Iranian State-Sponsored Hackers Breach US Airport, Bank, and Software Company Systems
Cyberattacks Attributed to Iranian Threat Group MuddyWater
A recent wave of cyberattacks attributed to the Iranian threat group MuddyWater has compromised several organizations in the United States, including an airport, a bank, and a software company with ties to Israel.
Background on MuddyWater
According to researchers at Broadcom’s Symantec and Carbon Black, the attacks have continued in recent days, despite heightened tensions between the US and Iran following military strikes.
The group has a history of targeting entities in the Middle East for espionage purposes and has been observed using updated Android spyware in previous campaigns.
Latest Attacks
In the latest attacks, MuddyWater deployed a new backdoor called Dindoor on the networks of the software company’s Israeli branch, the US bank, and a Canadian non-governmental organization.
The backdoor was signed with a certificate issued to “Amy Cherne.”
Additionally, the group attempted to exfiltrate data from the software company’s Israeli branch.
Researchers also discovered a Python backdoor called Fakeset on the networks of a US airport and a non-profit organization.
This backdoor was signed with certificates issued to “Amy Cherne” and “Donald Gay,” which has been used in previous MuddyWater attacks.
Conclusion
MuddyWater’s activity has been disrupted, but the researchers warn that other organizations may still be vulnerable to compromise.
The group’s presence on US and Israeli networks prior to the current conflict puts them in a position to launch future attacks.
MuddyWater’s tactics, techniques, and procedures (TTPs) have been well-documented in the past.
The group has been known to target entities in the Middle East, and their involvement in cyber-enabled kinetic targeting has been observed in previous campaigns.
The recent attacks highlight the ongoing threat posed by MuddyWater and the need for organizations to remain vigilant in the face of evolving cyber threats.
