BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

MuddyWater deploys RustyWater Rust RAT in Middle East attack

  • MuddyWater has deployed a Rust-based implant called RustyWater against Middle East diplomatic, maritime, financial, and telecom targets.
  • Attackers use spear-phishing with malicious Word documents and VBA macros that prompt victims to “Enable content.”
  • RustyWater (also tracked as Archer RAT and RUSTRIC) supports asynchronous C2, anti-analysis, registry persistence, and modular expansion.
  • The activity marks a shift from PowerShell/VBS loaders and legitimate remote-access tools toward structured Rust implants; the group is linked to Iran’s Ministry of Intelligence and Security (MOIS).

The Iranian-linked actor MuddyWater has been observed running a spear-phishing campaign that delivers a Rust-based implant called RustyWater to targets in the Middle East. According to Prajwal Awasthi at CloudSEK, the campaign began this period and focuses on diplomatic, maritime, financial, and telecom organizations.

- Advertisement -

The emails impersonate Cybersecurity guidance and include Microsoft Word attachments. When opened, the documents instruct victims to "Enable content." That action runs a VBA macro that drops the Rust binary on the host system.

RustyWater — also known as Archer RAT and RUSTRIC — collects system information, checks for security software, and creates persistence via a Windows Registry key. The implant contacts a command-and-control server at nomercys.it[.]com to receive commands and transfer files.

CloudSEK described the toolset as low-noise and modular, stating that, "The campaign uses icon spoofing and malicious Word documents to deliver Rust based implants capable of asynchronous C2, anti-analysis, registry persistence, and modular post-compromise capability expansion." This marks an evolution from the group’s earlier reliance on PowerShell and VBS loaders.

The actor, tracked under names including Mango Sandstorm, Static Kitten, and TA450, has operated since at least 2017 and is assessed to be affiliated with Iran’s Ministry of Intelligence and Security (MOIS). Separate reporting noted that RUSTRIC activity was flagged by Seqrite Labs in attacks against IT firms, managed service providers, human resources, and software development companies in Israel.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Cathie Wood: Prediction Markets May Revive Active Investing

Ark Invest is leveraging Kalshi prediction market data as a macro research tool, not...

Trump-Backed Crypto Token WLFI Plummets to Record Low

The World Liberty Financial token WLFI plunged to an all-time low, dropping 83% from...

Global Police Use Ad-Based Phone Tracking

An ad-based surveillance tool, Webloc, is used by global law enforcement to track up...

Suspect Arrested After Molotov Cocktail Attack on OpenAI CEO’s Home

A suspect allegedly threw a Molotov cocktail at the home of OpenAI CEO Sam...

Suspect Attacks OpenAI CEO Sam Altman’s Home With Molotov Cocktail

OpenAI CEO Sam Altman's San Francisco home was targeted with a Molotov cocktail early...

Must Read

What Are Anonymous Debit Cards And How Do They Work?

You've heard about anonymous debit cards, but what are they really? Anonymous Debit Cards are cards that let you make purchases without revealing your...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading