructure, organizations in the region must bolster their cybersecurity measures to defend against these advanced threats.

The Hacker News Tags:artificial intelligence, CHAR, cyber threats, Cybersecurity, GhostFetch, HTTP_VIP, Malware, MENA region, MuddyWater, threat intelligence

Post navigation

Previous Post: Google Enhances Security, Blocks 1.75 Million Malicious Apps
Next Post: Silver Fox APT Employs Advanced Malware Tactics in Asia

Related Posts

Automation Is Redefining Pentest Delivery Automation Is Redefining Pentest Delivery The Hacker News
DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The Hacker News
Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month The Hacker News
Google Ordered to Pay 4M for Misusing Android Users’ Cellular Data Without Permission Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission The Hacker News
Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks The Hacker News
Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ransomware Hits 65% of Financial Firms in 2024
  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered
  • Reddit Faces £14.47 Million Fine for Child Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ransomware Hits 65% of Financial Firms in 2024
  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered
  • Reddit Faces £14.47 Million Fine for Child Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News