MuddyWater Cyber-Espionage Campaign Uses Compromised Mailbox and Macros to Deploy Phoenix v4 Backdoor

Iran's MuddyWater APT Targets 100+ Governments with Phoenix Backdoor

HIGH
October 22, 2025
October 24, 2025
6m read
Threat ActorCyberattackPhishing

Related Entities(initial)

Threat Actors

Organizations

Group-IB Iran's Ministry of Intelligence and Security (MOIS)Microsoft

Products & Tech

Other

Phoenix

Full Report(when first published)

Executive Summary

The Iranian state-sponsored Advanced Persistent Threat (APT) group MuddyWater has launched a significant cyber-espionage campaign targeting more than 100 government organizations, with a primary focus on the Middle East and North Africa (MENA) region. A report from Group-IB details how the threat actor, linked to Iran's Ministry of Intelligence and Security (MOIS), is using phishing emails to deliver version 4 of its Phoenix backdoor. The attack leverages a compromised mailbox for distribution and abuses the legitimate NordVPN service to conceal its origin, demonstrating a continued effort to infiltrate high-value government targets for intelligence collection purposes.


Threat Overview

The campaign, attributed to MuddyWater with high confidence by Group-IB, showcases a refined attack chain designed for stealth and persistence. The group, also known as Earth Vetala and Static Kitten, initiates the attack with spear-phishing emails that appear to be legitimate correspondence. These emails originate from a mailbox that MuddyWater had previously compromised, adding a layer of authenticity to the lure. The use of NordVPN to access this mailbox makes attribution and tracking more difficult for defenders.

The emails contain a malicious Microsoft Word document attachment. When a victim opens the document, they are prompted to enable macros to view the content. This social engineering tactic is a classic method that has seen a resurgence despite Microsoft's efforts to block macros by default.

Technical Analysis

The attack chain follows a well-defined sequence of TTPs:

  1. Initial Access: The campaign begins with T1566.001 - Spearphishing Attachment. The use of a compromised, legitimate mailbox enhances the credibility of the phishing lure.
  2. Execution: Once the victim enables macros (T1204.002 - Malicious File), a malicious Visual Basic for Application (VBA) script executes (T1059.005 - Visual Basic).
  3. Payload Delivery: The VBA code is responsible for downloading and installing the Phoenix backdoor on the victim's system.
  4. Persistence and C2: Version 4 of the Phoenix backdoor reportedly uses a new persistence technique, distinct from prior versions. It establishes a command-and-control channel to allow the attackers to exfiltrate data and issue further commands (T1071 - Application Layer Protocol).

Group-IB also found evidence suggesting the potential use of a new Remote Monitoring and Management (RMM) tool for T1219 - Remote Access Software and a custom browser credential stealer, indicating that MuddyWater continues to evolve its toolkit.

Impact Assessment

The primary objective of this campaign is cyber-espionage. The impact on the targeted government entities includes:

  • Intelligence Loss: The theft of sensitive government documents, diplomatic communications, and strategic information.
  • Long-Term Compromise: The Phoenix backdoor provides persistent access, allowing MuddyWater to maintain a long-term presence within the target network for continuous intelligence gathering.
  • Foundation for Future Attacks: The access and information gained could be used to facilitate more disruptive attacks or to compromise other related organizations.

Cyber Observables for Detection

Type
process_name
Value
WINWORD.EXE
Description
A Word process spawning child processes like powershell.exe or cmd.exe is a strong indicator of a malicious macro.
Type
network_traffic_pattern
Value
Outbound connections from internal government hosts to known NordVPN IP ranges.
Description
While not inherently malicious, this could be anomalous and warrants investigation in the context of this campaign.
Type
registry_key
Value
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Description
Monitor for new, suspicious entries used by malware for persistence.
Type
file_name
Value
Suspicious .docm or .doc files received from external sources.
Description
Files requiring macros to be enabled should be treated with extreme caution.

Detection & Response

  • Email Security Gateway: Configure email filters to block or quarantine attachments with macros, especially from external senders. Use D3FEND's D3-MFI - Message-based Filtering.
  • Endpoint Detection (EDR): Deploy EDR to monitor for suspicious process chains, such as WINWORD.EXE spawning powershell.exe. Create rules to alert on the execution of VBA scripts that write to disk or initiate network connections. This aligns with D3FEND's D3-PA - Process Analysis.
  • Network Monitoring: Monitor for and alert on network traffic to known anonymizing services like NordVPN from servers or sensitive workstations. While this can generate false positives, it's a valuable hunting starting point.

Mitigation

  1. Disable Macros: Implement a group policy to block all macros from Office files originating from the internet. This is the most effective defense against this attack vector (M1042 - Disable or Remove Feature or Program).
  2. User Training: Train users to be suspicious of any email, even those from seemingly trusted sources, that asks them to enable macros or open unexpected attachments (M1017 - User Training).
  3. Application Control: Use application control solutions to restrict the execution of unauthorized scripts and executables, preventing the Phoenix backdoor from running even if it is successfully dropped on a system (M1038 - Execution Prevention).
  4. Attack Surface Reduction: Implement Attack Surface Reduction (ASR) rules in Microsoft Defender to block Office applications from creating child processes.

Timeline of Events

1
October 22, 2025
Group-IB publishes its report on the new MuddyWater campaign targeting government entities.
2
October 22, 2025
This article was published

Article Updates

October 24, 2025

Iranian APT campaign targeting 100+ governments expands scope globally, now using credential spraying alongside phishing for initial access with its multi-stage Phoenix backdoor.

MITRE ATT&CK Mitigations

Block macros from running in Microsoft Office files that originate from the internet. This is the most direct countermeasure to this attack vector.

Mapped D3FEND Techniques:

Educate users to identify and report phishing emails, especially those that request enabling macros, even if they appear to come from a trusted source.

Restrict outbound network connections from endpoints to only what is required for business purposes, which can block C2 communications to unexpected services like NordVPN.

Mapped D3FEND Techniques:

Use EDR or ASR rules to block suspicious behaviors, such as Office applications spawning child processes.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The most effective countermeasure against this MuddyWater campaign is to harden Microsoft Office applications. Organizations should use Group Policy or Intune to enforce a strict macro security policy that blocks all macros from files downloaded from the internet. This neutralizes the primary execution vector used by the threat actor. Additionally, enable Attack Surface Reduction (ASR) rules, specifically the rule that 'blocks all Office applications from creating child processes.' This would prevent the malicious VBA code from successfully launching PowerShell or cmd.exe to download the Phoenix backdoor, breaking the attack chain at a critical point.

Deploy an Endpoint Detection and Response (EDR) solution and configure it for advanced process analysis. Create a specific detection rule to alert on any instance of WINWORD.EXE or other Office application processes spawning child processes like powershell.exe, cmd.exe, cscript.exe, or wscript.exe. This behavioral detection is highly effective at catching malicious macro execution. Correlating this process creation event with a network connection from the child process would create a high-fidelity alert, allowing security teams to immediately investigate and isolate the potentially compromised host.

Enhance email security gateway policies to aggressively filter messages containing macro-enabled attachments (.docm, .xlsm). While MuddyWater used a compromised mailbox to add legitimacy, the presence of a macro-enabled document from an external source should still be a major red flag. Configure the gateway to quarantine these attachments and require manual release by an administrator. Additionally, use sandboxing features to detonate attachments in a safe environment to observe their behavior before they reach the user's inbox. This provides a critical layer of defense before user interaction is even possible.

Timeline of Events

1
October 22, 2025

Group-IB publishes its report on the new MuddyWater campaign targeting government entities.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

MuddyWaterAPTIranPhoenixcyber-espionagephishingmacrosMENA

📢 Share This Article

Help others stay informed about cybersecurity threats