Iran-linked hackers target Israeli, Egyptian critical infrastructure through phishing campaign

The Iran-tied threat actor MuddyWater targeted critical infrastructure in Egypt and Israel with spyware that masqueraded as the classic Snake game, researchers say.

Active between September 2024 and March 2025, the operation primarily targeted organizations in Israel’s technology, engineering, local government, educational and manufacturing sectors, according to researchers at ESET, who uncovered the campaign.

The new activity unfolded through spearphishing emails which typically featured PDF attachments that included links to installers for spyware hosted on free file-sharing platforms such as OneHub and Mega, according to an ESET blog post.

A new backdoor called MuddyViper allowed attackers to exfiltrate Windows login credentials and browser data, gather system information, transfer files and execute files and shell commands, ESET researchers say.

The custom loader MuddyViper uses, dubbed Fooder, makes the malware harder to detect because of how it mirrors the Snake game. 

MuddyViper shows MuddyWater, which is aligned with the Ministry of Intelligence and National Security of Iran, is evolving technically and has grown more capable at evading detection and remaining persistent, according to ESET.

Fooder “reflectively loads MuddyViper into memory and executes it,” ESET said in a press release. The loader also relies on a custom delay function that implements the “core logic” of the Snake game, combined with “Sleep” API calls, ESET says. 

“These features are intended to delay execution in an attempt to hide malicious behavior from automated analysis systems,” ESET said. “Overall this campaign shows signs of technical evolution – increased precision, strategic targeting and a more advanced toolset.”

After the initial compromise, MuddyWater deployed multiple credential stealers in the attacks, ESET said. These included CE-Notes, which targets Chromium-based browsers; LP-Notes, which “stages and verifies” stolen credentials; and Blub, which steals login data from Chrome, Edge, Firefox and Opera browsers.

MuddyWater first became publicly known in 2017 through its cyberespionage campaigns. In October, the threat actor was linked to a phishing campaign which targeted more than 100 government entities and international organizations across the Middle East and North Africa.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

Next Post

DOJ takes down Myanmar scam center website spoofing TickMill trading platform

Related Posts

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

A new campaign named GhostPoster has leveraged logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud. The extensions have been collectively downloaded over 50,000 times, according to Koi Security, which discovered the campaign. The add-ons are no longer available.
Read More

The Case for Dynamic AI-SaaS Security as Copilots Scale

Within the past year, artificial intelligence copilots and agents have quietly permeated the SaaS applications businesses use every day. Tools like Zoom, Slack, Microsoft 365, Salesforce, and ServiceNow now come with built-in AI assistants or agent-like features. Virtually every major SaaS vendor has rushed to embed AI into their offerings. The result is an explosion of AI capabilities across
Read More

CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Broadcom VMware Tools and VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild. The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), which could be exploited by an attacker to attain
Read More