Skip to content
Turna Sec Logo Turna Sec
MuddyWater Operation Olalampo Malware

MuddyWater Ramps Up Cyber Offensive with New Malware Strains

 MuddyWater Ramps Up Cyber Offensive with New Malware Strains

MuddyWater deploys new malware strains in Operation Olalampo

E

Enes

1 min read

MuddyWater Ramps Up Cyber Offensive with New Malware Strains

As geopolitical tensions escalate in the Middle East, the Iranian-linked threat group MuddyWater (also known as TA450 or Mango Sandstorm) has launched a sophisticated new campaign dubbed “Operation Olalampo”.

According to researchers from Group-IB, the group is deploying several never-before-seen malware strains targeting organizations across the MENA (Middle East and North Africa) region. Notable technical shifts in this campaign include:

  • New Malware Arsenal: The debut of the Char backdoor (a Rust-based tool using Telegram for C2), the GhostBackDoor (an advanced backdoor that adapts based on system privileges), and the HTTP_VIP downloader.
  • AI-Assisted Development: Researchers identified “debug strings containing emojis” within the code, a strong indicator that the attackers are using Large Language Models (LLMs) to generate and refine their malware.
  • Tactical Evolution: While still favoring spear-phishing, MuddyWater has expanded its repertoire to include the exploitation of public-facing server vulnerabilities and the use of legitimate RMM tools like AnyDesk to maintain persistence.
  • Security Takeaway: Organizations should prioritize monitoring for the specific IOCs associated with the Char and GhostBackDoor strains and remain vigilant against increasingly polished phishing lures that mimic regional energy and marine service providers

Sources

Back to News
Share: