🇮🇷

MuddyWater

APT Group Information theft and espionage 33 zero-day CVEs ETDA ✓

Also Known As 11 names

ATK51 Boggy Serpens COBALT ULSTER Earth Vetala G0069 MERCURY Mango Sandstorm Seedworm Static Kitten TA450 TEMP.Zagros

Target Countries 34

Countries highlighted in red

United Arab Emirates Afghanistan Armenia Austria Azerbaijan Bahrain Belarus China Germany Egypt United Kingdom Georgia Israel India Iraq Islamic Republic of Iran Jordan Kuwait Lebanon Mali Netherlands Oman Pakistan Portugal Qatar Saudi Arabia Sudan Thailand Tajikistan Tunisia Turkey United Republic of Tanzania Ukraine United States

Details

Origin 🇮🇷 IR
Last Updated 27 Oct 2025

Malware Families 25

gramdoor
equationgroup
evilquest
TeamViewer
ascentloader
METASPLOIT
dreambot
phoenix_locker
snifula
agent_tesla
zhmimikatz
ldr4
apk.rat_on
moriagent
pas
phoenix_keylogger
covicli
eternal_petya
saigon
vawtrak
PhantomCard
dbatloader
win.castleloader
agendacrypt
gozi

MITRE ATT&CK 199

T1001 - Data Obfuscation T1003 - OS Credential Dumping T1003.001 T1003.004 T1003.005 T1005 - Data from Local System T1007 T1008 T1011 T1012 - Query Registry T1016 - System Network Configuration Discovery T1018 - Remote System Discovery T1021 - Remote Services T1021.001 - Remote Desktop Protocol T1027 - Obfuscated Files or Information T1027.002 - Software Packing T1027.003 T1027.004 T1027.010 T1033 - System Owner/User Discovery T1036 - Masquerading T1036.005 T1041 - Exfiltration Over C2 Channel T1046 - Network Service Scanning T1047 - Windows Management Instrumentation T1048 - Exfiltration Over Alternative Protocol T1049 - System Network Connections Discovery T1053 - Scheduled Task/Job T1053.005 T1055 - Process Injection T1056 - Input Capture T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.001 - PowerShell T1059.003 T1059.005 - Visual Basic T1059.006 - Python T1059.007 - JavaScript T1060 T1068 - Exploitation for Privilege Escalation T1070 - Indicator Removal on Host T1070.001 - Clear Windows Event Logs T1070.004 - File Deletion T1071 - Application Layer Protocol T1071.001 - Web Protocols T1074 T1074.001 T1076 T1078 - Valid Accounts T1078.003 - Local Accounts T1078.004 - Cloud Accounts T1081 T1082 - System Information Discovery T1083 - File and Directory Discovery T1085 T1087 - Account Discovery T1087.002 T1089 T1090 - Proxy T1090.002 T1095 - Non-Application Layer Protocol T1102 - Web Service T1102.002 T1102.003 - One-Way Communication T1104 T1105 - Ingress Tool Transfer T1106 - Native API T1107 T1110 T1112 - Modify Registry T1113 - Screen Capture T1114 - Email Collection T1114.001 T1115 T1119 T1120 T1124 T1125 - Video Capture T1127 T1130 T1132 - Data Encoding T1132.001 - Standard Encoding T1133 - External Remote Services T1134 - Access Token Manipulation T1136 T1136.001 - Local Account T1137 T1137.001 T1140 - Deobfuscate/Decode Files or Information T1170 T1176 - Browser Extensions T1189 - Drive-by Compromise T1190 - Exploit Public-Facing Application T1192 - Spearphishing Link T1193 T1195 - Supply Chain Compromise T1199 - Trusted Relationship T1203 - Exploitation for Client Execution T1204 - User Execution T1204.001 T1204.002 - Malicious File T1204.004 T1210 T1213 - Data from Information Repositories T1217 T1218 - Signed Binary Proxy Execution T1218.003 T1218.005 T1218.011 T1219 - Remote Access Software T1219.002 T1220 T1444 T1480 T1485 T1486 T1489 T1490 - Inhibit System Recovery T1496 - Resource Hijacking T1497 T1497.003 T1498 - Network Denial of Service T1499 T1503 T1505.003 T1514 T1518 T1518.001 T1529 T1530 T1531 T1534 T1539 - Steal Web Session Cookie T1543 T1547 - Boot or Logon Autostart Execution T1547.001 - Registry Run Keys / Startup Folder T1548 - Abuse Elevation Control Mechanism T1548.002 T1550 - Use Alternate Authentication Material T1552 - Unsecured Credentials T1552.001 T1553 - Subvert Trust Controls T1553.002 - Code Signing T1555 T1555.003 - Credentials from Web Browsers T1559 T1559.001 T1559.002 T1560 - Archive Collected Data T1560.001 T1561 T1562 - Impair Defenses T1562.001 T1564 - Hide Artifacts T1566 - Phishing T1566.001 - Spearphishing Attachment T1566.002 T1567 T1567.002 - Exfiltration to Cloud Storage T1568 - Dynamic Resolution T1569 - System Services T1569.002 - Service Execution T1571 - Non-Standard Port T1572 T1573 - Encrypted Channel T1573.001 - Symmetric Cryptography T1574 - Hijack Execution Flow T1574.001 T1574.002 - DLL Side-Loading T1578.003 T1583 - Acquire Infrastructure T1583.001 - Domains T1583.004 - Server T1583.006 T1584 - Compromise Infrastructure T1584.004 - Server T1585.001 - Social Media Accounts T1585.002 - Email Accounts T1587 - Develop Capabilities T1587.001 - Malware T1588 - Obtain Capabilities T1588.001 - Malware T1588.002 - Tool T1589 - Gather Victim Identity Information T1590 T1590.004 T1591 - Gather Victim Org Information T1592 - Gather Victim Host Information T1595 - Active Scanning T1596 - Search Open Technical Databases T1598.002 T1608 - Stage Capabilities T1608.001 - Upload Malware T1684 T1684.001 T1685 TA0003 TA0010 TA0037