We have been tracking ongoing cyberespionage campaigns by the threat group Boggy Serpens, also known as MuddyWater. Attributed to the Iranian Ministry of Intelligence and Security (MOIS), the group consistently targets diplomatic and critical infrastructure – including energy, maritime and finance – across the Middle East and other strategic targets around the world.
We provide a comprehensive threat assessment of Boggy Serpens’ activities over the last year. Our analysis reveals a highly adaptable threat actor that has refined its operational strategy to focus on trusted relationship compromises and multi-wave targeting of key strategic organizations.
While social engineering remains its defining trait, the group is also increasing its technological capabilities. Its diverse toolset includes AI-enhanced malware implants that incorporate anti-analysis techniques for long-term persistence. This combination of social engineering and rapidly developed tools creates a potent threat profile.
Boggy Serpens primarily leverages hijacked accounts to wage its attacks, targeting high-profile victims like diplomats and IT vendors. The attackers exploit this access to bypass reputation-based blocking and utilize a secondary social engineering prompt to deliver malware.
The group’s determination is best exemplified by a sustained campaign against a national marine and energy company in the UAE. We outline four distinct waves of attack against this single entity from August 2025 through February 2026, demonstrating the group’s attempts to infiltrate regional maritime infrastructure.
To maintain access, the group has matured its development approach, employing AI-generated code, and Rust-based tools like the BlackBeard backdoor to rapidly deploy custom implants. Additionally, the group leverages standard HTTP status codes, customized user diagram protocol (UDP)-based traffic, and the Telegram API for command and control (C2).
Palo Alto Networks customers are better protected against the threats discussed in this article through Cortex XDR and XSIAM, the Cortex Advanced Email Security module, Advanced WildFire, Advanced URL Filtering and Advanced DNS Security.
Cortex’s AgentiX Agentic Assistant can assist investigations by providing context and insights, as well as recommendations for actions to take.
If you think you might have been compromised or have an urgent matter, contact the Unit 42 Incident Response team.
Boggy Serpens is an Iranian nation-state cyberespionage group active since at least 2017. Assessed to be a subordinate element of the MOIS, the group has primarily targeted government, military and critical infrastructure sectors across the Middle East, the Caucasus, Central and Western Asia, South America and Europe.
Early campaigns by this group were characterized by a high-volume, low-sophistication operational style. Boggy Serpens favored speed over stealth, frequently launching noisy and widespread spear phishing campaigns. These campaigns heavily relied on living-off-the-land (LOTL) tactics, abusing legitimate remote monitoring and management (RMM) tools like Atera, ScreenConnect and SimpleHelp, alongside publicly available utilities such as LaZagne and CrackMapExec.
Recent campaigns reflect the group’s prioritization of long-term persistence, stealthier tactics, techniques and procedures (TTPs) and advanced defense evasion techniques. This is evidenced by its adoption of the Rust programming language and the integration of AI-assisted techniques into its malware development lifecycle.
Boggy Serpens is likely benefiting from a significant influx of resources and cross-unit coordination. Early 2025 operations highlighted operational overlaps with Evasive Serpens, also known as Lyceum (a subgroup of OilRig), indicating shared resources and intelligence coordination within the Iranian threat landscape.
While the group’s focus remains cyberespionage, Boggy Serpens has conducted disruptive operations in the past. In February 2023, the group targeted the Technion Israel Institute of Technology, masquerading as the DarkBit ransomware gang. The operation disrupted academic infrastructure under the guise of financial crime, masking its state-sponsored origins. This tactic introduced an additional dimension of psychological warfare through false flags and intimidation.
Over the last year, Boggy Serpens has implemented a more effective “trusted relationship compromise” model to bypass perimeter defenses. This technique relies on hijacking legitimate internal accounts. Boggy Serpens misuses established credibility to deliver malware that evades standard reputation-based filtering. Once access is established, the group sustains operations using custom-compiled toolkits.
The group’s targeting has expanded beyond government entities to encompass the maritime, aviation and financial sectors, reflecting a heightened interest in regional logistics and critical economic infrastructure. Recent campaigns have struck entities in Israel, Hungary, Turkey, Saudi Arabia, the UAE, Turkmenistan, Egypt and South America. These attacks demonstrate an ability to pivot between sectors while conducting multiple, consecutive attacks against different targets.
Figure 1 shows a chronological overview of the phishing campaigns and specific regional entities targeted throughout the last year that we attribute with high confidence to Boggy Serpens.

Our analysis of Boggy Serpens phishing activity in 2025 and early 2026 reveals a significant shift in Boggy Serpens’ tradecraft, characterized by tailored social engineering lures and the deployment of specialized toolkits for mass email distribution and account exploitation.
A defining example of Boggy Serpens’ recent operations is the targeting of an energy and marine services company in the UAE. The organization is a high-value industrial entity with significant ties to the local sovereign establishment.
Beyond its domestic significance, the company serves as a critical node in the regional energy supply chain, maintaining a long-term strategic partnership with Saudi Aramco – another known target of Iranian state cyber operations. Compromising these assets grants the actor a potential foothold within vital energy networks across the UAE and Saudi Arabia, enabling continued reconnaissance and access.
Over a six-month period, we observed four distinct attack waves targeting this UAE-based entity, each using lures customized to different internal departments. This persistence suggests a specific mandate to infiltrate regional maritime and engineering infrastructure.
The initial campaign targeted project engineers using industry-specific terminology for subsea pipelines. The lure document was blurred in order to deceive targets into clicking “Enable Content,” thereby triggering the execution of the embedded macro. Figure 2 shows the document.

Shifting its focus to the finance and supply chain departments, in a subsequent attack the group deployed an Excel file that mimicked the target’s internal financial records. This lure was designed as a spreadsheet containing payment and cash flow projections.
As Figure 3 shows, the infected document contains specific references to “Engineering, Construction & Marine Services” and local currency (AED), alongside legitimate-looking transaction codes like “Payroll Payments via WPS”.

The group launched a parallel spear phishing effort targeting an individual associated with the company. The attackers created what appears to be a personalized Air Arabia flight reservation in Word format, as Figure 4 shows.

The high level of detail – specifically the passenger name, flight route and “Corporate Fare” category – strongly suggests that this lure was not generated at random. The actor likely leveraged intelligence gathered from a prior compromise, such as exfiltrated internal emails and travel itineraries.
The delivery of a flight itinerary as a Word document instead of a native PDF is a distinct operational anomaly. This creates a situation in which high-quality social engineering is undermined by a technical delivery that creates a detectable point of friction for trained users and automated sandboxes.
In this campaign, the lure deploys malware named GhostBackDoor, a newly documented malware family recently identified by Group-IB.
Most recently, we observed a fourth attack that utilized an Excel file titled Consumption Report (Jan 21 2025 – Feb 20 2026).xls, as Figure 5 shows.

While the social engineering themes and macro delivery structures remain consistent with Boggy Serpens TTPs, the group’s focus in this attack was on the final infection stage. In this campaign, the blurred document lure delivers an entirely new payload family, known as Nuso. See Appendix A for technical analysis of this custom HTTP backdoor family.
To support its large-scale social engineering campaigns, Boggy Serpens uses a custom-built, web-based orchestration platform. This tool enables operators to automate mass email delivery while maintaining granular control over sender identities and target lists.
On Oct. 3, 2025, we observed the IP 157.20.182[.]75 hosting a unique web-based Python server on port 5000. We assess that the threat actor uses this server to deliver emails to targets. The platform includes the following input fields and controls:
Figure 6 shows the platform interface.

Throughout the last year, Boggy Serpens systematically hijacked official government and corporate accounts to bypass standard email filtering – a technique they utilized in over 15 attacks around the world.
In August 2025, Boggy Serpens leveraged a compromised mailbox of the Omani Ministry of Foreign Affairs to distribute documents to other foreign ministries in different countries. These documents were disguised as official diplomatic communications.
Following regional conflicts in June 2025, the group sent a “Sustainable Peace” seminar invitation as a lure to solicit engagement from targeted recipients, as Figure 7 shows.

The suspicious content and thematic anomalies in the lure triggered Cortex XDR to flag this threat as high-risk, and prevent its execution before any user interaction could take place. The infection and prevention are shown in Figure 8.

On Jan. 6, 2026, we observed a highly targeted attack against a major telecommunications provider in Turkmenistan. As shown in Figure 9, the threat actor used a compromised internal account info@<company_name>.tm to distribute a Cybersecurity.doc file.

This tactic mirrors the campaign that targeted Israeli organizations on Nov. 17, 2025, as reported by the Israeli National Cyber Directorate (INCD), where the group hijacked internal accounts to distribute Webinar and HR lures.
In both instances, the emails received a negative spam confidence level (SCL -1), because they originated from authenticated, internal accounts. This negative value resulted in the emails bypassing spam filters.
Boggy Serpens utilizes a two-tiered social engineering strategy designed to bypass both automated filters and human intuition. First, the attackers hijack internal accounts. This deceives targeted victims into believing that an attachment was sent from a credible source. When a victim opens the file, a second layer of deception is triggered.
To coerce targets into enabling the malicious code, many of the documents are presented as blurred content when opened. The lure displays a message claiming that the content was created in an older version of Microsoft Word or Excel. Once the user clicks “Enable Content,” the VBA macro’s initial routine is to delete this overlay and reveal the clear, legible document underneath. This immediate visual feedback reinforces the apparent legitimacy of the lure, effectively masking the simultaneous execution of the dropper payload in the background.
Forensic analysis of last year’s campaign artifacts reveals that Boggy Serpens relies on a persistent VBA builder. The group split its operations into separate tracks to handle different types of targets:
Figure 10 shows the technical overlap of these tracks. The similarities include an identical shared decryption key and the novaservice.exe file path, linking these parallel operations to a single development team.

A detailed technical analysis of the VBA builders is available in Appendix B.
In recent campaigns, Boggy Serpens used several tools designed for persistence and evasion. This diverse toolkit allows the group to maintain resilient infrastructure capable of adapting to various defensive environments.
An analysis of the Rust-based backdoor known as “BlackBeard” and related infrastructure can be found in Appendix C.
The UDPGangster backdoor is designed to bypass traditional network defenses, utilizing a UDP-based communication protocol to execute commands, exfiltrate data and deploy secondary payloads.
Building on recent findings by FortiGuard Labs, our analysis confirms that this malware is primarily delivered via Microsoft Office documents embedded with VBA macros. Upon execution, the malware employs multiple anti-analysis techniques to detect research environments, ensuring stealthy persistence on infected networks.
Analysis of campaign-specific document lures revealed multiple UDPGangster variants. Each sample was delivered via a highly tailored social engineering document whose theme, language, and content were specifically aligned with the intended target’s sector and geography.
By tracing the execution from the initial lure to the final payload, we mapped usernames to their respective targets based on the embedded PDBs paths, as shown in Table 1.
| Country | Sector | PDB Path |
| Israel | Aviation | C:\Users\gangster\source\repos\udp_3.0 - Copy - Copy\x64\release_86\udp_3.0.pdb |
| Azerbaijan | Finance | C:\Users\piper\source\repos\udp_3.0 - Copy\x64\release_86\udp_3.0.pdb |
| Israel | Telecom | C:\Users\surge\source\repos\udp_3.0 - Copy\x64\release_86\udp_3.0.pdb |
Table 1: Different users in the PDB paths and their respective targets.
During our analysis of UDPGangster, we observed live threat actor interaction with a controlled test environment. Approximately 12 hours after the initial C2 heartbeat connections were established, the threat actor began issuing commands to the simulated victim.
This interaction provided a unique window into the actor’s operational procedures, confirming a distinct shift from automated infection to manual, human-led triage.
The command dir C:\users\%username%\Desktop specifically targeted a user folder identified in the output of the previous dir command. This step confirms that a human operator was manually triaging the host in real-time, rather than relying on an automated script.
We also observed the actor sending a packet beginning with byte 0x0B – distinct from the functional 0x0A command. Static analysis of the malware indicates no functionality associated with 0x0B. This discrepancy suggests either a manual mistake by the threat actor during command entry, or the existence of separate malware versions with differing command sets.
Our analysis uncovered another new tool used by Boggy Serpens – a remote access trojan (RAT) written in Rust named LampoRAT (also known as Olalampo). This binary was used in the recent targeted campaign against a UAE-based marine and energy company. The sample masquerades as an executable for legitimate security software – avp.exe (Kaspersky Anti-Virus process) – and embeds the string Kaspersky in the file’s metadata.
The malware leverages the Telegram Bot API for command and control, a technique that allows malicious traffic to blend in with legitimate encrypted HTTPS communications.
Functionally, the RAT is a streamlined shell executor. Upon infection, it connects to the hardcoded bot token (8398566164:AAEJbk6EOirZ_ybm4PJ-q8mOpr1RkZx1H7Q) and awaits instructions.
When a command is received, the malware passes it to a dispatcher logic that supports system execution and basic internal commands like /cd for navigation. The malware spawns a shell using a specific argument string: cmd.exe /e:ON /v:OFF /d /c <payload>. The dispatcher then captures the output and transmits the results back to the attacker’s Telegram chat.
An overview of the malware’s capabilities was recently published by Group-IB.
Querying the /getMe Telegram API for the hardcoded token reveals the bot’s public profile configuration, as seen in Figure 11.

The metadata provides further insight into the attacker’s naming conventions and operational structure:
The specific choice of the username stager_51_bot indicates the malware’s intended function. In offensive operations, a stager is typically a lightweight payload designed to establish a foothold and download further modules. The “51” numbering suggests this may be part of a larger series of bots generated for distinct campaigns or targets, reinforcing the hypothesis of a segmented, high-volume infrastructure.
A distinct stylistic artifact within the binary’s strings strongly suggests the threat actor used generative AI to accelerate development. The command dispatcher uses emojis for status reporting – specifically, strings such as the following:
This usage is not typical for malware authors, who usually favor standard ASCII logging ([+] or ERROR: ), to ensure the output is readable on any system and to avoid creating unique signatures. In contrast, code generated by large language models (LLMs) frequently includes user-friendly visual indicators by default when prompted to create command-line interfaces (CLIs) or Telegram bots.
This finding is a strong indication that Boggy Serpens is leveraging generative AI to write code and accelerate the creation of new malware variants.
Boggy Serpens’ recent activity exemplifies a maturing threat profile, as the group integrates its established methodologies with refined mechanisms for operational persistence. By diversifying its development pipeline to include modern coding languages like Rust and AI-assisted workflows, the group creates parallel tracks that ensure the redundancy needed to sustain a high operational tempo. This persistence has enabled a coordinated campaign across critical sectors in the Middle East, the Caucasus, Central Asia and more.
The defining characteristic of the threat actor activity remains the exploitation of trusted relationships to bypass traditional security mechanisms. Merging sophisticated implants with high-confidence social engineering, the group demonstrates distinct agility in shifting targets. This strategy allowed it to pivot between sectors with ease, signaling a clear intent for economic espionage and potential capabilities for regional disruption.
As the group continues to prioritize identity-based attacks alongside rapid, AI-assisted development cycles, we believe that the attackers are well-positioned to expand this targeting to increasingly sensitive upstream entities.
Organizations must look beyond sender reputation and automated spam filters and focus on detecting underlying behavioral anomalies to counter this evolving threat. Neutralizing secondary infection stages requires strict macro execution policies, alongside behavioral monitoring of endpoint processes. These practices help detect evasive executable payloads and memory-resident payloads before they establish persistence.
Palo Alto Networks customers are better protected from the threats discussed above through the following products:

If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call:
Palo Alto Networks has shared these findings with our fellow Cyber Threat Alliance (CTA) members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance.
| Lure Filename | First Seen | SHA256 Hash |
| Unknown file name | April 17, 2025 | c3afd5ce1ca50a38438bb5026cca27bfbf2d8e786e03f323adceb8ad17517eca |
| sh*t.doc (profanity masked) | July 24, 2025 | 52d8fb9a11920f27b9a3b43f27c275767a57cdffc95af94b7b66433506287314 |
| Online Seminar.FM.gov.om.doc | August 19, 2025 | b2c52fde1301a3624a9ceb995f2de4112d57fcbc6a4695799aec15af4fa0a122 |
| Online Seminar.MFA.gov.ct.tr (2).doc | August 19, 2025 | 1c16b271c0c4e277eb3d1a7795d4746ce80152f04827a4f3c5798aaf4d51f6a1 |
| Transfer receipt #27790.doc | August 11, 2025 | 4db3645f678fb519b9f529dde41f77944754f574f16a9a845c22d3703da5bed0 |
| DPR for dredging in FreeSpan_16082025.2.doc | August 16, 2025 | 2c92c7bf2d6574f9240032ec6adee738edddc2ba8d3207eb102eddf4ab963db0 |
| AIC_2025.doc | September 16, 2025 | 23f3a98befdff13c802eed32eea754018b8b525ec0dd3afce8459a0287df74ec |
| Middle East and Maritime Economy.doc | October 2025 | 69e038b9f3a228f09059bc1ce92b1c5c49396bb70987a38df0fdb39eed380b22 |
| sondouq.doc | October 2025 | 84e665a0dfbff74b4c356bfa282c7c253ae3411a8f4d58bfe121c8411c52552c |
| Webinar.doc (in Webinar.zip) | October/November 2025 | 6f079c1e2655ed391fb8f0b6bfafa126acf905732b5554f38a9d32d0b9ca407d |
| Scheduled_Internet_Outages.doc | November 2025 | 7ea4b307e84c8b32c0220eca13155a4cf66617241f96b8af26ce2db8115e3d53 |
| Cybersecurity.doc | January 2026 | f38a56b8dc0e8a581999621eef65ef497f0ac0d35e953bd94335926f00e9464f |
| Transaction Volumes Sheet_Filled.xls | February 2026 | 0ce54a5a6f061b158e3891aadd03773d0bae220b0316e84fc042a741924b3525 |
| Sajeev Saliha Beevi.doc | February 2026 | 167d5ab70f55c100e51833fbfea44048095889c162e1330df0631423fc547409 |
| Consumption Report (Jan 21 2025 – Feb 20 2026).xls | February 2026 | 4d2958d93d4650fc4a70f70663fe6943e8c11d61b2824512da296e8fd84e5bb9 |
These domains serve as C2 infrastructure for various malware families, including the new Rust-based BlackBeard and the evolving Phoenix line.
Port 1269/1259 – UDPGangster communication
Hardcoded UDPGangster C2
Phoenix C2
BlackBeard C2
This list includes the core Phoenix, BlackBeard, UDPGangster, LampoRAT and Nuso implants, their specialized loaders, and the initial malicious documents.
| Category | SHA256 Hash |
| BlackBeard Variant | 156b325231742a73ded4104fbde1c55ad3913d2eaf09b5194ef74c81ee3ba393 |
| BlackBeard Variant | cc2ec568f978f328b6de112670a1b35ca1f9db377ff32cb9d313a5b2ac3c127b |
| BlackBeard Variant (Reddit.exe) | 7523e53c979692f9eecff6ec760ac3df5b47f172114286e570b6bba3b2133f58 |
| BlackBeard Variant (Reddit.exe) | 0be499354dc498248d27f6d186eb3bb75a607ae4a2c0a6734c76f1a1b7b1d316 |
| LampoRAT | 81a6e6416eb7ab6ce6367c6102c031e2ae2730c3c50ab9ce0b8668fec3487848 |
| Loader/Injector | 47bb271c34210f52e3e08339a0c83688d9e9aa5c7cfc45b3e4bdffd1753f6cb2 |
| Nuso Variant | 1b9e6fe4b03285b2e768c57e320d84323ac9167598395918d56a12e568b0009a |
| Nuso Variant | 9c207c51c448f96eaae91241a39c8bb85e2307f2d2a99244763a53176cf4c02f |
| Nuso Variant | c91413ad7c94c0e2694862b9d671d1204873bf65576ba2cb91fbd562a4ccf79b |
| Phoenix v4/Mononoke | 668dd5b6fb06fe30a98dd59dd802258b45394ccd7cd610f0aaab43d801bf1a1e |
| Phoenix v4/Mononoke | 5ec5a2adaa82a983fcc42ed9f720f4e894652bd7bd1f366826a16ac98bb91839 |
| Rust Payload (BlackBeard) | a2001892410e9f34ff0d02c8bc9e7c53b0bd10da58461e1e9eab26bdbf410c79 |
| Rust Payload (BlackBeard) | 1bcd8d7dc7bed5873bbdd2822e84e19773a33d659b16587ca9dc6db204447a86 |
| UDPGangster Payload | fc4a7eed5cb18c52265622ac39a5cef31eec101c898b4016874458d2722ec430 |
| GhostBackDoor | 8d2227f2c53d7e22a57e12c45cecdd43dbec08dbc3ab93e74e6df52cdf80548b |
| Context/Malware | PDB Path |
| BlackBeard and generic Phoenix family variants | C:\Users\win10\Desktop\phonix\phoenix\x64\Release\phoenix.pdb |
| LampoRAT | Char.pdb |
| Nuso variant | C:\Users\nuso\source\repos\http_vip\http_vip\f*ckAnalyzor.pdb |
| Nuso variant | C:\Users\nuso\source\repos\http_last_ver\http_last_ver\f*ckAnalyser.pdb |
| Phoenix Dropper and Phoenix Malware | D:\phonix\phoenixV3\phoenixV3\phoenixV2\x64\Release\phoenix.pdb |
| Phoenix v4 variant | C:\Users\win10\Desktop\phoenixV4\phoenixV3\phoenixV2\x64\Release\phoenix.pdb |
| Phoenix v4/Mononoke backdoor | C:\Users\win10\Desktop\phoenixV4\phoenixV3\phoenixV2\x64\Debug\phoenix.pdb |
| UDPGangster (Target: Azerbaijan) | C:\Users\piper\source\repos\udp_3.0 - Copy\x64\release_86\udp_3.0.pdb |
| UDPGangster (Target: Israel) | C:\Users\gangster\source\repos\udp_3.0 - Copy - Copy\x64\release_86\udp_3.0.pdb |
| UDPGangster (Target: Israel) | C:\Users\SURGE\source\repos\udp_3.0 - Copy\x64\release_86\udp_3.0.pdb |
| AES-256-GCM Encryption – Rust Payload | |
| File Hash | 1bcd8d7dc7bed5873bbdd2822e84e19773a33d659b16587ca9dc6db204447a86 |
| IV | ft3mqb65h4hc |
| Key | kqdkc83pe81zmq709c4npejvto9eg20e |
| XOR – C++ Dropper | |
| File Hash | 5323a573e3f423b69ef965dadb3c059879d718b1c9052038ef749868cf361891 |
| Key | jfdghkjfdgklhjdfhgsfd09g9045jlkdfjlkgedfg5949045dfjgdflgljkdfgdf |
| Telegram Bot ID | |
| Value | 8398566164:AAEJbk6EOirZ_ybm4PJ-q8mOpr1RkZx1H7Q |
Nuso is a custom HTTP backdoor family identified as the final payload in Wave 4 of the campaign against an UAE-based energy company. Relying on Dynamic API Resolution rather than standard Import Address Tables (IAT), the malware serves as a highly evasive reconnaissance and command execution tool.

The malware’s full capabilities are analyzed by Group-IB under the name HTTP_VIP.
We analyzed three distinct variants of the Nuso backdoor. The PDB paths in the compiled binaries of the second and third variants show that they are linked:
The presence of the nuso user profile in these paths identifies the developer’s environment. Furthermore, the transition from the misspelled Analyzor in the VIP build to the corrected Analyser in the Last Ver build suggests that a single author has been maintaining and refining the codebase over time.
Our analysis revealed two parallel development lines of VBA Builders, each employing a completely different payload. In this section, we analyze the VBA code and discuss the connection between the two lines.
The Phoenix track represents the group’s primary development line, which delivers the Phoenix and BugSleep malware.
Analysis of the Phoenix macros development track reveals increasing technical maturity. Over the past year, we have observed more than 10 variants, with each subsequent iteration incorporating more complex analysis evasion techniques, several of which we highlight here.
The group’s initial campaigns demonstrated the use of core obfuscation techniques. The early-stage macros that continue to characterize the group’s operations include:
This variant introduced a custom hex-shift rotation cipher to decrypt the payload and implements the same drop-rename workflow:
This rotation pattern is shown in Figure 14.

Decoding the hexadecimal string in the above code snippet provides the malware’s path:
Figure 15 shows the stages of the “drop-rename” Novaservice variant.

Cortex XDR’s Behavioral Threat Protection is designed to block high-severity “drops and executes” actions by identifying abnormal behavior by the VBA script. While VBA scripts are capable of launching executables, it is not their intended behavior. Figure 16 shows the alert that is triggered.

Other features of the macros identified in more recent campaigns include:

The UDPGangster backdoor operates in parallel to the Phoenix lineage, and was previously analyzed by Fortinet.
Comparative analysis of the dropper code reveals that UDPGangster and Novaservice share identical decryption routines and similar file paths. This overlap confirms that both malware families originate from a shared development pipeline.
Both VBA builders rely on the DSDSDSDS decryption function, stash their payloads in the same UserForm1.TextBox1 location and utilize an identical hex string starting with 4A4163. The hex decodes to one of the following locations for the drop path:
Figure 18 shows these functions.

Recently tracked by the Israeli National Cyber Directorate (INCD) as BlackBeard, this Rust-based backdoor marks a strategic shift toward memory-safe languages to complicate reverse engineering efforts. Despite the new language, its intermediate C++ loader contains PDB paths referencing phoenix, strongly suggesting it was developed by the same Boggy Serpens cell.
The intermediate C++ stager is built for stealth. It employs dynamic API resolution, string obfuscation (addition ciphers), and Fibonacci-based CPU delays to defeat sandboxes. The stager decrypts the final Rust payload using a hardcoded XOR key and executes it in memory using process hollowing (RunPE).
The deployed payload is the BlackBeard malware. Figure 19 illustrates this XOR decryption routine.

Figure 20 illustrates how Cortex XDR’s Behavioral Threat Protection caught a suspicious PE injection to a remote process. This is a critical detection for any security team, because process injection is a well-known method for evading EDR tools and escalating privileges by executing malicious code within the memory space of a trusted, legitimate process.

The self-signed Rust binary initiates its execution by scanning the %PROGRAMDATA% directory for over 15 distinct security products. The BlackBeard payload operates through several modules:
Figure 21 shows the registry key that ensures malware execution.
