Iran’s MuddyWater Hacks with UDPGangster Malware via Phishing

Iranian hacking group MuddyWater deploys UDPGangster backdoor malware using UDP for command-and-control in attacks targeting Turkey, Israel, and Azerbaijan via malicious macro-enabled Word documents

  • An Iranian Hacking group called MuddyWater is using a new backdoor Malware named UDPGangster that exploits UDP for command-and-control operations.
  • The malware targets systems in Turkey, Israel, and Azerbaijan through spear-phishing emails with malicious Microsoft Word attachments.
  • UDPGangster employs multiple anti-analysis techniques to detect virtual environments and avoid detection before collecting data and executing commands via UDP connections.
  • The infection begins when victims enable macros in Word documents that run embedded VBA scripts to deploy the backdoor.
  • The activity follows recent attacks linked to MuddyWater involving another backdoor, MuddyViper, targeting various sectors within Israel.

An Iranian cyber espionage group known as MuddyWater has been observed deploying a new backdoor called UDPGangster since late 2025. This malware uses the User Datagram Protocol (UDP) for its command-and-control (C2) communications and primarily targets users in Turkey, Israel, and Azerbaijan, according to Cybersecurity researchers.

- Advertisement -

The attack method begins with spear-phishing emails that impersonate entities such as the Ministry of Foreign Affairs of the Turkish Republic of Northern Cyprus. These messages include a ZIP file attachment containing a Microsoft Word document named “seminer.doc,” which prompts recipients to enable macros. Activating the macros runs a VBA script that secretly executes the UDPGangster payload. The script also displays a decoy image, in Hebrew, related to telecom outages in Israel to distract victims.

“The macro uses the Document_Open() event to automatically execute, decoding Base64-encoded data from a hidden form field and writing the decoded content to C:\Users\Public\ui.txt,” explained security researcher Cara Lin. “It then executes this file using the Windows API CreateProcessA, launching the UDPGangster payload.”

Once active, UDPGangster establishes persistence by modifying the Windows Registry and incorporates a variety of anti-analysis techniques. These include checks for debugging tools, Sandbox environments, virtual machines, available system memory, and network adapter information. It also scans for known virtualization software processes and environment markers, ensuring it operates only in real user environments.

After confirming it is not under analysis, the malware collects system information and communicates with a remote C2 server at IP address 157.20.182.75 over UDP port 1269. Through this channel, attackers can run commands, transmit files, update the malware, and deploy additional payloads.

- Advertisement -

This campaign coincides with recent attacks by MuddyWater that delivered another backdoor called MuddyViper. Those attacks affected sectors including academia, engineering, local government, manufacturing, technology, transportation, and utilities within Israel.

Security experts caution users to be wary of unsolicited documents that request macro activation and highlight the sophisticated evasion tactics used by UDPGangster. Further details on the malware’s behavior and mitigation strategies are available according to Cara Lin.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Nvidia rallies on China comeback; Wall Street eyes $300 soon

NVIDIA plans to raise H200 chip production to meet strong demand from China.President Donald...

Aave CEO Urges RWA Push After Governance Vote Rejection Now.

Stani Kulechov outlined a wider strategy after a governance vote rejected a proposal to...

SEC Commissioner Caroline Crenshaw Resigns; Crypto Win Ahead

Caroline Crenshaw has resigned from the Securities and Exchange Commission, announced in a Friday...

CryptoQuant: Whale ‘Reaccumulation’ Narrative Overstated Now

Onchain data from CryptoQuant indicate claims of large-scale Bitcoin reaccumulation by whales are overstated.Exchange...

XRP Eyes Rally as ETFs and Buy Signal Boost 2026 Hopes Surge

Ripple settled its US lawsuit in 2025, helping XRP reach a $3.65 all-time high...
- Advertisement -

Must Read

Top Best Metaverse Worlds To Buy Land

The metaverse has grown in our everyday conversation since Facebook announced its rebranding in October 2021 to META. The metaverse is a virtual world,...
Bitcoin (BTC) $ 90,068.00 1.65%
Ethereum (ETH) $ 3,123.13 4.11%
XRP (XRP) $ 2.02 7.84%
Bittensor (TAO) $ 248.88 8.29%
Polkadot (DOT) $ 2.18 9.40%
Cardano (ADA) $ 0.393524 10.75%
Chainlink (LINK) $ 13.24 4.77%
Hyperliquid (HYPE) $ 24.65 0.97%
Monero (XMR) $ 428.27 2.84%
Hedera (HBAR) $ 0.121597 6.89%
Toncoin (TON) $ 1.82 8.78%