Iran-linked hackers target Israeli, Egyptian critical infrastructure through phishing campaign

The Iran-tied threat actor MuddyWater targeted critical infrastructure in Egypt and Israel with spyware that masqueraded as the classic Snake game, researchers say.

Active between September 2024 and March 2025, the operation primarily targeted organizations in Israel’s technology, engineering, local government, educational and manufacturing sectors, according to researchers at ESET, who uncovered the campaign.

The new activity unfolded through spearphishing emails which typically featured PDF attachments that included links to installers for spyware hosted on free file-sharing platforms such as OneHub and Mega, according to an ESET blog post.

A new backdoor called MuddyViper allowed attackers to exfiltrate Windows login credentials and browser data, gather system information, transfer files and execute files and shell commands, ESET researchers say.

The custom loader MuddyViper uses, dubbed Fooder, makes the malware harder to detect because of how it mirrors the Snake game. 

MuddyViper shows MuddyWater, which is aligned with the Ministry of Intelligence and National Security of Iran, is evolving technically and has grown more capable at evading detection and remaining persistent, according to ESET.

Fooder “reflectively loads MuddyViper into memory and executes it,” ESET said in a press release. The loader also relies on a custom delay function that implements the “core logic” of the Snake game, combined with “Sleep” API calls, ESET says. 

“These features are intended to delay execution in an attempt to hide malicious behavior from automated analysis systems,” ESET said. “Overall this campaign shows signs of technical evolution – increased precision, strategic targeting and a more advanced toolset.”

After the initial compromise, MuddyWater deployed multiple credential stealers in the attacks, ESET said. These included CE-Notes, which targets Chromium-based browsers; LP-Notes, which “stages and verifies” stolen credentials; and Blub, which steals login data from Chrome, Edge, Firefox and Opera browsers.

MuddyWater first became publicly known in 2017 through its cyberespionage campaigns. In October, the threat actor was linked to a phishing campaign which targeted more than 100 government entities and international organizations across the Middle East and North Africa.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

Next Post

DOJ takes down Myanmar scam center website spoofing TickMill trading platform

Related Posts

Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild. The vulnerability, CVE-2025-55182 (CVSS score: 10.0), relates to a case of remote code execution that could be triggered by an
Read More

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps you work faster, serve your customers better, and stay ahead. But as your cloud setup grows, it gets harder to control who can access what. Even one small mistake—like the wrong person getting access—can lead to big problems. We're talking data leaks, legal trouble, and serious
Read More