Iran-linked hackers target Israeli, Egyptian critical infrastructure through phishing campaign

The Iran-tied threat actor MuddyWater targeted critical infrastructure in Egypt and Israel with spyware that masqueraded as the classic Snake game, researchers say.

Active between September 2024 and March 2025, the operation primarily targeted organizations in Israel’s technology, engineering, local government, educational and manufacturing sectors, according to researchers at ESET, who uncovered the campaign.

The new activity unfolded through spearphishing emails which typically featured PDF attachments that included links to installers for spyware hosted on free file-sharing platforms such as OneHub and Mega, according to an ESET blog post.

A new backdoor called MuddyViper allowed attackers to exfiltrate Windows login credentials and browser data, gather system information, transfer files and execute files and shell commands, ESET researchers say.

The custom loader MuddyViper uses, dubbed Fooder, makes the malware harder to detect because of how it mirrors the Snake game. 

MuddyViper shows MuddyWater, which is aligned with the Ministry of Intelligence and National Security of Iran, is evolving technically and has grown more capable at evading detection and remaining persistent, according to ESET.

Fooder “reflectively loads MuddyViper into memory and executes it,” ESET said in a press release. The loader also relies on a custom delay function that implements the “core logic” of the Snake game, combined with “Sleep” API calls, ESET says. 

“These features are intended to delay execution in an attempt to hide malicious behavior from automated analysis systems,” ESET said. “Overall this campaign shows signs of technical evolution – increased precision, strategic targeting and a more advanced toolset.”

After the initial compromise, MuddyWater deployed multiple credential stealers in the attacks, ESET said. These included CE-Notes, which targets Chromium-based browsers; LP-Notes, which “stages and verifies” stolen credentials; and Blub, which steals login data from Chrome, Edge, Firefox and Opera browsers.

MuddyWater first became publicly known in 2017 through its cyberespionage campaigns. In October, the threat actor was linked to a phishing campaign which targeted more than 100 government entities and international organizations across the Middle East and North Africa.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

Next Post

DOJ takes down Myanmar scam center website spoofing TickMill trading platform

Related Posts

5 Threats That Reshaped Web Security This Year [2025]

As 2025 draws to a close, security professionals face a sobering realization: the traditional playbook for web security has become dangerously obsolete. AI-powered attacks, evolving injection techniques, and supply chain compromises affecting hundreds of thousands of websites forced a fundamental rethink of defensive strategies. Here are the five threats that reshaped web security this year, and
Read More

6 Browser-Based Attacks Security Teams Need to Prepare For Right Now

Attacks that target users in their web browsers have seen an unprecedented rise in recent years. In this article, we’ll explore what a “browser-based attack” is, and why they’re proving to be so effective.  What is a browser-based attack? First, it’s important to establish what a browser-based attack is. In most scenarios, attackers don’t think of themselves as attacking your web browser.
Read More