Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»MuddyWater Uses Compromised Mailboxes in Global Phishing Campaign
News

MuddyWater Uses Compromised Mailboxes in Global Phishing Campaign

Team-CWDBy Team-CWDOctober 22, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new phishing campaign leveraging compromised email accounts to distribute malware has been uncovered by cybersecurity researchers.

The espionage operation, attributed by Group-IB with high confidence to the Iran-linked threat actor MuddyWater, targeted international organizations across multiple regions to gather foreign intelligence.

Phishing Through Trusted Channels

The campaign used a compromised mailbox accessed via NordVPN, a legitimate service misused to disguise the attacker’s identity. MuddyWater then sent phishing emails that mimicked authentic correspondence, exploiting trust to increase the likelihood of victims opening attachments.

The attachments, malicious Microsoft Word documents, urged recipients to enable macros. Once activated, the macros executed embedded Visual Basic code that dropped and launched version 4 of the Phoenix backdoor, providing attackers with remote control over infected systems.

“The incident underscores how state-backed Threat Actors continue to exploit trusted channels of communication to evade defenses and infiltrate high-value targets,” Group-IB wrote in their advisory, published today.

Advanced Malware and Toolset

Phoenix v4 introduced an updated persistence mechanism, allowing MuddyWater to maintain control even after reboots. The malware gathers system details, modifies registry keys and connects to a command-and-control (C2) server for instructions.

Investigators also found three remote monitoring and management (RMM) tools, PDQ, Action1 and ScreenConnect, alongside a custom browser credential stealer dubbed Chromium_Stealer. This tool masqueraded as a calculator app while harvesting login data from browsers, including Chrome, Edge, Opera and Brave.

Read more on cyber-espionage trends targeting international organizations: Chinese Cyber Espionage Jumps 150%, CrowdStrike Finds

The C2 infrastructure used in the operation was registered under the domain screenai[.]online, hosted via CloudFlare and briefly active in August 2025.

Analysis revealed the real IP address (159[.]198[.]36[.]115) was linked to NameCheap’s servers and used a temporary Python-based HTTP service to host malware and RMM utilities.

Group-IB connected this campaign to MuddyWater based on overlapping code, domain infrastructure and malware samples previously associated with the group. The targeting patterns, particularly those involving humanitarian and governmental institutions, reflect the actor’s geopolitical objectives.

Defensive Recommendations

Organizations can reduce exposure to similar threats by adopting the following measures:

  • Disable Office macros by default and allow execution only from trusted sources

  • Deploy endpoint detection and response (EDR) tools to identify abnormal registry and process behavior

  • Conduct regular phishing simulations and staff awareness training

  • Monitor for indicators linked to Phoenix, FakeUpdate and related domains like screenai[.]online

“Given MuddyWater’s sustained focus on governmental targets especially amid the ongoing geopolitical tension in the region, [we] expect similar campaigns will continue to emerge, leveraging newly compromised accounts and evolving payloads,” Group-IB warned.

“Organizations, particularly those operating within government and critical infrastructure sectors, [should] strengthen their defenses against MuddyWater and similar state-aligned actors.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions
Next Article How it preys on personal data – and how to stay safe
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

What is it, and how do I get it off my device?

September 11, 2025

Find your weak spots before attackers do

November 21, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.