Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

MuddyWater's Latest Strike: Unpacking the Advanced MuddyViper Malware




In a recent series of attacks, MuddyWater has demonstrated its capabilities by targeting multiple sectors in Israel and one confirmed target in Egypt. The attackers have used advanced tools, including a custom-made loader called Fooder, to deploy their malware, dubbed MuddyViper. This article provides an in-depth analysis of the latest campaign, exploring the tactics, techniques, and procedures (TTPs) employed by MuddyWater and what they reveal about the group's evolving approach.

  • MuddyWater, an Iranian APT group, has conducted a series of attacks in Israel and Egypt using advanced tools.
  • The attackers used a custom-made loader called Fooder to deploy malware dubbed MuddyViper.
  • MuddyViper steals system info, credentials, browser data, and allows for file execution and exfiltration.
  • The attack targeted multiple sectors in Israel and one confirmed target in Egypt between September 30, 2024, and March 18, 2025.
  • The attackers used a mix of new and existing tools to expand their capabilities.
  • MuddyWater is refining its approach by building upon previous successes and learning from failures.
  • The attack highlights the importance of robust cybersecurity measures for organizations across various sectors.



  • In a recent series of attacks, the Iranian APT group known as MuddyWater has demonstrated its capabilities by targeting multiple sectors in Israel and one confirmed target in Egypt. The attackers have used advanced tools, including a custom-made loader called Fooder, to deploy their malware, dubbed MuddyViper. In this article, we will delve into the details of this latest campaign, exploring the tactics, techniques, and procedures (TTPs) employed by MuddyWater and what they reveal about the group's evolving approach.

    According to ESET researchers, the MuddyWater campaign targeted Israeli organizations and one in Egypt between September 30, 2024, and March 18, 2025. The attackers primarily focused on sectors such as engineering, local government, manufacturing, technology, transportation, utilities, and universities. This broad reach suggests that MuddyWater is targeting high-value targets in various industries, which would grant them access to sensitive information.

    One of the most interesting aspects of this campaign is the use of a custom-made loader called Fooder. Disguised as a Snake game, Fooder executes MuddyViper, which steals system info, credentials, browser data, and allows for file execution and exfiltration. This technique is unique to Iran-aligned groups and uses the CNG Windows cryptographic API for encryption and decryption.

    The use of this custom loader highlights MuddyWater's growing sophistication in evading defenses and maintaining persistence on compromised systems. The attackers have also employed CE-Notes and LP-Notes stealers, go-socks5 reverse tunnels, and other tools to further expand their capabilities.

    ESET researchers noted that there are overlaps between new tools and previous MuddyWater malware. For example, the LP-Notes mirrors CE-Notes, and a Mimikatz loader shares its design. This suggests that MuddyWater is refining its approach, building upon previous successes and learning from failures.

    This campaign demonstrates MuddyWater's continued ability to execute campaigns ranging from average to above-average in terms of effectiveness and challengeability for defenders. As the group continues to evolve, it will be essential to monitor their activity and stay informed about new TTPs and malware variants.

    The impact of this attack on Israel and Egypt is significant, highlighting the importance of robust cybersecurity measures for organizations across various sectors. Furthermore, the use of custom-made loaders and advanced TTPs emphasizes the need for defenders to stay vigilant and adapt to emerging threats.

    In conclusion, MuddyWater's latest campaign showcases the group's growing sophistication in deploying malware and evading defenses. As we continue to monitor their activity, it is essential to remain informed about new TTPs and malware variants. The use of custom-made loaders like Fooder highlights the importance of staying up-to-date with the latest threats and adapting our defensive strategies accordingly.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/MuddyWaters-Latest-Strike-Unpacking-the-Advanced-MuddyViper-Malware-ehn.shtml

  • https://securityaffairs.com/185244/apt/muddywater-strikes-israel-with-advanced-muddyviper-malware.html


  • Published: Tue Dec 2 11:01:07 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us