MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
嗯,用户让我用中文总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。好的,我先看看这篇文章讲的是什么。 文章主要讲的是伊朗的网络威胁组织MuddyWater,他们使用了一个名为RustyWater的Rust语言植入程序进行网络间谍活动。目标是中东的外交、海运、金融和电信机构。攻击手段是钓鱼邮件,伪装成安全指南,附带恶意Word文档,诱使用户启用内容,执行恶意宏来部署植入程序。 RustyWater的功能包括信息收集、检测安全软件、通过注册表保持持久性,并连接C2服务器进行文件操作和命令执行。此外,MuddyWater过去依赖PowerShell和VBS加载器,现在转向Rust植入程序,显示了他们的工具在不断发展。 好的,我需要把这些关键点浓缩到100字以内。首先提到MuddyWater使用RustyWater进行攻击,目标是中东的哪些行业。然后说明攻击方式是钓鱼邮件和恶意文档。接着简要描述RustyWater的功能以及MuddyWater工具的演变。 可能的结构:伊朗威胁组织MuddyWater利用Rust植入程序RustyWater针对中东多个行业发起钓鱼攻击。通过伪装邮件和恶意文档部署植入程序,具备信息收集、持久性和C2通信功能。该组织工具持续进化。 检查一下字数是否在限制内,并确保没有遗漏关键信息。 </think> 伊朗威胁组织MuddyWater利用Rust植入程序RustyWater针对中东外交、海运、金融和电信机构发起钓鱼攻击。攻击通过伪装成安全指南的钓鱼邮件传播恶意Word文档,诱导用户启用内容以部署植入程序。该植入程序具备信息收集、检测安全软件、注册表持久性和C2通信功能。MuddyWater工具持续进化,减少对远程访问软件依赖。 2026-1-10 10:35:0 Author: thehackernews.com(查看原文) 阅读量:4 收藏

Cyber Espionage / Malware

The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting diplomatic, maritime, financial, and telecom entities in the Middle East with a Rust-based implant codenamed RustyWater.

"The campaign uses icon spoofing and malicious Word documents to deliver Rust based implants capable of asynchronous C2, anti-analysis, registry persistence, and modular post-compromise capability expansion," CloudSEK resetter Prajwal Awasthi said in a report published this week.

The latest development reflects continued evolution of MuddyWater's tradecraft, which has gradually-but-steadily reduced its reliance on legitimate remote access software as a post-exploitation tool in favor of diverse malware arsenal comprising tools like Phoenix, UDPGangster, BugSleep (aka MuddyRot), and MuddyViper.

Also tracked as Mango Sandstorm, Static Kitten, and TA450, the hacking group is assessed to be affiliated with Iran's Ministry of Intelligence and Security (MOIS). It's been operational since at least 2017.

Attack chains distributing RustyWater are fairly straightforward: spear-phishing emails masquerading as cybersecurity guidelines come attacked with a Microsoft Word document that, when opened, instructs the victim to "Enable content" so as to activate the execution of a malicious VBA macro that's responsible for deploying the Rust implant binary.

Also referred to as Archer RAT and RUSTRIC, RustyWater gathers victim machine information, detects installed security software, sets up persistence by means of a Windows Registry key, and establishes contact with a command-and-control (C2) server ("nomercys.it[.]com") to facilitate file operations and command execution.

It's worth noting that use of RUSTRIC was flagged by Seqrite Labs late last month as part of attacks targeting Information Technology (IT), Managed Service Providers (MSPs), human resources, and software development companies in Israel. The activity is being tracked by the cybersecurity company under the names UNG0801 and Operation IconCat.

"Historically, MuddyWater has relied on PowerShell and VBS loaders for initial access and post-compromise operations," CloudSEK said. "The introduction of Rust-based implants represents a notable tooling evolution toward more structured, modular, and low noise RAT capabilities."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/muddywater-launches-rustywater-rat-via.html
如有侵权请联系:admin#unsafe.sh