In a report published on February 11, 2026, Palo Alto Networks' Unit 42 threat intelligence team has exposed a sophisticated and sustained cyber-espionage campaign against a national marine and energy company in the United Arab Emirates (U.A.E.). The campaign is attributed to Boggy Serpens, an advanced persistent threat (APT) group publicly tracked as MuddyWater. The operation spanned several months, from August 2025 to February 2026, and involved four distinct waves of attacks. A key tactic was the use of compromised email accounts from trusted government and corporate entities to deliver spear-phishing emails, thereby bypassing security filters. The attackers deployed a wide range of custom malware, including GhostBackDoor, Nuso, UDPGangster, and LampoRAT, demonstrating a mature and evolving toolset focused on long-term intelligence gathering from a high-value target in the energy sector.
The campaign's methodology highlights the maturity of the Boggy Serpens group. Their TTPs indicate a patient and persistent adversary.
Initial Access (T1566.003 - Spearphishing via Service): The core of their initial access strategy was not just spear-phishing, but spear-phishing from already-compromised, legitimate email accounts of other government and corporate entities. This abuse of trusted relationships is highly effective at bypassing both technical controls (spam filters, domain reputation) and human suspicion.
Execution & Persistence: Upon a successful phish, the group deployed its malware. The use of multiple, distinct malware families suggests a modular approach. They likely use a lightweight first-stage implant like Nuso or LampoRAT to establish a foothold and perform initial reconnaissance. These backdoors provide capabilities for command execution, file transfer, and basic system enumeration.
Command and Control (T1071.001 - Web Protocols): The backdoors used, such as Nuso (HTTP_VIP), communicate over standard web protocols (HTTP/HTTPS) to blend in with normal network traffic, making C2 detection more difficult. UDPGangster suggests the use of UDP for C2, which can be faster and harder to inspect than TCP.
Payload Deployment: More feature-rich implants like GhostBackDoor are likely deployed on high-value systems after the network has been mapped. This tool is probably used for the primary intelligence gathering and data exfiltration tasks.
The four distinct waves of attacks over six months show that the group is resilient. Even if one implant is detected and removed, they have the operational capacity to re-tool and re-engage the target with a different approach.
T1586.002 - Compromise Accounts: Email Accounts: To acquire the email accounts used for phishing.T1566.003 - Spearphishing via Service: The primary initial access vector.T1059.001 - PowerShell: MuddyWater is known to heavily use PowerShell for execution and fileless attacks.T1105 - Ingress Tool Transfer: To download their various malware families onto the compromised system.T1071.001 - Web Protocols: For C2 communication.T1573.001 - Encrypted Channel: Symmetric Cryptography: To protect C2 communications.The primary impact of this campaign is espionage. The compromise of a national marine and energy company can lead to the theft of sensitive intellectual property, proprietary operational data, geological survey information, and strategic business plans. This information can provide a significant economic and strategic advantage to the nation-state sponsoring the APT group. The long-term persistence achieved by the group means they could potentially have access to real-time operational data, which could be used for future disruptive or destructive attacks, particularly given the critical nature of the energy sector.
Iranian APT MuddyWater (Seedworm) expands targets to US critical infrastructure, deploying new backdoors 'Dindoor' and 'Fakeset' for espionage.
Implement advanced email security that performs deep content inspection and sandboxing, as sender reputation alone is insufficient against this TTP.
Mapped D3FEND Techniques:
Use application control to prevent the execution of unauthorized backdoors. Restricting PowerShell execution to signed scripts and constrained language mode can also be effective.
Mapped D3FEND Techniques:
Use a proxy and egress filtering to block C2 traffic. Deny all outbound traffic by default and only allow connections to known-good locations.
Mapped D3FEND Techniques:
Train employees to recognize the signs of a sophisticated spear-phishing attack, even when it appears to come from a trusted sender.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats