Threat Intelligence

MuddyWater: Iran's MOIS Conglomerate — Turning Legitimate Admin Tools Into Espionage Weapons

> threat_actor MuddyWater —— origin: Iran (MOIS) —— alias: Static Kitten / Mango Sandstorm —— signature: RMM tool abuse<span class="cursor-blink">_</span>_

Hedgehog Security 20 November 2024 16 min read
muddywater static-kitten mango-sandstorm iran mois threat-intelligence rmm-abuse cyber-espionage

The group that weaponises your own IT tools.

MuddyWater — also tracked as Static Kitten, Mango Sandstorm, MERCURY, Seedworm, Earth Vetala, TEMP.Zagros, TA450, Cobalt Ulster, Boggy Serpens, and Yellow Nix — is an Iranian state-sponsored cyber espionage group assessed by the US government to be a subordinate element within Iran's Ministry of Intelligence and Security (MOIS). Active since at least 2017, MuddyWater has targeted government agencies, telecommunications providers, defence organisations, energy companies, financial institutions, academic institutions, and healthcare entities across the Middle East, Asia, Africa, Europe, and North America.

What makes MuddyWater distinctive is not sophistication in the traditional sense — they do not develop zero-day exploits or deploy cutting-edge implants. Instead, MuddyWater has mastered the art of abusing legitimate tools. Their signature technique is deploying legitimate Remote Monitoring and Management (RMM) software — the same tools IT departments use to manage endpoints — as command-and-control infrastructure. Atera Agent, ScreenConnect, SimpleHelp, Syncro, RemoteUtilities, N-able, and Action1 have all been weaponised by MuddyWater. Because these are signed, trusted, commercially licensed applications, they bypass endpoint detection, application whitelisting, and reputation-based security controls.

Cisco Talos's assessment captures the group's structure precisely: MuddyWater is not a single team but a conglomerate of multiple smaller teams operating independently under a shared MOIS mandate. Each team focuses on specific regions, uses slightly different tooling and infection chains, but shares techniques that evolve across teams over time — likely through shared contractors or development resources. This conglomerate structure explains why MuddyWater activity is so prolific and geographically diverse: multiple teams are operating simultaneously against different target sets.


Confirmed MOIS subordination — by four governments.

Attribute Detail
Tracked Names MuddyWater (Unit 42/Kaspersky), Static Kitten (Anomali), Mango Sandstorm (Microsoft, current), MERCURY (Microsoft, legacy), Seedworm (Symantec), Earth Vetala (Trend Micro), TEMP.Zagros (FireEye), TA450 (Proofpoint), Cobalt Ulster (Secureworks), Boggy Serpens (Palo Alto), Yellow Nix, SectorD02, T-APT-14, ATK51
State Sponsor Islamic Republic of Iran — Ministry of Intelligence and Security (MOIS). Formally attributed by a joint advisory from the FBI, CISA, US Cyber Command (CNMF), and the UK's NCSC in February 2022, which described MuddyWater as 'a subordinate element within the Iranian Ministry of Intelligence and Security (MOIS)'. This is the highest-confidence attribution available: four government agencies from two nations confirming the group's organisational placement.
Active Since At least 2017. Continuous and prolific operations observed through 2025, with Group-IB documenting a campaign in late 2025 targeting over 100 government entities across the MENA region using the Phoenix backdoor via a compromised email account.
Conglomerate Structure Cisco Talos assesses MuddyWater as a conglomerate of multiple teams operating independently rather than a single group. Teams focus on specific regions, use varying infection chains, but share TTPs that evolve across campaigns. Shared indicators (strings, watermarks) have also been observed between MuddyWater and APT35/Phosphorus — despite different sponsors (MOIS vs IRGC) — suggesting shared contractors or development resources across Iran's intelligence apparatus.
Operational Security Failure In 2019, Group-IB identified MuddyWater's real IP address — located in Tehran — through an operational security mistake. Despite this exposure, the group continued operations uninterrupted, reflecting state protection and institutional resilience.

Broad targeting across three continents.

MuddyWater's target set is remarkably broad — spanning government, telecoms, defence, energy, finance, academia, healthcare, IT, transport, and NGOs. Geographically, their primary focus is the Middle East (Israel, Turkey, Saudi Arabia, UAE, Iraq, Jordan, Oman, Syria), with significant operations extending to South Asia (Pakistan, India, Afghanistan), Central Asia (Tajikistan, Azerbaijan, Armenia), Europe (Netherlands, Italy, Portugal, Germany), and North America. Since October 2023, operations targeting Israel have intensified dramatically, aligning with the Hamas conflict.

Sector Strategic Value Notable Campaigns
Government and Diplomacy Strategic intelligence on policy, sanctions, and regional alliances. Understanding adversary and partner decision-making processes. Monitoring diplomatic developments particularly around Arab-Israeli normalisation. 2025 Phoenix campaign targeting over 100 government entities including embassies, consulates, foreign affairs ministries, and diplomatic missions across the MENA region, using a compromised email account accessed via NordVPN. UAE and Kuwait government agencies targeted with ScreenConnect installers masquerading as government documents related to Arab-Israeli normalisation (2021).
Telecommunications Access to communications metadata and content for intelligence collection. Telecoms infrastructure enables surveillance of individuals and organisations of interest. Telecoms companies targeted across Israel, Turkey, India, and the Middle East. Airlines and travel agencies specifically targeted in 2024 campaigns — travel data provides movement intelligence.
Defence and Military Military capability assessment, weapons procurement intelligence, and defence cooperation between adversary nations. Defence organisations in the Middle East and NATO-affiliated countries. Campaigns targeting defence sector entities documented by multiple vendors.
Energy and Oil & Gas Competitive intelligence for Iran's oil-dependent economy. Pre-positioning for potential disruptive operations. Oil and natural gas organisations across the Middle East. CISA advisory specifically identifies the sector as a target.
Finance and Academia Financial intelligence supports sanctions evasion planning. Academic institutions hold research of strategic value and provide access to policy-adjacent expertise. Israeli academic and financial sector targeted. February 2022 ransomware attack against an Israeli academic institution — assessed as disinformation rather than financial motivation, delivering anti-Israeli content.
IT and Managed Services Supply chain access — compromising IT providers grants indirect access to their clients. MuddyWater's RMM expertise makes IT environments particularly attractive targets. IT companies targeted as part of supply chain operations. Compromised email accounts from IT organisations used to send phishing campaigns to downstream targets.

Legitimate software as invisible C2.

MuddyWater's most operationally significant innovation is their systematic abuse of legitimate Remote Monitoring and Management software. Since at least 2021, they have used commercially available RMM tools as their primary command-and-control mechanism — and the list of abused platforms continues to grow.

RMM Tool Period Deployment Method
ScreenConnect 2021 onwards Phishing emails containing links to ScreenConnect installers hosted on file-sharing platforms. Early campaigns used ScreenConnect installers disguised as government documents. Custom launch parameters configured to target specific government ministries.
SimpleHelp 2023 onwards Phishing emails linking to SimpleHelp installers. Observed in October 2023 campaigns coinciding with the Hamas attack. Emails masqueraded as flight status notification tools.
Atera Agent 2023–2024 (primary) Most heavily used RMM tool. Atera provides comprehensive remote control from web UI — file upload/download, interactive shell, and even AI command assistance. MuddyWater registered Atera accounts using compromised email addresses (credentials from prior breaches). Atera agents distributed via phishing through Egnyte file-sharing, Zendesk Chat uploads, and direct email links.
Syncro / RemoteUtilities 2022–2023 Deployed via phishing alongside other RMM tools. Rotated through different RMM platforms to avoid detection signatures keyed to specific tools.
N-able / Action1 / PDQ 2024–2025 More recent additions to MuddyWater's RMM arsenal. Action1 and PDQ RMM tools observed hosted alongside custom malware on C2 infrastructure. Continuous expansion of abused platforms.
MuddyWater — Why RMM Abuse Works
── Why RMM Tools Are Ideal C2 ──────────────────────────────
✓ Digitally signed by legitimate vendor — passes code signing
✓ Trusted application — bypasses application whitelisting
✓ Already used by IT departments — blends with normal activity
✓ Vendor-managed C2 infrastructure — no attacker-hosted servers
✓ Full remote control capability built in — no custom malware needed
✓ File transfer, shell access, screenshot capture — all native
✓ Encrypted communications — vendor TLS, not suspicious traffic

── The Attack Chain ─────────────────────────────────────────
1. Compromise an organisational email account
2. Register that email with an RMM vendor (e.g. Atera)
3. Generate an RMM agent installer linked to attacker's account
4. Host installer on legitimate file-sharing (Egnyte, OneDrive)
5. Send phishing email from compromised account with download link
6. Victim installs legitimate, signed RMM agent
7. Attacker has full remote control via vendor's web dashboard

No custom malware. No attacker C2 server. No suspicious traffic.
Every component is a legitimate, commercially licensed tool.

The brilliance of this approach is its simplicity. MuddyWater eliminates the need to develop, host, and maintain custom C2 infrastructure. The RMM vendor provides the infrastructure, the encryption, the update mechanism, and the management console. The defender's challenge is distinguishing between a legitimate Atera Agent installed by their IT department and one installed by a MuddyWater phishing campaign — because the software is identical.


When legitimate tools are not enough.

While RMM tools are MuddyWater's preferred operational method, the group also maintains a substantial arsenal of custom malware — deployed when RMM tools are insufficient or when security vendors' increasing scrutiny of RMM abuse forces a tactical shift.

Tool Type Capabilities
BugSleep Custom backdoor (2024+) Purpose-built backdoor partially replacing RMM tools — likely in response to increased security vendor monitoring of RMM abuse. Executes commands and transfers files between compromised systems and C2. Multiple versions observed with rapid bug fixes — suggesting trial-and-error development. Uses Sleep API calls for sandbox evasion, mutex creation, and encrypted C2 configuration.
Phoenix Lightweight backdoor (2025+) Described by Group-IB as a lightweight BugSleep variant written in Python. Gathers system information, establishes persistence, provides interactive shell, and supports file upload/download. Deployed against over 100 government entities in late 2025 MENA campaign.
POWERSTATS PowerShell backdoor (2017+) MuddyWater's original signature malware — a PowerShell-based backdoor providing command execution and system reconnaissance. Multiple versions (V1–V3) with evolving anti-detection techniques. Establishes C2 via HTTP, using obfuscated PowerShell.
PowGoop DLL side-loading loader Impersonates legitimate GoogleUpdate.exe DLL (goopdate86.dll). Side-loads malicious DLL into memory using DLL hijacking. Communicates with C2 using modified Base64 encoding. Demonstrates understanding of Windows update mechanisms for evasion.
Mori DNS tunnelling backdoor Uses DNS tunnelling for C2 — similar to APT34's signature technique. Provides persistent backdoor access through a protocol rarely inspected. Shared technique across MOIS-affiliated groups.
Small Sieve Python-based backdoor Analysed by UK NCSC/GCHQ. Lightweight implant for maintaining persistence and basic command execution. Named for its minimal footprint and targeted deployment.
PhonyC2 / DarkBeatC2 / MuddyC2Go Custom C2 frameworks Purpose-built command-and-control frameworks developed by MuddyWater teams. DarkBeatC2 and MuddyC2Go represent evolution toward custom infrastructure when RMM tools face increased detection. PhonyC2 documented in multiple campaigns.
Credential Stealers Browser and system credential theft Custom browser credential stealer targeting Brave, Chrome, Edge, and Opera. Enumerates browser profiles, extracts encrypted keys, decrypts login data, and stages output encrypted before exfiltration. Deployed alongside RMM tools on C2 infrastructure. Also uses Mimikatz, LaZagne, and Browser64 for LSASS and cached credential dumping.

PowerShell, LOLBins, and legitimate services.

Beyond RMM tools, MuddyWater extensively uses Living Off the Land Binaries (LOLBins) and native Windows utilities to execute payloads, evade detection, and maintain persistence. Their PowerShell usage is particularly heavy — to the point where PowerShell monitoring is one of the most effective detection methods against MuddyWater activity.

PowerShell Everywhere
POWERSTATS, PowGoop, and numerous other MuddyWater tools are PowerShell-based. The group uses heavily obfuscated PowerShell scripts — Base64 encoding, string concatenation, variable substitution — to evade static analysis. PowerShell provides in-memory execution, avoiding disc-based detection. Script Block Logging (Event ID 4104) is essential for visibility.
LOLBin Abuse
MuddyWater uses legitimate Windows binaries for malicious purposes: CMSTP.exe for application installation and UAC bypass, Mshta.exe for executing HTA files containing VBScript/JScript payloads, Rundll32.exe for executing malicious DLLs, and makecab.exe for staging and archiving exfiltration data. Every tool is native to Windows — no additional software required.
Legitimate Cloud Services
MuddyWater hosts payloads on legitimate file-sharing platforms: Egnyte, OneDrive, OneHub, and even Zendesk Chat's file-sharing infrastructure. Phishing links point to trusted domains, bypassing URL reputation filters. C2 traffic blends with legitimate cloud service communications.
Tunnelling and Proxy Tools
Chisel (open-source tunnel tool), Ngrok (reverse proxy), and Plink (PuTTY Link) are used to establish tunnels through firewalls and proxy traffic. These tools enable access to internal resources that are not directly internet-facing. All are legitimate, publicly available tools.

Defending against trusted-tool abuse.

MuddyWater's reliance on legitimate tools creates a fundamental detection challenge: the tools themselves are not malicious. Defence must focus on context, behaviour, and policy rather than signatures.

Inventory and Control RMM Tools
Know exactly which RMM tools are authorised in your environment. Block installation of all unauthorised RMM software via application control policies. If your organisation uses Atera, ensure only agents registered to your corporate account are permitted — block agents registered to unknown accounts. Monitor for new RMM agent installations outside of change management processes.
Enable PowerShell Logging and Monitoring
Enable Script Block Logging (Event ID 4104), Module Logging, and Transcription Logging. Alert on obfuscated PowerShell: Base64-encoded commands (-EncodedCommand), IEX (Invoke-Expression), and download cradles (Net.WebClient, Invoke-WebRequest). Consider Constrained Language Mode for PowerShell on servers and workstations where full PowerShell is not required.
Harden Email Security
MuddyWater sends phishing from compromised organisational email accounts — this bypasses sender reputation checks. Implement DMARC/DKIM/SPF across all domains. Deploy email gateway sandboxing. Train users to verify unsolicited emails even from known contacts — particularly those containing download links hosted on file-sharing platforms.
Control File-Sharing Platform Access
MuddyWater hosts payloads on Egnyte, OneHub, OneDrive, and Zendesk Chat. Block or monitor access to file-sharing platforms not approved for business use. Implement URL filtering that inspects link destinations rather than relying solely on domain reputation. Sandbox downloads from file-sharing platforms.
Monitor LOLBin Execution
Alert on unusual execution of CMSTP.exe, Mshta.exe, and Rundll32.exe — particularly when spawned by Office applications, email clients, or browser processes. Monitor for makecab.exe usage outside of normal IT operations. Implement ASR rules to restrict Office applications from creating child processes.
Protect Email Account Credentials
MuddyWater's entire operation relies on compromised email accounts — for phishing, for RMM registration, and for C2 (Phoenix campaign). Deploy phishing-resistant MFA on all email accounts. Monitor for impossible travel sign-ins. Alert on new mail forwarding rules. Implement conditional access policies restricting sign-in to managed devices and approved locations.

Why MuddyWater's techniques matter for your assessments.

MuddyWater's tradecraft is particularly relevant to penetration testing because the group uses techniques that a competent tester should be evaluating. If a penetration test does not attempt RMM tool deployment, LOLBin abuse, and PowerShell-based payload execution, it is not testing against the techniques used by one of the most active state-sponsored groups targeting the Middle East and NATO-affiliated nations.

In our engagements, we specifically test whether: unauthorised RMM agents can be installed and establish external C2, obfuscated PowerShell payloads execute without detection, LOLBins (CMSTP, Mshta, Rundll32) can be used for payload execution, phishing emails with links to legitimate file-sharing platforms bypass email security controls, and DNS tunnelling (a technique shared with APT34) can be used for data exfiltration. These tests directly measure an organisation's resilience against MuddyWater's documented attack chain.


The bottom line.

MuddyWater is a MOIS-subordinate conglomerate of multiple teams conducting prolific cyber espionage operations across the Middle East, Europe, Asia, and North America. Their signature innovation — systematic abuse of legitimate RMM tools for command-and-control — creates a fundamental detection challenge because every component of the attack chain is a trusted, signed, commercially licensed application. No custom malware. No suspicious C2 infrastructure. No anomalous network traffic. Just a legitimate remote management tool doing exactly what it was designed to do — in the hands of an Iranian intelligence operative.

The group's evolution in 2024–2025 shows continued adaptation: BugSleep and Phoenix represent a shift to custom backdoors as security vendors increasingly monitor RMM abuse, while the return to macro-enabled Office documents demonstrates willingness to revisit older techniques when they remain effective. The late 2025 campaign targeting over 100 government entities demonstrates the scale at which MuddyWater operates.

For defenders, MuddyWater forces a rethink of what 'malicious software' looks like. The tools MuddyWater deploys are not malware — they are legitimate applications used by IT departments globally. Detection must shift from 'is this software malicious' to 'is this software authorised, expected, and behaving within policy'. Organisations that cannot answer that question for every RMM agent running in their environment have a blind spot that MuddyWater is actively, aggressively, and successfully exploiting.


Could an attacker deploy a legitimate RMM tool in your environment undetected?

Our penetration testing engagements include RMM deployment testing — attempting to install legitimate remote management agents and establish external command-and-control through your security controls. This directly simulates MuddyWater's documented attack chain and identifies gaps in application control, endpoint monitoring, and email security.