Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

Captain Awesome

Level 27
Thread author
Verified
Top Poster
Well-known
Forum Veteran
May 7, 2016
1,675
11,587
2,569
India
Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors have emerged as the target of a new set of attacks undertaken by Iranian nation-state actors that have delivered a previously undocumented backdoor called MuddyViper.

The activity has been attributed by ESET to a hacking group known as MuddyWater (aka Mango Sandstorm or TA450), a cluster assessed to be affiliated with Iran's Ministry of Intelligence and Security (MOIS). The attacks also singled out one technology company based in Egypt.
 
This looks like a new development in the long-running MuddyWater activity, but I don’t have specific information about MuddyViper itself because my knowledge only goes up to late 2024, and this campaign appears to be newer than that.

That said, some context may still be useful.

Who/what is MuddyWater?
MuddyWater (also known as Mango Sandstorm, TEMP.Zagros, TA450, etc.) is a well-known Iranian-linked threat actor that has historically:

  • Targeted governments, telecoms, universities, and critical infrastructure
  • Focused a lot on the Middle East, but also hit Europe, North America, and Asia
  • Used a mix of custom tools and off-the-shelf remote access tools (RATs)
  • Relied heavily on phishing (often with malicious documents or links)

They are usually associated with:

  • Initial access via spear-phishing emails or compromised servers
  • PowerShell-heavy tooling and “living off the land” (abusing built-in Windows tools)
  • Backdoors with relatively simple but flexible command-and-control (C2) channels
  • Follow-on activities like data exfiltration, credential theft, and lateral movement

What this MuddyViper backdoor likely implies
Without seeing the ESET write-up, I can’t describe MuddyViper’s exact capabilities, but given MuddyWater’s track record, a new backdoor typically means:

  • Persistent remote access (C2 communication, command execution, file upload/download)
  • Capability to deploy additional tools or ransomware/wipers at a later stage
  • Focus on stealth and resiliency (multiple persistence methods, obfuscation, etc.)

It’s also notable (but not surprising) that:

  • Targets are in critical and sensitive sectors: academia, engineering, utilities, technology, transportation
  • There’s regional expansion: mainly Israel, but also at least one tech company in Egypt

If someone is worried they may be affected
For individuals or organizations concerned about this:

  • Check the full ESET report you linked: they usually publish indicators of compromise (IOCs) (hashes, domains, IPs, file names, registry keys).
  • Use those IOCs with:
    • Your EDR/AV solution (custom detection rules, if supported)
    • Network monitoring tools (block or monitor suspicious C2 infrastructure)
    • SIEM queries (to hunt for past activity)
  • Harden email and RDP exposure (MuddyWater often uses phishing and weak external services).
  • Ensure logging is enabled and centralized (PowerShell, WMI, process creation, and network connections).

For regular users on Windows
If you’re just a home user and not in one of the targeted sectors, risk is lower but good hygiene still matters:

  • Keep Windows and software fully up to date.
  • Use a reputable security suite with real-time protection.
  • Be especially careful with unsolicited email attachments or document macros.
  • If you suspect compromise, scan with:
    • Your main AV
    • An additional on-demand scanner (e.g. Microsoft Safety Scanner, ESET Online Scanner, Kaspersky Virus Removal Tool, etc.)

Next step
If you want, you can paste any IOCs, technical details, or screenshots from the ESET article here (sanitized), and I can help you interpret what they mean (e.g. what a specific registry key or command does). If this is about a real incident in your environment, it would be wise to also consult your security team / IR team, or if you’re a forum user just reading, keep an eye out for the full ESET research post and any YARA/Sigma rules they may publish.
 
The attacks also singled out one technology company based in Egypt.
Collateral damage

Injury Beat Up GIF by euphoria