MuddyWater Expands Espionage Campaign Across MENA with Phoenix Backdoor v4
Summary
The Iran-linked Advanced Persistent Threat (APT) group MuddyWater—also known as Seedworm, TEMP.Zagros, Mercury, TA450, and Mango Sandstorm—has launched a new cyber-espionage campaign targeting more than 100 government and critical infrastructure organizations across the Middle East and North Africa (MENA).
The operation leverages compromised email accounts and malicious Microsoft Word attachments to deploy custom malware, including the Phoenix Backdoor v4, FakeUpdate Loader, and Chromium_Stealer. This campaign primarily focuses on intelligence collection rather than disruption, aligning with Iran’s Ministry of Intelligence and Security (MOIS) espionage objectives.
By integrating legitimate Remote Monitoring and Management (RMM) tools such as PDQ RMM and Action1, MuddyWater blurs the line between legitimate and malicious activity, enhancing stealth, persistence, and operational control within compromised networks.
Attack Details
The campaign begins with highly convincing spear-phishing emails sent from compromised mailboxes accessed through NordVPN to mask the attacker’s origin. These emails typically contain Microsoft Word attachments that prompt recipients to enable macros, triggering the initial infection phase.
Infection Chain Overview
- Initial Compromise: The victim receives a phishing email containing a malicious Word document embedded with Visual Basic for Applications (VBA) macros.
- Execution of FakeUpdate Loader: Once macros are enabled, the FakeUpdate loader decrypts and injects the second-stage payload into memory.
- Deployment of Phoenix Backdoor v4: The loader installs Phoenix Backdoor, establishing persistence, connecting to command-and-control (C2) servers, and enabling continuous data exfiltration and remote execution.
- Credential Theft via Chromium_Stealer: A custom Chromium_Stealer tool, disguised as a benign utility, extracts credentials from browsers such as Chrome, Edge, Opera, and Brave.
- Use of Legitimate Tools: To evade detection, MuddyWater employs legitimate RMM tools like PDQ RMM and Action1, providing persistent access and complicating forensic analysis.
Objectives and Impact
- Intelligence Collection: Exfiltration of sensitive government and diplomatic communications.
- Credential Harvesting: Extraction of stored browser credentials and system tokens.
- Persistence: Continuous remote access through dual-use software.
- Stealth and Obfuscation: Leveraging encrypted payloads and VPN-based distribution.
This campaign showcases MuddyWater’s evolving tradecraft, including multi-stage payload delivery, macro-based infection, and blending legitimate tools with malware, maintaining long-term espionage operations within high-value geopolitical targets.
Recommendations
- Disable Macros by Default: Configure Microsoft Office applications to block all macros from the internet and only allow those from trusted, signed sources.
- Deploy Endpoint Detection and Response (EDR): Use EDR solutions to detect abnormal script activity, registry changes, and known malware behaviors associated with Phoenix Backdoor and Chromium_Stealer.
- Conduct Phishing Awareness Training: Educate employees to identify spear-phishing indicators, verify sender authenticity, and avoid enabling macros in unsolicited attachments.
- Enforce Multi-Factor Authentication (MFA): Require MFA for all critical access points—including VPNs, RMM utilities, and cloud services—to limit unauthorized lateral movement.
- Restrict Browser Credential Storage: Implement policies to prevent users from saving corporate credentials in web browsers, neutralizing the Chromium_Stealer attack vector.
Indicators of Compromise (IoCs)
SHA256 Hashes:
- 668dd5b6fb06fe30a98dd59dd802258b45394ccd7cd610f0aaab43d801bf1a1e
- 5ec5a2adaa82a983fcc42ed9f720f4e894652bd7bd1f366826a16ac98bb91839
- 1883db6de22d98ed00f8719b11de5bf1d02fc206b89fedd6dd0df0e8d40c4c56
- 3ac8283916547c50501eed8e7c3a77f0ae8b009c7b72275be8726a5b6ae255e3
- 76fa8dca768b64aefedd85f7d0a33c2693b94bdb55f40ced7830561e48e39c75
- 3d6f69cc0330b302ddf4701bbc956b8fca683d1c1b3146768dcbce4a1a3932ca
IPv4 Address:
Domain:
MITRE ATT&CK TTPs
| Tactic | Technique | Technique ID |
|---|
| Initial Access | Spearphishing Attachment | T1566.001 |
| Execution | Command and Scripting Interpreter – PowerShell, Visual Basic | T1059.001, T1059.005 |
| Persistence | Winlogon Helper DLL, Registry Run Keys / Startup Folder | T1547.004, T1547.001 |
| Privilege Escalation | Process Injection, Component Object Model Hijacking | T1055, T1546.015 |
| Defense Evasion | Obfuscated Files / Information, Hide Artifacts | T1027, T1564 |
| Credential Access | Credentials from Password Stores / Web Browsers | T1555, T1555.003 |
| Discovery | System Information Discovery | T1082 |
| Collection | Input Capture (Keylogging), Screen Capture | T1056, T1113 |
| Exfiltration | Exfiltration Over C2 Channel | T1041 |
| Command and Control | Application Layer Protocol – Web Protocols | T1071.001 |
| Impact | Data Manipulation | T1565 |
| Resource Development | Compromise Accounts | T1586 |
References