Phishing campaign across Mideast, North Africa is attributed to Iranian group
伊朗黑客组织MuddyWater发起大规模网络钓鱼攻击,针对中东和北非的政府机构及国际组织。攻击利用被入侵邮箱发送恶意邮件,附件中的宏激活后安装Phoenix后门程序。该程序可收集系统信息及用户凭证,帮助黑客进行间谍活动。攻击混合使用政府和私人邮箱地址,并针对国际合作及人道主义组织展开行动,显示其更广泛的地缘政治动机。 2025-10-23 13:16:10 Author: therecord.media(查看原文) 阅读量:5 收藏

A state-sponsored Iranian hacking group known as MuddyWater has been linked to a large-scale phishing campaign targeting more than 100 government entities and international organizations across the Middle East and North Africa.

The campaign — attributed by cybersecurity firm Group-IB to MuddyWater — used a compromised email account to distribute an updated version of the Phoenix backdoor, a piece of Windows malware that allows remote control and data collection from infected systems.

According to Group-IB, the hackers gained access to the mailbox by abusing the virtual private network (VPN) service NordVPN and sending emails with malicious Microsoft Word attachments. When opened, the files prompted recipients to “enable content,” activating Windows macros that installed the Phoenix backdoor.

Active since at least April, Phoenix can collect system information such as computer names, Windows versions, and user credentials, giving attackers persistent access for espionage.

Researchers said MuddyWater mixed official government email addresses with personal ones from services like Yahoo and Gmail — a sign that the hackers had done careful research on their targets. The campaign also targeted global organizations involved in international cooperation and humanitarian work, underscoring what analysts described as the group’s “broader geopolitical motivations.”

“This campaign highlights MuddyWater’s evolving tradecraft and operational maturity,” Group-IB said, adding that further activity is likely amid ongoing regional tensions.

MuddyWater, also tracked as TA450 and Seedworm, has been active since at least 2017 and is believed to operate under Iran’s Ministry of Intelligence and Security. The group is known for using phishing to compromise government, energy, telecommunications and other critical infrastructure sectors across the Middle East, South Asia, and NATO countries — focusing on long-term intelligence collection rather than financial gain.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.


文章来源: https://therecord.media/iran-muddywater-phishing-campaign-north-africa-middle-east
如有侵权请联系:admin#unsafe.sh