HomeCII/OTIranian Threat Group Releases New Backdoor, 'BugSleep'

Iranian Threat Group Releases New Backdoor, ‘BugSleep’

Published on

spot_img

An Iranian cyber-espionage group known as MuddyWater has recently made a significant change in its tactics, moving away from using legitimate remote-management software to control infected systems and instead implementing a custom-made backdoor implant. This shift in strategy was noted by security researchers from Sekoia and Check Point Software.

Previously, MuddyWater would infect systems by either targeting Internet-exposed servers or through spear phishing. This would ultimately lead to the installation of remote management platforms such as SimpleHelp or Atera. However, in June, the group transitioned to a new attack chain. They began sending out malicious PDF files with embedded links that would direct users to a file stored on the Egnyte service. This file would then install the new backdoor, which has been named MuddyRot by Sekoia.

Check Point Software has identified this new backdoor implant as BugSleep, which MuddyWater has been using since May. According to Sergey Shykevich, the threat intelligence group manager at Check Point Software, MuddyWater has been actively improving BugSleep by adding new features and fixing bugs. However, in the rush to make this transition, the group may have released an incomplete version of the malware.

The MuddyWater threat group, which is believed to be part of the Iranian Ministry of Intelligence and Security (MOIS), has been conducting malicious cyber attacks since at least 2018. Various government agencies and critical industries have been targeted by MuddyWater, as detailed in a 2022 advisory published jointly by US and UK government agencies. The group has also been referred to by other cybersecurity firms as Earth Vetala, MERCURY, Static Kitten, Seedworm, and TEMP.Zagros.

The BugSleep backdoor utilized by MuddyWater employs typical anti-analysis techniques such as delaying execution and encryption to avoid detection. However, there have been issues with the implementation of encryption, as well as other bugs in the code that indicate it is still under development. This is a departure from MuddyWater’s previous approach of using remote management software, such as their Powerstats backdoor written in PowerShell.

The decision to revert to using a homemade implant for their initial infection stage in at least one campaign remains a mystery. It is speculated that increased monitoring of remote management tools by security vendors may have influenced this change. Additionally, the use of file-sharing services like Egnyte to host malicious documents has become more popular among attackers, providing them with a platform during an attack.

The phishing campaigns conducted by MuddyWater have become more streamlined, focusing on generic themes such as webinars and online courses to send out a higher volume of attacks. Check Point Software describes their sophistication level as medium, but notes that they are highly persistent and aggressive in their targeting of specific sectors or organizations.

While MuddyWater is often identified as a single threat group, some researchers have described it as an “umbrella of APT groups.” The range of tactics employed by MuddyWater includes spear phishing, exploiting known vulnerabilities, and using open-source tools to gain access to sensitive networks. The group primarily targets organizations in Israel and Saudi Arabia but has also conducted attacks in other countries such as India, Jordan, Portugal, Turkey, and Azerbaijan.

In conclusion, MuddyWater’s shift towards using a custom-made backdoor implant and their ongoing development of malware indicates a willingness to adapt their tactics in response to increased scrutiny and monitoring by security researchers and vendors. Their continued focus on conducting cyber attacks in the Middle East and beyond underscores the persistent threat posed by this Iranian cyber-espionage group.

Source link

Latest articles

Study Reveals 87% of Organizations Vulnerable to Attacks from Known Issues

The recently released 2026 State of DevSecOps report has illuminated a pressing issue in...

Europol Targets The Com’s Ransomware and Extortion Networks

Global Law Enforcement Initiative Targets Decentralized Cyber Criminal Collective Law enforcement agencies spanning 28 countries...

Olympique de Marseille Cyberattack – CyberMaterial

Olympique de Marseille Thwarts Cyberattack During Training Break The Olympique de Marseille football club has...

Meta Strengthens Control Over Scam Advertisers

Meta Intensifies Legal Pursuits Against Scam Advertisers Globally Meta Platforms, the parent company of social...

More like this

Study Reveals 87% of Organizations Vulnerable to Attacks from Known Issues

The recently released 2026 State of DevSecOps report has illuminated a pressing issue in...

Europol Targets The Com’s Ransomware and Extortion Networks

Global Law Enforcement Initiative Targets Decentralized Cyber Criminal Collective Law enforcement agencies spanning 28 countries...

Olympique de Marseille Cyberattack – CyberMaterial

Olympique de Marseille Thwarts Cyberattack During Training Break The Olympique de Marseille football club has...