Press ESC to close

APT Profile – MUDDYWATER

CategoryDetails
Threat ActorsMuddyWater (also known as MERCURY, Seedworm, Static Kitten, TEMP.Zagros, Earth Vetala), Iranian government-affiliated APT group.
Campaign OverviewEspionage-driven cyberattacks targeting victims in the Middle East, primarily using “Living off the Land” techniques with in-memory attack vectors to avoid detection.
Target Regions (Victims)Middle East (Saudi Arabia, UAE, Iraq), Pakistan, Israel, Turkey, Azerbaijan, India, Albania, Russia, USA, and others.
MethodologyUse of PowerShell-based attacks, in-memory exploits, phishing, remote management tools (Atera Agent, Screen Connect), and custom malware like BugSleep for remote command execution and file transfers.
Product TargetedOffice Suites, Operating Systems, Web Applications
Malware ReferenceBugSleep (backdoor), Thanos ransomware, POWERSTATS
Tools UsedSecure Sockets Funneling, Remadmin, Chisel, Quarks pwDump, PowGoop, Mimikatz, POWERSTATS, Thanos ransomware
Vulnerabilities ExploitedCVE-2017-0199, CVE-2020-1472, CVE-2017-11882, CVE-2017-0144, CVE-2017-17215, CVE-2014-8361
TTPsReconnaissance, Persistence, Privilege Escalation, Initial Access, Lateral Movement, Execution, Defense Evasion, Credential Access, Exfiltration
AttributionAttributed to MuddyWater, an APT group affiliated with the Iranian Government.
RecommendationsStrengthen cybersecurity defenses, improve detection of remote management tools, and ensure rapid updates to defenses against in-memory and fileless attacks.
SourceCYFIRMA

Read full article: Read More
Disclaimer: The above summary has been generated by an AI language model.

Leave a Reply

Your email address will not be published. Required fields are marked *