• Contact
  • privacy policy
Monday, June 23, 2025
  • Login
No Result
View All Result
The Daily Reports
loader-image
Washington D.C., US
11:31 pm,
30°C
69 %
Wind Gust: 0 mph
  • HOME
  • About Us
    • Daily Reports App
    • GET INVOLVED
  • MUSLIM BROTHERHOOD & TERRORISM
  • POLICY ANALYSIS
    • EXPERTS
    • COUNTRIES
      • Iran
      • US
      • Turkey
      • Israel
      • Qatar
      • Palestine
      • Egypt
      • Afghanistan
      • Germany
      • Iraq
      • Bahrian
      • Lebanon
      • Saudi Arabia
      • Syria
      • Yemen
      • Russia
  • PROGRAMS
  • Language
    • Español
    • En Français
    • بالعربي
    • English
  • HOME
  • About Us
    • Daily Reports App
    • GET INVOLVED
  • MUSLIM BROTHERHOOD & TERRORISM
  • POLICY ANALYSIS
    • EXPERTS
    • COUNTRIES
      • Iran
      • US
      • Turkey
      • Israel
      • Qatar
      • Palestine
      • Egypt
      • Afghanistan
      • Germany
      • Iraq
      • Bahrian
      • Lebanon
      • Saudi Arabia
      • Syria
      • Yemen
      • Russia
  • PROGRAMS
  • Language
    • Español
    • En Français
    • بالعربي
    • English
No Result
View All Result
The Daily Reports
No Result
View All Result
Home COUNTRIES Iran

Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks

by TheDailyReports
July 17, 2024
in Iran
0
Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks
0
SHARES
1.5k
VIEWS
Share on FacebookShare on TwitterLinkedin

The Iranian nation-state actor MuddyWater has been observed using a novel backdoor in a recent attack campaign, marking a departure from its usual method of deploying legitimate remote monitoring and management (RMM) software for persistent access. This shift has been reported by cybersecurity firms Check Point and Sekoia, who have named the new malware strain BugSleep and MuddyRot, respectively.

“Compared to previous campaigns, this time MuddyWater changed their infection chain and did not rely on the legitimate Atera remote monitoring and management tool (RMM) as a validator,” Sekoia stated in a report shared with The Hacker News. “Instead, we observed that they used a new and undocumented implant.”

Israeli cybersecurity company ClearSky first reported some elements of this campaign in June. The targets include countries such as Turkey, Azerbaijan, Jordan, Saudi Arabia, Israel, and Portugal.

MuddyWater, also known as Boggy Serpens, Mango Sandstorm, and TA450, is a state-sponsored threat actor affiliated with Iran’s Ministry of Intelligence and Security (MOIS). The group has consistently used spear-phishing lures in emails to deploy various RMM tools, including Atera Agent, RemoteUtilities, ScreenConnect, SimpleHelp, and Syncro.

In April, HarfangLab noted an increase in MuddyWater campaigns deploying Atera Agent since late October 2023, targeting businesses across Israel, India, Algeria, Turkey, Italy, and Egypt. The targeted sectors include airlines, IT companies, telecoms, pharmaceuticals, automotive manufacturing, logistics, travel, and tourism.

“MuddyWater places a high priority on gaining access to business email accounts as part of their ongoing attack campaigns,” the French cybersecurity firm stated. “These compromised accounts serve as valuable resources, enabling the group to enhance the credibility and effectiveness of their spear-phishing efforts, establish persistence within targeted organizations, and evade detection by blending in with legitimate network traffic.”

The latest attack chains continue this pattern, with compromised email accounts from legitimate companies sending spear-phishing messages that contain either a direct link or a PDF attachment pointing to an Egnyte subdomain, previously abused by the threat actor to propagate Atera Agent.

BugSleep, also known as MuddyRot, is an x64 implant developed in C with capabilities to download/upload arbitrary files to/from the compromised host, launch a reverse shell, and establish persistence. Communication with a command-and-control (C2) server occurs over a raw TCP socket on port 443.

“The first message sent to the C2 is the victim host fingerprint, which is the combination of the hostname and the username joined by a slash,” Sekoia reported. “If the victim received ‘-1,’ the program stops, otherwise the malware enters an infinite loop to await new orders from the C2.”

The reason for MuddyWater’s switch to a bespoke implant remains unclear, although increased monitoring of RMM tools by security vendors may have influenced this change.

“The increased activity of MuddyWater in the Middle East, particularly in Israel, highlights the persistent nature of these threat actors, who continue to operate against a wide variety of targets in the region,” Check Point noted. “Their consistent use of phishing campaigns, now incorporating a custom backdoor, BugSleep, marks a notable development in their techniques, tactics, and procedures (TTPs).”

Tags: BugSleepIranITMiddle EastMuddyWaterUSA

TheDailyReports

Next Post
Tennessee Man Who Attempted to Support ISIS Learns His Prison Fate

Tennessee Man Who Attempted to Support ISIS Learns His Prison Fate

Recommended

Defense contractor pleads guilty to sharing classified info

Defense contractor pleads guilty to sharing classified info

4 years ago
Soleimani’s son-in-law using

Soleimani’s son-in-law using civilian flights to smuggle weapons to Hezbollah

3 years ago

Recent News

New US sanctions aim at Houthi financial network

July 26, 2024

Radical UK Islamist preacher Choudary found guilty of terrorism offenses

July 26, 2024
UAE Court Convicts Over 50 People on Terrorism Charges

UAE Court Convicts Over 50 People on Terrorism Charges

July 22, 2024
Tennessee Man Who Attempted to Support ISIS Learns His Prison Fate

Tennessee Man Who Attempted to Support ISIS Learns His Prison Fate

July 19, 2024

Connect with us

Subscribe Us

Category

  • Afghanistan
  • Bahrian
  • COP28
  • COUNTRIES
  • Egypt
  • EXPERTS
  • Germany
  • GET INVOLVED
  • Iran
  • Iraq
  • Israel
  • Lebanon
  • Libya
  • Movie
  • MUSLIM BROTHERHOOD & TERRORISM
  • Palestine
  • POLICY ANALYSIS
  • Politics
  • PROGRAMS
  • Qatar
  • Russia
  • Saudi Arabia
  • Syria
  • Turkey
  • Uncategorized
  • US
  • US elections 2020
  • World
  • Yemen

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

Get the latest breaking and in-depth news,headlines,photos and videos on radical Islamic terrorist groups. Your input is vital. For any information,ideas,opinions contact us or write us at: info@thedailyreports.com

Our Links

  • Contact
  • privacy policy
  • HOME
  • About Us
  • MUSLIM BROTHERHOOD & TERRORISM
  • POLICY ANALYSIS
  • PROGRAMS
  • Language

© 2021 - 2022 The Daily Reports - All Right reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • About Us
    • Daily Reports App
    • GET INVOLVED
  • MUSLIM BROTHERHOOD & TERRORISM
  • POLICY ANALYSIS
    • EXPERTS
    • COUNTRIES
      • Iran
      • US
      • Turkey
      • Israel
      • Qatar
      • Palestine
      • Egypt
      • Afghanistan
      • Germany
      • Iraq
      • Bahrian
      • Lebanon
      • Saudi Arabia
      • Syria
      • Yemen
      • Russia
  • PROGRAMS
  • Language
    • Español
    • En Français
    • بالعربي
    • English

© 2021 - 2022 The Daily Reports - All Right reserved