MuddyWater deploys RustyWater Rust RAT in Middle East attack

  • MuddyWater has deployed a Rust-based implant called RustyWater against Middle East diplomatic, maritime, financial, and telecom targets.
  • Attackers use spear-phishing with malicious Word documents and VBA macros that prompt victims to “Enable content.”
  • RustyWater (also tracked as Archer RAT and RUSTRIC) supports asynchronous C2, anti-analysis, registry persistence, and modular expansion.
  • The activity marks a shift from PowerShell/VBS loaders and legitimate remote-access tools toward structured Rust implants; the group is linked to Iran’s Ministry of Intelligence and Security (MOIS).

The Iranian-linked actor MuddyWater has been observed running a spear-phishing campaign that delivers a Rust-based implant called RustyWater to targets in the Middle East. According to Prajwal Awasthi at CloudSEK, the campaign began this period and focuses on diplomatic, maritime, financial, and telecom organizations.

- Advertisement -

The emails impersonate Cybersecurity guidance and include Microsoft Word attachments. When opened, the documents instruct victims to "Enable content." That action runs a VBA macro that drops the Rust binary on the host system.

RustyWater — also known as Archer RAT and RUSTRIC — collects system information, checks for security software, and creates persistence via a Windows Registry key. The implant contacts a command-and-control server at nomercys.it[.]com to receive commands and transfer files.

CloudSEK described the toolset as low-noise and modular, stating that, "The campaign uses icon spoofing and malicious Word documents to deliver Rust based implants capable of asynchronous C2, anti-analysis, registry persistence, and modular post-compromise capability expansion." This marks an evolution from the group’s earlier reliance on PowerShell and VBS loaders.

The actor, tracked under names including Mango Sandstorm, Static Kitten, and TA450, has operated since at least 2017 and is assessed to be affiliated with Iran’s Ministry of Intelligence and Security (MOIS). Separate reporting noted that RUSTRIC activity was flagged by Seqrite Labs in attacks against IT firms, managed service providers, human resources, and software development companies in Israel.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin difficulty dips to 146.4T; set to rise Jan 22, 2026.

The Bitcoin network difficulty eased to about 146.4 trillion in the first 2026 adjustment."The...

Chevron Surges After US Seizes Venezuela, $3B Oil Deal Gain!

U.S. intervention in Venezuela over the past week lifted oil stocks, notably Chevron (CVX).Chevron...

StarkNet suffers second 2025 outage; block reorg rolls back.

Starknet suffered a temporary mainnet outage tied to a state mismatch between its execution...

MSCI Keeps Crypto Treasuries in Index; MSTR Surges After Buy

MSCI decided not to exclude Bitcoin and crypto-treasury companies from its indexes, saying more...

Bitcoin whales trim longs, signaling classic Wyckoff springs

Bitfinex whale long positions fell after peaking near 73,000 BTC in late December.Historical patterns...
- Advertisement -

Must Read

TOP 12 Day Trading Crypto Books For Beginners

Day trading cryptocurrencies has become an increasingly popular financial activity, offering the potential for huge returns to those who understand the market's complexities and...
Bitcoin (BTC) $ 90,402.00 0.17%
Ethereum (ETH) $ 3,080.02 0.12%
XRP (XRP) $ 2.09 0.34%
Bittensor (TAO) $ 278.33 1.54%
Polkadot (DOT) $ 2.09 0.08%
Cardano (ADA) $ 0.386348 1.56%
Chainlink (LINK) $ 13.11 0.37%
Hyperliquid (HYPE) $ 23.91 5.05%
Monero (XMR) $ 469.16 3.56%
Hedera (HBAR) $ 0.117609 2.43%
Toncoin (TON) $ 1.74 0.38%