Comprehensive Threat Exposure Management Platform
The Iran-linked Advanced Persistent Threat (APT) group MuddyWater—also known as Seedworm, TEMP.Zagros, Mercury, TA450, and Mango Sandstorm—has launched a new cyber-espionage campaign targeting more than 100 government and critical infrastructure organizations across the Middle East and North Africa (MENA).
The operation leverages compromised email accounts and malicious Microsoft Word attachments to deploy custom malware, including the Phoenix Backdoor v4, FakeUpdate Loader, and Chromium_Stealer. This campaign primarily focuses on intelligence collection rather than disruption, aligning with Iran’s Ministry of Intelligence and Security (MOIS) espionage objectives.
By integrating legitimate Remote Monitoring and Management (RMM) tools such as PDQ RMM and Action1, MuddyWater blurs the line between legitimate and malicious activity, enhancing stealth, persistence, and operational control within compromised networks.
The campaign begins with highly convincing spear-phishing emails sent from compromised mailboxes accessed through NordVPN to mask the attacker’s origin. These emails typically contain Microsoft Word attachments that prompt recipients to enable macros, triggering the initial infection phase.
This campaign showcases MuddyWater’s evolving tradecraft, including multi-stage payload delivery, macro-based infection, and blending legitimate tools with malware, maintaining long-term espionage operations within high-value geopolitical targets.
SHA256 Hashes:
IPv4 Address:
Domain:
screenai[.]online
| Tactic | Technique | Technique ID |
|---|---|---|
| Initial Access | Spearphishing Attachment | T1566.001 |
| Execution | Command and Scripting Interpreter – PowerShell, Visual Basic | T1059.001, T1059.005 |
| Persistence | Winlogon Helper DLL, Registry Run Keys / Startup Folder | T1547.004, T1547.001 |
| Privilege Escalation | Process Injection, Component Object Model Hijacking | T1055, T1546.015 |
| Defense Evasion | Obfuscated Files / Information, Hide Artifacts | T1027, T1564 |
| Credential Access | Credentials from Password Stores / Web Browsers | T1555, T1555.003 |
| Discovery | System Information Discovery | T1082 |
| Collection | Input Capture (Keylogging), Screen Capture | T1056, T1113 |
| Exfiltration | Exfiltration Over C2 Channel | T1041 |
| Command and Control | Application Layer Protocol – Web Protocols | T1071.001 |
| Impact | Data Manipulation | T1565 |
| Resource Development | Compromise Accounts | T1586 |
Get through updates and upcoming events, and more directly in your inbox