Iran-Linked MuddyWater APT Targets Israel with New 'MuddyViper' Backdoor

MuddyWater APT Campaign Deploys New 'MuddyViper' Backdoor Against Critical Infrastructure in Israel and Egypt

HIGH
December 2, 2025
6m read
Threat ActorMalwareCyberattack

Related Entities

Threat Actors

Organizations

Iran's Ministry of Intelligence and Security (MOIS)ESET

Products & Tech

SyncroPDQ

Other

MuddyViperFooderCE-NotesBlub

Full Report

Executive Summary

ESET researchers have uncovered a new cyberespionage campaign attributed to the Iran-aligned advanced persistent threat (APT) group MuddyWater (also known as Mango Sandstorm, TA450). The campaign, active between September 2024 and March 2025, targeted a wide range of critical sectors in Israel and Egypt. The threat actors deployed a new, custom C/C++ backdoor named MuddyViper, delivered via a loader named Fooder. This campaign highlights the group's evolving toolset and its continued focus on intelligence gathering against strategic targets in the Middle East. Evidence also suggests MuddyWater may be acting as an initial access broker for other Iranian APTs, such as Lyceum.


Threat Overview

MuddyWater, assessed to be subordinate to Iran's Ministry of Intelligence and Security (MOIS), has a long history of targeting entities in the Middle East, Europe, and North America. This latest campaign focused on organizations in Israel and Egypt across sectors including technology, engineering, local government, manufacturing, and universities. The primary goal appears to be espionage and establishing long-term persistence within target networks.

The initial access vector often involved social engineering, tricking users into executing the Fooder loader, which was sometimes disguised as a legitimate-looking application like the classic Snake game.

Technical Analysis

The attack chain involves several custom tools:

  • Fooder Loader: A custom loader responsible for deploying the main payload. In some cases, it used reflective loading to execute MuddyViper directly in memory, a technique used to evade detection by security products that scan for malicious files on disk.
  • MuddyViper Backdoor: A previously unseen backdoor written in C/C++. It provides the attackers with a range of capabilities, including:
    • System information gathering
    • Credential and browser data theft
    • Remote command execution
    • File exfiltration
  • Credential Stealers: The attackers also deployed several tools to harvest credentials, including CE-Notes and Blub, which target data from Chromium-based browsers, Firefox, and Opera.
  • Legitimate RMM Tools: Consistent with past MuddyWater operations, the group also leveraged legitimate Remote Monitoring and Management (RMM) software like Syncro and PDQ for persistence and lateral movement, blending their traffic with normal administrative activity.

MITRE ATT&CK Techniques

Impact Assessment

The campaign represents a significant intelligence-gathering effort against critical sectors in Israel and Egypt. The compromise of these networks could provide the Iranian government with sensitive information for strategic advantage. The observed operational overlap with the Lyceum (OilRig) group, where MuddyWater appeared to facilitate initial access, suggests a coordinated and tiered structure among Iranian state-sponsored hacking units, increasing their overall effectiveness and operational capacity.

Detection & Response

  1. Monitor for RMM Tools: Monitor for and alert on the installation and use of legitimate RMM tools like Syncro and PDQ, especially if they are not standard-issue software in your environment.
  2. Memory Analysis: Use Endpoint Detection and Response (EDR) tools capable of memory scanning to detect signs of reflective loading and in-memory-only malware.
  3. Network Traffic Analysis: Look for C2 communications to infrastructure known to be associated with MuddyWater. Block suspicious outbound connections from sensitive systems.
  4. Executable Auditing: Audit the execution of unsigned or unusual executables, particularly those with generic names or icons designed to mimic legitimate software.

Relevant D3FEND techniques:

Mitigation

  • D3-EAL - Executable Allowlisting: Implement application control policies to prevent the execution of unauthorized software, including unknown games or tools.
  • User Training: Educate users to be skeptical of unsolicited attachments and executables, even if they appear benign.
  • Restrict RMM Software: Tightly control and monitor the use of RMM software. If not required for business operations, block it entirely.
  • Network Segmentation: Segment networks to limit lateral movement, preventing an initial compromise on a less sensitive machine from spreading to critical infrastructure.

Timeline of Events

1
September 30, 2024
The MuddyViper campaign against targets in Israel and Egypt begins.
2
February 1, 2025
MuddyWater was observed acting as an initial access broker for the Lyceum APT group.
3
March 18, 2025
The observed activity for the MuddyViper campaign concludes.
4
December 2, 2025
This article was published

MITRE ATT&CK Mitigations

Use application allowlisting to prevent the execution of unauthorized and malicious software like the Fooder loader.

Train users to identify and report suspicious files and social engineering attempts.

Restrict or block the use of legitimate RMM tools that are not required for business purposes to reduce the attack surface.

Filter network traffic to block connections to known malicious C2 infrastructure.

Sources & References

MuddyWater: Snakes by the riverbank
ESET (welivesecurity.com) December 2, 2025
MuddyWater strikes Israel with advanced MuddyViper malware
Security Affairs (securityaffairs.co) December 2, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

MuddyWaterIranAPTespionageMuddyViperIsraelcritical infrastructure

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading