MuddyWater
Description
MuddyWater is a government-sponsored advanced persistent threat (APT) actor. Since 2018, it has been working under the Iranian Ministry of Intelligence and Security (MOIS). The group conducts cyber espionage attacks against both public and private sectors such as defense, energy, and telecommunications. MuddyWater has also used ransomware in certain campaigns as well as distributing legitimate remote administration and management tools.
Once inside the target’s network, MuddyWater steals data and provides backdoor access to operatives. The group sometimes shares these with other threat actors. MuddyWater prefers to use spear phishing tactics and exploit known vulnerabilities to gain initial access to a targeted network.
On March 2 2026, Operation Epic Fury a joint coordinated strike on Iran conducted by the United States and Israel commenced. We are monitoring for developments and will update the Threat Actor profile with rolling updates.
Added to Known Tools Used Section:
CHAR, GhostFetch, GhostBackDoor, HTTP_VIP
Associated Threat Actors
CyberAv3ngers
https://www.fortiguard.com/threat-actor/5562/cyberav3ngers
Handala Hack Team
https://www.fortiguard.com/threat-actor/6378/handala
Fox Kitten
https://www.fortiguard.com/threat-actor/5570
Oilrig
Aliases
- TA450
- Earth Vetala
- Mango Sandstorm
- MERCURY
- Seedworm
- ITG17
- MuddyWater
- Static Kitten
- Temp.Zagros
Common Vulnerabilities and Exposures
Targeted Industries
- Aerospace & Defense
- Education
- Energy
- Utilities & Waste
- Government
- Healthcare
- Media & Internet
- Telecommunications
- Transportation
- IT
- SMBs
Objectives
Cyberespionage
Known Tools Used
- BugSleep
- Canopy
- POWERSTATS
- PowGoop
- Small Sieve
- Mori
- Survey Script
- SyncroRAT
- Atera
- ScreenConnect
- Rport
- eHorus
- RemoteUtilities
- Mimikatz
- Meterpreter
- LaZagne
- PowerShell
- PRB-Backdoor
- Blackout
- AnchorRat
- CannonRat
- Neshta
- Sad C2
- TreasureBox
- BlackPearl
- HAVOC
- CobaltStrike
- CrackMapExec
- Ligolo
- SharpChisel
- Hidec
- Nping
- LSASS Dumper
- Password Dumper
- ProcDump
- MiniDump
- SOCKS5 Proxy Server
- CHAR
- GhostFetch
- GhostBackDoor
- HTTP_VIP
- Phoenix
Known Infection Vectors
- DLL side-loading through legitimate programs
- Spear phishing
- CVE-2017-0199
- CVE-2020-1472 (ZeroLogon)
- Exploitation of publicly known vulnerabilities
References
Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks (CISA)
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-055a
MAR–10369127–1.v1 – MuddyWater (CISA)
https://www.cisa.gov/news-events/analysis-reports/ar22-055a
Iranian intel cyber suite of malware uses open source tools (USCYBERCOM)
https://www.cybercom.mil/Media/News/Article/2897570/iranian-intel-cyber-suite-of-malware-uses-open-source-tools/
MuddyWater (MITRE)
https://attack.mitre.org/groups/G0069/
Technological Advancement and Evolution of MuddyWater in 2024 (Israel National Cyber Directorate)
https://www.gov.il/en/pages/maddy_water_2024