Ethical Hacking News
Iranian hackers have launched a massive cyber-espionage campaign targeting major South Korean electronics maker, government agencies, and educational institutions, highlighting the growing threat posed by MuddyWater group.
The Iranian hackers affiliated with MuddyWater have launched a comprehensive cyber-espionage campaign targeting at least nine high-profile organizations across multiple sectors and countries. The attackers spent an entire week inside the network of a major South Korean electronics manufacturer, utilizing various tactics to gain unauthorized access and establish a foothold. The malware used in this attack relied heavily on DLL sideloading and leveraged legitimate tools and services to carry out operations without detection by traditional security measures. The attackers repurposed benign tools like Foremedia audio utility and SentinelOne component to load malicious DLLs that contained the ChromElevator post-exploitation tool. PowerShell was still heavily used in this attack, highlighting the attackers' continued reliance on a familiar and versatile platform for their operations. The attack demonstrated operational maturity and abuse of legitimate tools and services by the threat actors, marking a shift toward quieter attacks that could be more difficult to detect and respond to.
In a disturbing turn of events, Iranian hackers, affiliated with the notorious group known as MuddyWater (also referred to as Seedworm and Static Kitten), have launched a comprehensive cyber-espionage campaign targeting at least nine high-profile organizations across multiple sectors and countries. The attack, which began in February 2026, has left security experts scrambling to comprehend the scope and sophistication of the assault.
At the epicenter of this operation is a major South Korean electronics manufacturer, which remains unnamed due to concerns about potential repercussions on its reputation and operations. However, according to researchers at Symantec, who analyzed the malware used in the attack, the hackers spent an entire week inside the network of this South Korean firm, utilizing a variety of tactics to gain unauthorized access and establish a foothold.
Symantec's Threat Hunter Team has identified key characteristics that set this campaign apart from previous MuddyWater attacks. The team notes that the attackers were "intelligence-driven," focusing on industrial and intellectual property theft, government espionage, and access to downstream customers or corporate networks. This level of strategic planning is indicative of a highly organized and well-resourced operation.
The malware used in this attack relied heavily on DLL sideloading, a common technique employed by hackers to load malicious software onto compromised systems without the need for user interaction. The attackers also leveraged legitimate tools and services, including Foremedia and SentinelOne, to carry out their operations. This approach allows them to avoid detection by traditional security measures and adds an extra layer of complexity to incident response efforts.
Two of the binaries used in the attack were 'fmapp.exe,' a legitimate Foremedia audio utility, and 'sentinelmemoryscanner.exe,' a legitimate SentinelOne component. However, these benign tools were repurposed by the attackers to load malicious DLLs that contained the ChromElevator post-exploitation tool. This tool is specifically designed to steal data stored in Chrome-based browsers.
Symantec researchers observed that PowerShell was still heavily used in the recent incidents, although the payloads were controlled through Node.js loaders rather than directly. PowerShell's use in this context highlights the attackers' continued reliance on a familiar and versatile platform for their operations.
The attack on the South Korean electronics manufacturer is notable for its duration and complexity. According to Symantec's observations, the attackers performed host and domain reconnaissance, followed by antivirus enumeration via WMI, screenshot capture, and the download of additional malware. Credential theft occurred via fake Windows prompts, registry hive theft (SAM/SECURITY/SYSTEM), and Kerberos ticket abuse tools.
Persistence was established through registry modifications, beaconing occurred at 90-second intervals, and sideloaded binaries were repeatedly relaunched to maintain access. The attackers also leveraged sendit.sh, a public file-sharing service for data exfiltration, likely to obscure the malicious activity and make it appear as normal traffic.
The latest Seedworm campaign is notable not only for its geographic expansion but also for the operational maturity and abuse of legitimate tools and services by the threat actors. This marks a shift toward quieter attacks, which could potentially be more difficult to detect and respond to.
In light of these developments, researchers at Fortemedia and SentinelOne have noted an increase in abuse of their respective products. The use of legitimate tools and services by hackers highlights the evolving nature of cyber threats and underscores the importance of continuous vigilance and effective incident response strategies for organizations worldwide.
As the threat landscape continues to evolve, it is essential that security professionals stay informed about emerging trends and tactics employed by hackers. By staying ahead of the curve, organizations can enhance their defenses and reduce the risk of falling prey to sophisticated cyber-espionage campaigns like this one.
In summary, MuddyWater's latest campaign represents a significant escalation in the group's capabilities and operations. The attack on the South Korean electronics manufacturer serves as a stark reminder of the importance of robust cybersecurity measures and the need for organizations to be vigilant in the face of evolving threats.
Related Information:
https://www.ethicalhackingnews.com/articles/Rise-of-MuddyWater-Iranian-Hackers-Strike-at-the-Heart-of-South-Koreas-Electronics-Industry-ehn.shtml
https://www.bleepingcomputer.com/news/security/iranian-hackers-targeted-major-south-korean-electronics-maker/
https://securitricks.com/attackreports/iran-linked-hackers-breached-korean-electronics-maker-in-global-spying-campaign
https://www.huntress.com/threat-library/threat-actors/static-kitten
https://www.crowdstrike.com/en-us/adversaries/static-kitten/
https://en.wikipedia.org/wiki/MuddyWater_(hacker_group)
https://attack.mitre.org/groups/G0069/
https://www.security.com/threat-intelligence/iran-cyber-threat-activity-us
https://cybernews.com/security/iran-seedworm-hackers-us-israeli-critical-network/
Published: Wed May 13 18:11:53 2026 by llama3.2 3B Q4_K_M