Threats Feed|MuddyWater|Last Updated 08/04/2026|AuthorCertfa Radar|Publish Date04/12/2025

MuddyWater Targets Israeli Organizations with Custom BlackBeard Backdoor

  • Actor Motivations: Espionage,Exfiltration
  • Attack Vectors: Backdoor,Downloader,Malicious Macro,Malware,Phishing,Spear Phishing
  • Attack Complexity: Medium
  • Threat Risk: Low Impact/Low Probability

Threat Overview

The Iranian threat group MuddyWater recently launched highly targeted phishing campaigns against Israeli organizations, utilizing compromised corporate email accounts to distribute malicious macro-enabled Word documents. The attacks rely on localized social engineering, featuring tailored Hebrew content, legitimate branding, and lookalike domains. Upon execution, the campaign deploys "BlackBeard," a custom Rust-based backdoor capable of EDR evasion, system reconnaissance, and downloading additional payloads via encrypted HTTPS channels. Persistence is achieved through stealthy file association hijacking. The threat actors then leverage the newly compromised accounts to conduct internal spearphishing, enabling rapid lateral movement. This campaign demonstrates MuddyWater's persistent cyber espionage efforts and sophisticated tactical adaptations.

Detected Targets

TypeDescriptionConfidence
RegionIsrael
Verified

FAQs

Understanding the Recent Phishing Campaign

A widespread phishing campaign recently compromised various organizational email systems. Attackers used these legitimate accounts to send deceptive messages containing a hidden, custom-built malicious program. Once a user opened the attached document, the program secretly installed itself on their computer.

The campaign is attributed to a threat group known as MuddyWater. This group operates under the Iranian government and has been active since 2017. They are well-known for conducting long-term cyber espionage operations.

The primary goal was to secretly install a backdoor program onto organizational computers. This allowed the attackers to spy on the system, steal internal files, and spread their access further across the corporate network. It is a dedicated intelligence-gathering operation.

The attackers specifically targeted organizations located within Israel. They did not appear to target individuals randomly; instead, they customized their emails to match the specific business profiles of the organizations they were attempting to infiltrate.

The attackers sent emails disguised as standard business communications, such as invoices, often containing real organizational logos and localized language. If a user opened the attached document and clicked to enable its content, the malicious software silently installed itself and hid on the computer. The software then allowed the attackers to control the machine remotely.

Organizations in this region are highly attractive targets for intelligence gathering and espionage. The attackers seek long-term, hidden access to collect sensitive corporate, regional, and operational information for state-sponsored interests.

While the method of using compromised email accounts allows the attack to spread quickly from person to person, this is a highly targeted campaign. The attackers customized their tools, localized their messages, and specifically aimed their efforts at chosen regional organizations.

Organizations should train employees to critically evaluate all email attachments, even if they appear to come from a known colleague. Technical teams should restrict the ability of documents to run automatic code and monitor their networks for the specific hidden communication patterns used by the attackers.