Rapid7 Detection Coverage for Iran-Linked Cyber Activity

Explore the detection & enrichment coverage available to Rapid7 customers in a new blog, broadly assessing the macro cyber threat landscape and demonstrating the specific actions undertaken within the Rapid7 portfolio.

Rapid7

Iranian MOIS Actors & the Cyber Crime Connection

Iranian intelligence services are increasingly engaging with the cyber crime ecosystem, leveraging criminal tools, services, and operational models to support state objectives. This trend is particularly evident among actors linked to the Ministry of Intelligence and Security (MOIS), such as Void Manticore and MuddyWater. These actors are not merely imitating criminal behavior but actively associating with the cyber criminal ecosystem, using its infrastructure, malware, and affiliate-style relationships. This approach enhances their operational capabilities, complicates attribution, and contributes to confusion around Iranian threat activity. Examples include the use of ransomware branding, commercial infostealers, and overlaps with criminal malware clusters. This shift from imitation to active engagement with cyber crime offers both improved deniability and expanded technical capabilities for Iranian actors.

Pulse ID: 69b088d31d4ef8bf35564baa
Pulse Link: https://otx.alienvault.com/pulse/69b088d31d4ef8bf35564baa
Pulse Author: AlienVault
Created: 2026-03-10 21:10:43

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #InfoStealer #Iran #Malware #MuddyWater #OTX #OpenThreatExchange #RAT #RansomWare #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Unmasking an Attack Chain of MuddyWater

Pulse ID: 69b116de020ddc7f1ec36941
Pulse Link: https://otx.alienvault.com/pulse/69b116de020ddc7f1ec36941
Pulse Author: Tr1sa111
Created: 2026-03-11 07:16:46

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #MuddyWater #OTX #OpenThreatExchange #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Clearing the Water: Unmasking an Attack Chain of MuddyWater
#MuddyWater
https://www.huntress.com/blog/muddywater-attack-chain
Unmasking an Attack Chain of MuddyWater | Huntress

Huntress has identified and detailed a full timeline of an intrusion in a customer environment that aligns with what others have identified as MuddyWater (Iranian-linked APT).

Huntress
New Huntress case study breaks down a MuddyWater-aligned (Iran) intrusion: RDP initial access, SSH tunneling with OpenSSH, & DLL side-loading via legitimate FMAPP.exe for C2. Great case study and walkthrough. #CyberSecurity #DFIR #MuddyWater #Huntress πŸ”—https://zurl.co/AC8Re

Iran's MuddyWater hackers breached US organizations and an Israeli department of a software firm using phishing and a new backdoor dubbed #Dindoor - All this, despite the ongoing conflict.

Read: https://hackread.com/iran-muddywater-hackers-us-dindoor-backdoor/

#CyberSecurity #Iran #Israel #US #MuddyWater #Malware

Iran's MuddyWater Hackers Target US Firms with New Dindoor Backdoor

Follow us on all social media platforms @Hackread

Hackread - Cybersecurity News, Data Breaches, AI and More

Unmasking an Attack Chain of MuddyWater

An intrusion attributed to MuddyWater, an Iranian-linked APT, was identified in a customer environment. The attack involved initial access through RDP, establishing an SSH tunnel, and deploying malware via DLL side-loading. The threat actor used FMAPP.exe, a legitimate Fortemedia Inc. application, to load a malicious FMAPP.dll for C2 communications. The timeline of activities revealed typos in commands, suggesting manual typing by the attacker. The intrusion included reconnaissance efforts, attempts to verify tunnel functionality, and issues with initial C2 communication. The attack targeted an Israeli company, aligning with known MuddyWater tactics.

Pulse ID: 69abf37dfd9bfab829c9913e
Pulse Link: https://otx.alienvault.com/pulse/69abf37dfd9bfab829c9913e
Pulse Author: AlienVault
Created: 2026-03-07 09:44:29

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #ICS #InfoSec #Iran #Israel #Malware #MuddyWater #OTX #OpenThreatExchange #RDP #SSH #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

MuddyWater Exposed: Inside an Iranian APT operation

Pulse ID: 69acdc94b7bc2b107f5b8c7a
Pulse Link: https://otx.alienvault.com/pulse/69acdc94b7bc2b107f5b8c7a
Pulse Author: Tr1sa111
Created: 2026-03-08 02:19:00

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Iran #MuddyWater #OTX #OpenThreatExchange #RAT #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Iran-linked MuddyWater deploys Dindoor malware against U.S. organizations

Iran-linked APT MuddyWater targeted U.S. organizations, deploying the new Dindoor backdoor across sectors including banks, airports, and nonprofits.

Security Affairs

One more for good measure because why not:

host.services.cert.parsed.issuer_dn="cgWUqATNuKVKop+/nRG88+u7AEo2ulPc/6DzDNJyq3Q"

#ThreatIntel #CTI #MuddyWater