Boggy Serpens (MuddyWater) APT Targets UAE Energy Firm in Sustained Espionage Campaign

Palo Alto Networks' Unit 42 Uncovers Sustained Campaign by Boggy Serpens APT Against UAE Marine and Energy Company

HIGH
February 11, 2026
March 7, 2026
6m read
Threat ActorCyberattackThreat Intelligence

Related Entities(initial)

Threat Actors

Boggy SerpensMuddyWater

Organizations

Palo Alto NetworksUnit 42

Other

GhostBackDoorLampoRATNusoUDPGangster

Full Report(when first published)

Executive Summary

In a report published on February 11, 2026, Palo Alto Networks' Unit 42 threat intelligence team has exposed a sophisticated and sustained cyber-espionage campaign against a national marine and energy company in the United Arab Emirates (U.A.E.). The campaign is attributed to Boggy Serpens, an advanced persistent threat (APT) group publicly tracked as MuddyWater. The operation spanned several months, from August 2025 to February 2026, and involved four distinct waves of attacks. A key tactic was the use of compromised email accounts from trusted government and corporate entities to deliver spear-phishing emails, thereby bypassing security filters. The attackers deployed a wide range of custom malware, including GhostBackDoor, Nuso, UDPGangster, and LampoRAT, demonstrating a mature and evolving toolset focused on long-term intelligence gathering from a high-value target in the energy sector.


Threat Overview

  • Threat Actor: Boggy Serpens (also known as MuddyWater, linked to Iran's Ministry of Intelligence and Security).
  • Target: A national marine and energy company in the U.A.E.
  • Timeline: August 16, 2025 – February 11, 2026.
  • Objective: Cyber-espionage and long-term intelligence gathering.
  • Key Tactic: Use of compromised email accounts from trusted third parties for spear-phishing.
  • Malware Arsenal:
    • GhostBackDoor
    • Nuso (also called HTTP_VIP)
    • UDPGangster
    • LampoRAT (also called CHAR)

Technical Analysis

The campaign's methodology highlights the maturity of the Boggy Serpens group. Their TTPs indicate a patient and persistent adversary.

  1. Initial Access (T1566.003 - Spearphishing via Service): The core of their initial access strategy was not just spear-phishing, but spear-phishing from already-compromised, legitimate email accounts of other government and corporate entities. This abuse of trusted relationships is highly effective at bypassing both technical controls (spam filters, domain reputation) and human suspicion.

  2. Execution & Persistence: Upon a successful phish, the group deployed its malware. The use of multiple, distinct malware families suggests a modular approach. They likely use a lightweight first-stage implant like Nuso or LampoRAT to establish a foothold and perform initial reconnaissance. These backdoors provide capabilities for command execution, file transfer, and basic system enumeration.

  3. Command and Control (T1071.001 - Web Protocols): The backdoors used, such as Nuso (HTTP_VIP), communicate over standard web protocols (HTTP/HTTPS) to blend in with normal network traffic, making C2 detection more difficult. UDPGangster suggests the use of UDP for C2, which can be faster and harder to inspect than TCP.

  4. Payload Deployment: More feature-rich implants like GhostBackDoor are likely deployed on high-value systems after the network has been mapped. This tool is probably used for the primary intelligence gathering and data exfiltration tasks.

The four distinct waves of attacks over six months show that the group is resilient. Even if one implant is detected and removed, they have the operational capacity to re-tool and re-engage the target with a different approach.

MITRE ATT&CK Mapping


Impact Assessment

The primary impact of this campaign is espionage. The compromise of a national marine and energy company can lead to the theft of sensitive intellectual property, proprietary operational data, geological survey information, and strategic business plans. This information can provide a significant economic and strategic advantage to the nation-state sponsoring the APT group. The long-term persistence achieved by the group means they could potentially have access to real-time operational data, which could be used for future disruptive or destructive attacks, particularly given the critical nature of the energy sector.

Detection & Response

  • Enhanced Email Scrutiny: Do not automatically trust emails, even if they come from a known partner or government entity. Pay close attention to emails that have an unusual tone, unexpected attachments, or links that deviate from normal business correspondence.
  • Monitor for Malware Artifacts: Use the IOCs and detection signatures provided by Unit 42 to hunt for GhostBackDoor, Nuso, and LampoRAT in your environment.
  • Network Egress Filtering: MuddyWater often uses common ports like 80, 443, and 53 for C2. Monitor for anomalous or long-lived connections on these ports, especially from servers.
  • PowerShell Logging: Enable enhanced PowerShell logging (Module, Script Block, and Transcription) and forward logs to a SIEM. Hunt for obfuscated or suspicious PowerShell commands, a key part of MuddyWater's playbook.

Mitigation

  1. Email Security: Implement advanced email security solutions that can detect impersonation and analyze link/attachment behavior, rather than just relying on sender reputation.
  2. User Training: Train users to be suspicious of emails that create a sense of urgency or are unexpected, regardless of the sender. Encourage a 'verify by phone' culture for unusual requests.
  3. Network Segmentation: Segment networks to prevent attackers from moving laterally from a less-sensitive system to critical operational technology (OT) or engineering networks.
  4. Application Control: Use application allowlisting to prevent the execution of unauthorized malware like the various backdoors used in this campaign.

Timeline of Events

1
August 16, 2025
The Boggy Serpens campaign against the UAE energy company begins.
2
February 11, 2026
New activity from the Boggy Serpens campaign is observed, and Palo Alto Networks releases its report.
3
February 11, 2026
This article was published

Article Updates

March 7, 2026

Severity increased

Iranian APT MuddyWater (Seedworm) expands targets to US critical infrastructure, deploying new backdoors 'Dindoor' and 'Fakeset' for espionage.

The Iranian APT group MuddyWater, also known as Seedworm, has expanded its operations, now targeting U.S. critical infrastructure including a bank, an airport, and a defense software supplier. This new campaign, active since February 2026, utilizes novel malware families: 'Dindoor,' a Deno-based backdoor, and 'Fakeset,' a Python-based backdoor. Attackers were also observed using the legitimate tool Rclone for data exfiltration to cloud storage. This represents an evolution in the group's toolset and a significant expansion of their targeting scope beyond the UAE energy sector, indicating increased threat to Western interests.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APTBoggy SerpensCyber EspionageEnergy SectorMalwareMuddyWaterThreat ActorUAE

📢 Share This Article

Help others stay informed about cybersecurity threats