Threats Feed|MuddyWater|Last Updated 15/01/2026|AuthorCertfa Radar|Publish Date08/01/2026

MuddyWater Adopts Rust-Based RustyWater Implant in Middle East Espionage Campaign

  • Actor Motivations: Espionage
  • Attack Vectors: Backdoor,Malicious Macro,RAT,Trojan,Spear Phishing
  • Attack Complexity: Medium
  • Threat Risk: High Impact/Low Probability

Threat Overview

CloudSEK identified a spearphishing campaign attributed to the MuddyWater APT group targeting diplomatic, maritime, financial, telecom, education, and shipping sectors across the Middle East, including Turkmenistan, the UAE, and regional maritime organizations. The operation uses impersonated government and telecom emails to deliver malicious Word documents embedding obfuscated VBA macros. These macros drop and execute a Rust-based implant dubbed RustyWater, which provides asynchronous HTTP C2, registry persistence, anti-analysis features, and modular post-compromise capabilities. The shift from PowerShell and VBS loaders to a Rust RAT marks a significant evolution in MuddyWater’s tooling toward stealthier, long-term espionage operations.

Detected Targets

TypeDescriptionConfidence
SectorFinancial
Verified
SectorEducation
Verified
SectorPolitical
Verified
SectorTelecommunication
Verified
SectorTransportation
Verified
RegionIsrael
High
RegionTurkmenistan
Verified
RegionUnited Arab Emirates
Verified
RegionMiddle East Countries
Verified

Extracted IOCs

  • bootcamptg[.]org
  • stratioai[.]org
  • nomercys.it[.]com
  • 3d1e43682c4d306e41127ca91993c7befd6db626ddbe3c1ee4b2cf44c0d2fb43
  • 42ad0c70e997a268286654b792c7833fd7c6a2a6a80d9f30d3f462518036d04c
  • 7523e53c979692f9eecff6ec760ac3df5b47f172114286e570b6bba3b2133f58
  • 76aad2a7fa265778520398411324522c57bfd7d2ff30a5cfe6460960491bc552
  • a2001892410e9f34ff0d02c8bc9e7c53b0bd10da58461e1e9eab26bdbf410c79
  • c23bac59d70661bb9a99573cf098d668e9395a636dc6f6c20f92c41013c30be8
  • ddc6e6c76ac325d89799a50dffd11ec69ed3b5341740619b8e595b8068220914
  • e081bc408f73158c7338823f01455e4f5185a4365c8aad1d60d777e29166abbd
  • e61b2ed360052a256b3c8761f09d185dad15c67595599da3e587c2c553e83108
  • f38a56b8dc0e8a581999621eef65ef497f0ac0d35e953bd94335926f00e9464f
  • 159[.]198.66.153
  • 159[.]198.68.25
  • 161[.]35.228.250
download

Tip: 16 related IOCs (3 IP, 3 domain, 0 URL, 0 email, 10 file hash) to this threat have been found.

FAQs

What is RustyWater and Who is Behind It?

A sophisticated phishing campaign delivered a new type of malware, called RustyWater, to targets across the Middle East. This malware is used to spy on victim systems and maintain long-term access.

The campaign has been attributed to Muddy Water, a known state-backed hacking group linked to Iran. They are also known as Static Kitten or Mango Sandstorm.

The primary goal appears to be espionage — silently collecting information from diplomatic, telecom, maritime, and financial entities, as well as maintaining long-term system access.

Attackers used fake emails impersonating official institutions. Victims who opened the attached Word file unknowingly executed malicious code that installed the RustyWater malware.

Unlike earlier tools used by this group, RustyWater is written in Rust, making it stealthier and more modular. It can expand its spying capabilities over time without being easily detected.

Organizations in UAE, Turkmenistan, and other Middle Eastern countries were targeted, including financial institutions, government agencies, and telecom providers.

These sectors often hold sensitive geopolitical, economic, or diplomatic data, making them valuable targets for state-backed cyber operations.

Be cautious with unexpected email attachments, especially from unknown senders. Implement endpoint monitoring, watch for suspicious registry changes, and inspect unusual network activity like repeated failed connections or encrypted traffic from unknown processes.

It’s a targeted campaign focused on specific high-value sectors, but the techniques used can potentially be reused elsewhere, making wider vigilance necessary.