Threats Feed|Madi|Last Updated 30/12/2025|AuthorCertfa Radar|Publish Date17/07/2012

Madi Espionage Campaign Targets Middle Eastern Governments and Critical Sectors

  • Actor Motivations: Espionage
  • Attack Vectors: Backdoor,Downloader,Dropper,Keylogger,Spyware,Trojan,Phishing,Spear Phishing
  • Attack Complexity: Low
  • Threat Risk: Low Impact/High Probability

Threat Overview

The Madi campaign is a long-running cyber espionage operation that has been active for nearly a year, targeting individuals and organizations primarily across Iran, Israel, Afghanistan, and other countries worldwide. The attackers relied on basic but effective social engineering techniques, including spearphishing emails with malicious PowerPoint slide shows and executables disguised using Right-to-Left Override (RTLO) filenames. Once executed, the Delphi-based malware enabled extensive surveillance through keylogging, screenshot capture, audio recording, and large-scale data theft. Victims included government agencies, critical infrastructure engineering firms, financial institutions, academia, and selected individuals whose communications were monitored over extended periods.

Detected Targets

TypeDescriptionConfidence
SectorFinancial
Verified
SectorGovernment Agencies and Services
Verified
SectorEducation
Verified
RegionAfghanistan
Verified
RegionIran
Verified
RegionIsrael
Verified
RegionMiddle East Countries
Verified

FAQs

Understanding the Madi Campaign

The Madi campaign is a long-running cyber espionage operation targeting individuals and organizations primarily in the Middle East. It uses social engineering and spyware to infiltrate systems and monitor victims.

The exact attribution is unclear, but the operation appears to be conducted by a relatively low-resourced group skilled in deception rather than advanced malware development.

The goal was extensive surveillance. The malware gathered screenshots, keystrokes, recorded audio, and extracted files from targeted users, suggesting an intelligence-gathering motive.

Victims included people in Iran, Israel, Afghanistan, and nearby regions, especially those working in engineering, government, finance, and academia.

Attackers tricked users into opening infected PowerPoint files or disguised executable files that looked like images or PDFs. Once opened, these files installed spyware that monitored the system.

Middle Eastern critical infrastructure and political or academic sectors are often targets for espionage due to their strategic value.

Rather than using complex, zero-day exploits, Madi relied on simple, deceptive techniques that were effective against users with low cybersecurity awareness.

They should train employees to spot suspicious attachments, block risky file types, monitor for indicators of compromise, and ensure up-to-date endpoint protection.

The campaign is targeted but large in scope, with at least 800 known victims. Its ongoing nature and success suggest a broader threat to the region.