Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

Posted on January 10, 2026January 10, 2026 By CWS

Jan 10, 2026Ravie LakshmananCyber Espionage / Malware
The Iranian menace actor often known as MuddyWater has been attributed to a spear-phishing marketing campaign concentrating on diplomatic, maritime, monetary, and telecom entities within the Center East with a Rust-based implant codenamed RustyWater.
“The marketing campaign makes use of icon spoofing and malicious Phrase paperwork to ship Rust primarily based implants able to asynchronous C2, anti-analysis, registry persistence, and modular post-compromise functionality enlargement,” CloudSEK resetter Prajwal Awasthi mentioned in a report printed this week.
The most recent growth displays continued evolution of MuddyWater’s tradecraft, which has gradually-but-steadily diminished its reliance on official distant entry software program as a post-exploitation device in favor of various malware arsenal comprising instruments like Phoenix, UDPGangster, BugSleep (aka MuddyRot), and MuddyViper.
Additionally tracked as Mango Sandstorm, Static Kitten, and TA450, the hacking group is assessed to be affiliated with Iran’s Ministry of Intelligence and Safety (MOIS). It has been operational since a minimum of 2017.
Assault chains distributing RustyWater are pretty easy: spear-phishing emails masquerading as cybersecurity tips come attacked with a Microsoft Phrase doc that, when opened, instructs the sufferer to “Allow content material” in order to activate the execution of a malicious VBA macro that is answerable for deploying the Rust implant binary.
Additionally known as Archer RAT and RUSTRIC, RustyWater gathers sufferer machine info, detects put in safety software program, units up persistence by the use of a Home windows Registry key, and establishes contact with a command-and-control (C2) server (“nomercys.it[.]com”) to facilitate file operations and command execution.
It is price noting that use of RUSTRIC was flagged by Seqrite Labs late final month as a part of assaults concentrating on Info Know-how (IT), Managed Service Suppliers (MSPs), human sources, and software program growth corporations in Israel. The exercise is being tracked by the cybersecurity firm below the names UNG0801 and Operation IconCat.
“Traditionally, MuddyWater has relied on PowerShell and VBS loaders for preliminary entry and post-compromise operations,” CloudSEK mentioned. “The introduction of Rust-based implants represents a notable tooling evolution towards extra structured, modular, and low noise RAT capabilities.”

The Hacker News Tags:East, Launches, Middle, MuddyWater, RAT, RustyWater, Sectors, SpearPhishing

Post navigation

Previous Post: Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
Next Post: Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers

Related Posts

Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack The Hacker News
Insights from 160 Million Attack Simulations Insights from 160 Million Attack Simulations The Hacker News
WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices The Hacker News
How Attackers Bypass Synced Passkeys How Attackers Bypass Synced Passkeys The Hacker News
A walkthrough of the Google Workspace Password Manager A walkthrough of the Google Workspace Password Manager The Hacker News
Microsoft Fixes 84 Security Flaws, Including Two Zero-Days Microsoft Fixes 84 Security Flaws, Including Two Zero-Days The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark