LIVE NEWS
  • An ode to craftsmanship in software development
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
  • Clinton Deposition Videos Released in Epstein Investigation
  • Elevance stock tumbles as CMS may halt Medicare enrollment
  • Wild spaces for butterflies to be created in Glasgow
  • You can now adjust how your caller card looks for calls on Android phones
  • TRON DAO expands TRON Academy initiative with Dartmouth, Princeton, Oxford, and Cambridge
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»MuddyWater Targets Orgs With Fresh Malware Amid Rising Tensions
Cybersecurity

MuddyWater Targets Orgs With Fresh Malware Amid Rising Tensions

primereportsBy primereportsFebruary 23, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
MuddyWater Targets Orgs With Fresh Malware Amid Rising Tensions
Share
Facebook Twitter LinkedIn Pinterest Email


As the US prepares for a possible military strike against Iran, the nation-state threat group MuddyWater is wasting no time ramping up its cyber offensive against organizations in the Middle East and Africa region with an emerging attack campaign delivering several new strains of custom malware.

The campaign, dubbed Operation Olalampo, starts with the group’s typical entry tactic — spear-phishing emails — and ends with the deployment of one of several strains of never-before-seen second-stage loader and backdoor malware, according to a report by Group-IB published Friday. 

Olalampo “targeted multiple organizations and individuals primarily across the MENA region, aligning with the ongoing geopolitical tensions,” according to the blog post. There also is evidence that MuddyWater, which is tied to Iran’s Ministry of Intelligence and Security (MOIS), deviated from its typical entry tactic and also tried to exploit flaws in public-facing servers as part of the activity, which the researchers first discovered on Jan. 26.

Related:Enigma Cipher Device Still Holds Secrets for Cyber Pros

One of the new malware strains, the Char backdoor, used a Telegram bot as a command-and-control (C2) channel, which gave researchers “valuable insight into MuddyWater’s post-exploitation activity,” according to the report. This insight showed that the infrastructure in the campaign was reused, one of the hallmarks of MuddyWater that contributed to the researchers identifying the perpetrator.

Moreover, as is the case with a number of recent threat campaigns, Olalampo showed signs of artificial intelligence (AI)-assisted development in the malware, demonstrating that this is likely to be the norm and not the exception going forward, according to Group-IB.

Delivery of AI-Developed Malware

Attacks in the campaign started typically for MuddyWater — with a targeted spear-phishing email, this time employing one of various Microsoft documents with malicious macros that decode the payload, drop it into a system, and execute it. Ultimately, the malware dropped by the campaign gave MuddyWater control of the victim’s system. 

The advanced persistent threat (APT) group used three attack-sequence variations against different targets. The first was a malicious Microsoft Excel document mimicking an energy and marine services company in the Middle East, likely targeting either contractors of the organization or the organization itself. 

That attack sequence ultimately led to the deployment of the Char backdoor, a RUST-based backdoor controlled by a Telegram bot, according to Group-IB. The use of Telegram in this way by the group signifies a tactical shift for MuddyWater, according to researchers.

Related:Latin America’s Cyber Maturity Lags Threat Landscape

Char also showed signs of AI-enhanced development in one of its command handlers, with the identification of “debug strings containing emojis — a trait rarely seen in human-authored code,” according to the report. 

“We observed four instances of this anomaly, suggesting that the adversary likely used an AI model to generate specific code segments and failed to sanitize the debug strings before compilation; this can also be seen in the command-and-control logs from the Telegram bot,” according to Group-IB.

Other MuddyWater Attack Variants

Another attack variant of Olalampo used a similar document lure to the previous one, but instead of dropping Char, it deployed the GhostFetch downloader. The loader subsequently downloaded the novel GhostBackDoor, an advanced backdoor that adapts its installation based on the environment’s privileges.

The third attack variant uses a Microsoft Word document employing multiple themes, such as flight tickets and reports, targeting “individuals of interest and system integrator companies in the Middle East,” according to Group-IB. This variant leads to the deployment of a new customer downloader called HTTP_VIP, which then deploys Anydesk remote monitoring and management (RMM) to take over the targeted system.

Related:Best-in-Class ‘Starkiller’ Phishing Kit Bypasses MFA

“The HTTP_VIP malware is a native downloader that serves as a bridge for further exploitation,” according to the post. The malware has a “highly selective” execution flow that performs system reconnaissance, checks specifically for a hard-coded domain, and will terminate if the system belongs to one; and performs C2 authentication.

MuddyWater Tightens Its Game

MuddyWater — also known asTA450, Helix Kitten, Seedworm, and other names — is one of Iran’s most active and notorious APTs, with roots that stretch as far back as 2017. In its latest attacks, it appears to be tightening its tactics, which used to be somewhat clumsy, despite its role as a longtime, prolific threat.

Indeed, MuddyWater has been steadily evolving its activities since it first emerged. Late last year, the group demonstrated stealthier stagecraft that included the use of memory-only loaders, custom backdoors, and techniques designed for defense evasion and persistence. At the time, researchers from ESET said the upgrades marked a significant evolution in the group’s capabilities and a departure from its historically noisier operational style.

“The group’s continued adoption of AI technology, combined with continued development of custom malware and tooling and diversified C2 infrastructures, underscores their dedication and intent to expand their operations,” according to Group-IB.

Defenders can strengthen their position against MuddyWater by using the indicators of compromise (IoCs), YARA rules, and EDR rules set out in Group-IB’s report to monitor for group activity. The company also recommended that organizations enhance email and phishing defenses, implement endpoint and access controls, strengthen network and infrastructure security, and create strategic long-term defense measures to reduce risk of compromise. 



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAWS creates a sandbox for its agent experiments
Next Article US strikes suspected drug boat in Caribbean, killing 3
primereports
  • Website

Related Posts

Cybersecurity

Samsung Unpacked 2026 live blog: Updates on Galaxy S26 Ultra, preorder deals, and pricing

February 25, 2026
Cybersecurity

Marquis sues SonicWall over backup breach that led to ransomware attack

February 25, 2026
Cybersecurity

Why ‘Call This Number’ TOAD Emails Beat Gateways

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20255 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Artificial Intelligence
  • Popular Now
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • An ode to craftsmanship in software development
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.