Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Posted on January 10, 2026January 10, 2026 By CWS

Jan 10, 2026Ravie LakshmananCyber Espionage / Malware
The Iranian menace actor often known as MuddyWater has been attributed to a spear-phishing marketing campaign concentrating on diplomatic, maritime, monetary, and telecom entities within the Center East with a Rust-based implant codenamed RustyWater.
“The marketing campaign makes use of icon spoofing and malicious Phrase paperwork to ship Rust primarily based implants able to asynchronous C2, anti-analysis, registry persistence, and modular post-compromise functionality enlargement,” CloudSEK resetter Prajwal Awasthi mentioned in a report printed this week.
The most recent growth displays continued evolution of MuddyWater’s tradecraft, which has gradually-but-steadily diminished its reliance on official distant entry software program as a post-exploitation device in favor of various malware arsenal comprising instruments like Phoenix, UDPGangster, BugSleep (aka MuddyRot), and MuddyViper.
Additionally tracked as Mango Sandstorm, Static Kitten, and TA450, the hacking group is assessed to be affiliated with Iran’s Ministry of Intelligence and Safety (MOIS). It has been operational since a minimum of 2017.
Assault chains distributing RustyWater are pretty easy: spear-phishing emails masquerading as cybersecurity tips come attacked with a Microsoft Phrase doc that, when opened, instructs the sufferer to “Allow content material” in order to activate the execution of a malicious VBA macro that is answerable for deploying the Rust implant binary.
Additionally known as Archer RAT and RUSTRIC, RustyWater gathers sufferer machine info, detects put in safety software program, units up persistence by the use of a Home windows Registry key, and establishes contact with a command-and-control (C2) server (“nomercys.it[.]com”) to facilitate file operations and command execution.
It is price noting that use of RUSTRIC was flagged by Seqrite Labs late final month as a part of assaults concentrating on Info Know-how (IT), Managed Service Suppliers (MSPs), human sources, and software program growth corporations in Israel. The exercise is being tracked by the cybersecurity firm below the names UNG0801 and Operation IconCat.
“Traditionally, MuddyWater has relied on PowerShell and VBS loaders for preliminary entry and post-compromise operations,” CloudSEK mentioned. “The introduction of Rust-based implants represents a notable tooling evolution towards extra structured, modular, and low noise RAT capabilities.”

The Hacker News Tags:East, Launches, Middle, MuddyWater, RAT, RustyWater, Sectors, SpearPhishing

Post navigation

Previous Post: Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
Next Post: Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers

Related Posts

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks The Hacker News
AI Agents Act Like Employees With Root Access—Here’s How to Regain Control AI Agents Act Like Employees With Root Access—Here’s How to Regain Control The Hacker News
Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack The Hacker News
FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware The Hacker News
Model Security Is the Wrong Frame – The Real Risk Is Workflow Security Model Security Is the Wrong Frame – The Real Risk Is Workflow Security The Hacker News
Securing Data in the AI Era Securing Data in the AI Era The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News