Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Iranian Hackers Target 100+ Gov't Org's with Phoenix Backdoor - News Directory 3

Iranian Hackers Target 100+ Gov’t Org’s with Phoenix Backdoor

October 23, 2025 Lisa Park Tech
News Context
At a glance
  • This report summarizes⁣ a recent ‌espionage campaign conducted by the ⁣state-sponsored Iranian hacker group MuddyWater‌ (also known as Static Kitten, Mercury, and Seedworm).
  • * ⁤ Targeted Entities: Over 100⁣ government entities, primarily embassies, diplomatic ⁣missions, ​foreign affairs ministries, and consulates in the Middle East and north Africa.
  • Threat Actor ‍Information: AttributeDetailsNameMuddyWater (Static ​Kitten, Mercury, Seedworm)SponsorshipIranian State-SponsoredRegion‍ of FocusMiddle East, North AfricaTypical⁢ Targetsgovernment and private organizations2.
Original source: bleepingcomputer.com

MuddyWater Campaign Analysis – October 2025

Signed – lisapark

This report summarizes⁣ a recent ‌espionage campaign conducted by the ⁣state-sponsored Iranian hacker group MuddyWater‌ (also known as Static Kitten, Mercury, and Seedworm).

Key Findings:

* ⁤ Targeted Entities: Over 100⁣ government entities, primarily embassies, diplomatic ⁣missions, ​foreign affairs ministries, and consulates in the Middle East and north Africa.
* Malware: Version 4 ‍of the Phoenix backdoor, delivered via malicious Word documents containing macro code.
* Initial access: Phishing campaign launched from a compromised NordVPN account ⁣starting August 19th.
* ⁢ C2 Infrastructure: Server-side command-and-control (C2) component taken down on August 24th, indicating a shift in tactics.
* ⁣ Persistence: Established through modification of⁣ the Windows Registry.

1. Threat Actor ‍Information:

Attribute Details
Name MuddyWater (Static ​Kitten, Mercury, Seedworm)
Sponsorship Iranian State-Sponsored
Region‍ of Focus Middle East, North Africa
Typical⁢ Targets government and private organizations

2. Campaign Details:

* ‌ Timeline: Campaign initiated August 19th, C2 takedown August‍ 24th.
* Delivery ‍Method: Phishing emails ⁢with malicious Word documents.
* malware Delivery: VBA macros within Word documents decode and write the ‘fakeupdate’ malware loader to disk.
* Malware Payload: Phoenix backdoor (AES-encrypted).
* Persistence Mechanism: modification of Windows​ Registry to configure shell execution on login.
* ⁢ File Path: C:ProgramDatasysprocupdate.exe

3.Attack Chain:

The observed attack chain is as follows:

Observed attack chain
Observed attack chain
Source: Group-IB

4. Targeted Regions:

The following image illustrates ‍the geographic distribution⁣ of targets:

Targets ‍of latest MuddyWaters campaign
Targets int the latest MuddyWaters campaign
Source: Group-IB

5.⁢ Technical Details:

* Macro Usage: MuddyWater has reverted to using macro-based attacks, despite Microsoft disabling automatic macro execution years ago. ​This suggests a reliance on social engineering to trick users into enabling content.
* ⁤ ClickFix: The group previously employed the ClickFix social engineering tactic.
* Phoenix Backdoor: The Phoenix backdoor is a key component ⁢of the campaign, decrypting an embedded, AES-encrypted payload.

6.​ References:

* Group-IB Report

* BleepingComputer – ClickFix

HARD ​STOP – END OF REPORT

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Disclaimer
  • Terms and Conditions
  • About Us
  • Advertising Policy
  • Contact Us
  • Cookie Policy
  • Editorial Guidelines
  • Privacy Policy

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service