MuddyWater, Seedworm, TEMP.Zagros, Static Kitten

Description

(Reaqta) MuddyWater is an APT group that has been active throughout 2017, targeting victims in Middle East with in-memory vectors leveraging on Powershell, in a family of attacks now identified as “Living off the land”, as they don’t require the creation of new binaries on the victim’s machine, thus maintaining a low detection profile and a low forensic footprint.

The operators behind MuddyWater are likely espionage motivated, we derive this information from the analysis of data and backdoors behaviors. We also find that despite the strong preponderance of victims from Pakistan, the most active targets appear to be in: Saudi Arabia, UAE and Iraq. Amongst the victims we identify a variety of entities with a stronger focus at Governments, Telcos and Oil companies.

By tracking the operations we finally figure out that the originating country is likely to be Iran, while it remains harder to ascertain whether MuddyWater is state sponsored or a criminal organization incline to espionage.

Names

NameName-Giver
MuddyWaterPalo Alto
SeedwormSymantec
TEMP.ZagrosFireEye
Static KittenCrowdStrike
MercuryMicrosoft
TA450Proofpoint
Cobalt UlsterSecureWorks
ATK 51Thales
T-APT-14Tencent
ITG17IBM
Mango SandstormMicrosoft
Boggy SerpensPalo Alto
Yellow NixPWC

Country

State-sponsored, IRGC (Islamic Republic Guard Corps)

Motivation

  • Information theft and espionage

First Seen

2017

Observed Sectors

Observed Countries

Tools

Operations

Counter Operations

Information

Mitre Attack

Playbook

Other Information

Uuid

0d5af1f9-fa2e-4ce9-a4ce-0c6fade938e9

Last Card Change

2024-08-26