In a report published on February 11, 2026, Palo Alto Networks' Unit 42 threat intelligence team has exposed a sophisticated and sustained cyber-espionage campaign against a national marine and energy company in the United Arab Emirates (U.A.E.). The campaign is attributed to Boggy Serpens, an advanced persistent threat (APT) group publicly tracked as MuddyWater. The operation spanned several months, from August 2025 to February 2026, and involved four distinct waves of attacks. A key tactic was the use of compromised email accounts from trusted government and corporate entities to deliver spear-phishing emails, thereby bypassing security filters. The attackers deployed a wide range of custom malware, including GhostBackDoor, Nuso, UDPGangster, and LampoRAT, demonstrating a mature and evolving toolset focused on long-term intelligence gathering from a high-value target in the energy sector.
The campaign's methodology highlights the maturity of the Boggy Serpens group. Their TTPs indicate a patient and persistent adversary.
Initial Access (T1566.003 - Spearphishing via Service): The core of their initial access strategy was not just spear-phishing, but spear-phishing from already-compromised, legitimate email accounts of other government and corporate entities. This abuse of trusted relationships is highly effective at bypassing both technical controls (spam filters, domain reputation) and human suspicion.
Execution & Persistence: Upon a successful phish, the group deployed its malware. The use of multiple, distinct malware families suggests a modular approach. They likely use a lightweight first-stage implant like Nuso or LampoRAT to establish a foothold and perform initial reconnaissance. These backdoors provide capabilities for command execution, file transfer, and basic system enumeration.
Command and Control (T1071.001 - Web Protocols): The backdoors used, such as Nuso (HTTP_VIP), communicate over standard web protocols (HTTP/HTTPS) to blend in with normal network traffic, making C2 detection more difficult. UDPGangster suggests the use of UDP for C2, which can be faster and harder to inspect than TCP.
Payload Deployment: More feature-rich implants like GhostBackDoor are likely deployed on high-value systems after the network has been mapped. This tool is probably used for the primary intelligence gathering and data exfiltration tasks.
The four distinct waves of attacks over six months show that the group is resilient. Even if one implant is detected and removed, they have the operational capacity to re-tool and re-engage the target with a different approach.
T1586.002 - Compromise Accounts: Email Accounts: To acquire the email accounts used for phishing.T1566.003 - Spearphishing via Service: The primary initial access vector.T1059.001 - PowerShell: MuddyWater is known to heavily use PowerShell for execution and fileless attacks.T1105 - Ingress Tool Transfer: To download their various malware families onto the compromised system.T1071.001 - Web Protocols: For C2 communication.T1573.001 - Encrypted Channel: Symmetric Cryptography: To protect C2 communications.The primary impact of this campaign is espionage. The compromise of a national marine and energy company can lead to the theft of sensitive intellectual property, proprietary operational data, geological survey information, and strategic business plans. This information can provide a significant economic and strategic advantage to the nation-state sponsoring the APT group. The long-term persistence achieved by the group means they could potentially have access to real-time operational data, which could be used for future disruptive or destructive attacks, particularly given the critical nature of the energy sector.
Iranian APT MuddyWater (Seedworm) expands targets to US critical infrastructure, deploying new backdoors 'Dindoor' and 'Fakeset' for espionage.
The Iranian APT group MuddyWater, also known as Seedworm, has expanded its operations, now targeting U.S. critical infrastructure including a bank, an airport, and a defense software supplier. This new campaign, active since February 2026, utilizes novel malware families: 'Dindoor,' a Deno-based backdoor, and 'Fakeset,' a Python-based backdoor. Attackers were also observed using the legitimate tool Rclone for data exfiltration to cloud storage. This represents an evolution in the group's toolset and a significant expansion of their targeting scope beyond the UAE energy sector, indicating increased threat to Western interests.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats