The Iranian state-sponsored Advanced Persistent Threat (APT) group MuddyWater has launched a significant cyber-espionage campaign targeting more than 100 government organizations, with a primary focus on the Middle East and North Africa (MENA) region. A report from Group-IB details how the threat actor, linked to Iran's Ministry of Intelligence and Security (MOIS), is using phishing emails to deliver version 4 of its Phoenix backdoor. The attack leverages a compromised mailbox for distribution and abuses the legitimate NordVPN service to conceal its origin, demonstrating a continued effort to infiltrate high-value government targets for intelligence collection purposes.
The campaign, attributed to MuddyWater with high confidence by Group-IB, showcases a refined attack chain designed for stealth and persistence. The group, also known as Earth Vetala and Static Kitten, initiates the attack with spear-phishing emails that appear to be legitimate correspondence. These emails originate from a mailbox that MuddyWater had previously compromised, adding a layer of authenticity to the lure. The use of NordVPN to access this mailbox makes attribution and tracking more difficult for defenders.
The emails contain a malicious Microsoft Word document attachment. When a victim opens the document, they are prompted to enable macros to view the content. This social engineering tactic is a classic method that has seen a resurgence despite Microsoft's efforts to block macros by default.
The attack chain follows a well-defined sequence of TTPs:
T1566.001 - Spearphishing Attachment. The use of a compromised, legitimate mailbox enhances the credibility of the phishing lure.T1204.002 - Malicious File), a malicious Visual Basic for Application (VBA) script executes (T1059.005 - Visual Basic).T1071 - Application Layer Protocol).Group-IB also found evidence suggesting the potential use of a new Remote Monitoring and Management (RMM) tool for T1219 - Remote Access Software and a custom browser credential stealer, indicating that MuddyWater continues to evolve its toolkit.
The primary objective of this campaign is cyber-espionage. The impact on the targeted government entities includes:
process_nameWINWORD.EXEpowershell.exe or cmd.exe is a strong indicator of a malicious macro.network_traffic_patternregistry_keyHKCU\Software\Microsoft\Windows\CurrentVersion\Runfile_name.docm or .doc files received from external sources.D3-MFI - Message-based Filtering.WINWORD.EXE spawning powershell.exe. Create rules to alert on the execution of VBA scripts that write to disk or initiate network connections. This aligns with D3FEND's D3-PA - Process Analysis.M1042 - Disable or Remove Feature or Program).M1017 - User Training).M1038 - Execution Prevention).Iranian APT campaign targeting 100+ governments expands scope globally, now using credential spraying alongside phishing for initial access with its multi-stage Phoenix backdoor.
Block macros from running in Microsoft Office files that originate from the internet. This is the most direct countermeasure to this attack vector.
Mapped D3FEND Techniques:
Educate users to identify and report phishing emails, especially those that request enabling macros, even if they appear to come from a trusted source.
Restrict outbound network connections from endpoints to only what is required for business purposes, which can block C2 communications to unexpected services like NordVPN.
Mapped D3FEND Techniques:
Use EDR or ASR rules to block suspicious behaviors, such as Office applications spawning child processes.
Mapped D3FEND Techniques:
The most effective countermeasure against this MuddyWater campaign is to harden Microsoft Office applications. Organizations should use Group Policy or Intune to enforce a strict macro security policy that blocks all macros from files downloaded from the internet. This neutralizes the primary execution vector used by the threat actor. Additionally, enable Attack Surface Reduction (ASR) rules, specifically the rule that 'blocks all Office applications from creating child processes.' This would prevent the malicious VBA code from successfully launching PowerShell or cmd.exe to download the Phoenix backdoor, breaking the attack chain at a critical point.
Deploy an Endpoint Detection and Response (EDR) solution and configure it for advanced process analysis. Create a specific detection rule to alert on any instance of WINWORD.EXE or other Office application processes spawning child processes like powershell.exe, cmd.exe, cscript.exe, or wscript.exe. This behavioral detection is highly effective at catching malicious macro execution. Correlating this process creation event with a network connection from the child process would create a high-fidelity alert, allowing security teams to immediately investigate and isolate the potentially compromised host.
Enhance email security gateway policies to aggressively filter messages containing macro-enabled attachments (.docm, .xlsm). While MuddyWater used a compromised mailbox to add legitimacy, the presence of a macro-enabled document from an external source should still be a major red flag. Configure the gateway to quarantine these attachments and require manual release by an administrator. Additionally, use sandboxing features to detonate attachments in a safe environment to observe their behavior before they reach the user's inbox. This provides a critical layer of defense before user interaction is even possible.
Group-IB publishes its report on the new MuddyWater campaign targeting government entities.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats