Raleigh, NC

32°F
Broken Clouds Humidity: 47%
Wind: 8.23 M/S

Iran-Linked MuddyWater Deploys New MuddyViper Backdoor Against Israeli Sectors

Iran-Linked MuddyWater Deploys New MuddyViper Backdoor Against Israeli Sectors

The Iran linked threat actor MuddyWater has launched a new, refined campaign targeting multiple Israeli sectors and one confirmed Egyptian organization. ESET researchers uncovered the operation, which utilizes a new custom backdoor called MuddyViper to steal sensitive data and maintain persistence.

New Backdoor and Targeted Sectors

The campaign targeted various sectors between September 2024 and March 2025, including engineering, local government, manufacturing, technology, transportation, utilities, and

universities. MuddyWater, known by several aliases including SeedWorm and Mango Sandstorm, deployed custom tools to bypass defenses.

The core of the attack involves the Fooder loader, which is disguised as a Snake game. This loader is used to run the MuddyViper backdoor, a C/C++ tool capable of:

  • Stealing system information and credentials.
  • Exfiltrating browser data.
  • Allowing arbitrary file execution.

Attackers also deployed CE-Notes and LP-Notes credential stealers, and go-socks5 reverse tunnels in this operation.

Advanced Evasion Techniques

Unlike previous noisy campaigns, this operation was low profile and avoided interactive sessions. It employed advanced techniques unique to Iran aligned groups, including the use of the CNG Windows cryptographic API for data encryption and decryption. Both MuddyViper and its loaders utilize this API.

Furthermore, a key tactic for credential theft involves opening a fake Windows Security dialog box to trick users into entering their login details. This method, along with the game inspired evasion and reverse tunneling, demonstrates MuddyWater’s growing sophistication.

Historically, MuddyWater has often acted as an initial access broker, using spear phishing emails with links to Remote Monitoring and Management (RMM) software. The group continues to rely on PowerShell and Go backdoors, typically targeting telecommunications, government, and energy sectors.

ESET researchers conclude that MuddyWater remains a leading actor in Iranian nexus activity. The group is evolving by consistently enhancing its campaigns with more advanced tactics, techniques, and procedures, making them increasingly challenging to defend against. The US Cyber Command officially linked the MuddyWater APT group to Iran’s Ministry of Intelligence and Security (MOIS) in January 2022.

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

Cybersecurity Insight delivers timely updates on global cybersecurity developments, including recent system breaches, cyber-attacks, advancements in artificial intelligence (AI), and emerging technology innovations. Our goal is to keep viewers well-informed about the latest trends in technology and system security, and how these changes impact our lives and the broader ecosystem

Please fill the required field.