Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks

Share:

The Iranian nation-state actor known as MuddyWater has been observed using a never-before-seen backdoor as part of a recent attack campaign, shifting away from its well-known tactic of deploying legitimate remote monitoring and management (RMM) software for maintaining persistent access.

That’s according to independent findings from cybersecurity firms Check Point and Sekoia, which have codenamed the malware strain BugSleep and MuddyRot, respectively.

“Compared to previous campaigns, this time MuddyWater changed their infection chain and did not rely on the legitimate Atera remote monitoring and management tool (RRM) as a validator,” Sekoia said in a report shared with The Hacker News. “Instead, we observed that they used a new and undocumented implant.”

Some elements of the campaign were first shared by Israeli cybersecurity company ClearSky on June 9, 2024. Targets include countries like Turkey, Azerbaijan, Jordan, Saudi Arabia, Israel, and Portugal

MuddyWater (aka Boggy Serpens, Mango Sandstorm, and TA450) is a state-sponsored threat actor that’s assessed to be affiliated with Iran’s Ministry of Intelligence and Security (MOIS).

Cyber attacks mounted by the group have been fairly consistent, leveraging spear-phishing lures in email messages to deliver various RMM tools like Atera Agent, RemoteUtilities, ScreenConnect, SimpleHelp, and Syncro.

Earlier this April, HarfangLab said it noticed an uptick in MuddyWater campaigns delivering Atera Agent since late October 2023 to businesses across Israel, India, Algeria, Turkey, Italy, and Egypt. The sectors targeted include airlines, IT companies, telecoms, pharma, automotive manufacturing, logistics, travel, and tourism.

“MuddyWater places a high priority on gaining access to business email accounts as part of their ongoing attack campaigns,” the French cybersecurity firm noted at the time.

Middle East Cyber Attacks

“These compromised accounts serve as valuable resources, enabling the group to enhance the credibility and effectiveness of their spear-phishing efforts, establish persistence within targeted organizations, and evade detection by blending in with legitimate network traffic.”

The latest attack chains are no different in that compromised email accounts belonging to legitimate companies are used to send spear-phishing messages that either contain a direct link or a PDF attachment pointing to an Egnyte subdomain, which has been previously abused by the threat actor to propagate Atera Agent.

BugSleep, aka MuddyRot, is an x64 implant developed in C that comes equipped with capabilities to download/upload arbitrary files to/from the compromised host, launch a reverse shell, and set up persistence. Communications with a command-and-control (C2) server take place over a raw TCP socket on port 443.

“The first message to be sent to the C2 is the victim host fingerprint, which is the combination of the hostname and the username joined by a slash,” Sekoia said. “If the victim received ‘-1,’ the program stops, otherwise the malware enters in an infinite loop to await new order from the C2.”

It’s currently not clear why MuddyWater has switched to using a bespoke implant, although it’s suspected that the increased monitoring of RMM tools by security vendors may have played a part.

“The increased activity of MuddyWater in the Middle East, particularly in Israel, highlights the persistent nature of these threat actors, who continue to operate against a wide variety of targets in the region,” Check Point said.

“Their consistent use of phishing campaigns, now incorporating a custom backdoor, BugSleep, marks a notable development in their techniques, tactics, and procedures (TTPs).”

Ravie Lakshmanan

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
2:12 pm, Jun 28, 2025
weather icon 28°C
L: 27° | H: 29°
broken clouds
Humidity: 59 %
Pressure: 1023 mb
Wind: 7 mph W
Wind Gust: 13 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 52%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:45 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
27° | 29°°C 0 mm 0% 12 mph 69 % 1025 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
18° | 31°°C 0 mm 0% 7 mph 83 % 1025 mb 0 mm/h
Mon Jun 30 10:00 pm
weather icon
21° | 36°°C 1 mm 100% 8 mph 67 % 1021 mb 0 mm/h
Tue Jul 01 10:00 pm
weather icon
21° | 32°°C 0.74 mm 74% 12 mph 73 % 1019 mb 0 mm/h
Wed Jul 02 10:00 pm
weather icon
17° | 25°°C 1 mm 100% 18 mph 85 % 1021 mb 0 mm/h
Today 4:00 pm
weather icon
26° | 27°°C 0 mm 0% 12 mph 56 % 1023 mb 0 mm/h
Today 7:00 pm
weather icon
25° | 26°°C 0 mm 0% 11 mph 55 % 1023 mb 0 mm/h
Today 10:00 pm
weather icon
22° | 22°°C 0 mm 0% 8 mph 69 % 1025 mb 0 mm/h
Tomorrow 1:00 am
weather icon
20° | 20°°C 0 mm 0% 7 mph 76 % 1025 mb 0 mm/h
Tomorrow 4:00 am
weather icon
18° | 18°°C 0 mm 0% 5 mph 83 % 1025 mb 0 mm/h
Tomorrow 7:00 am
weather icon
19° | 19°°C 0 mm 0% 5 mph 75 % 1025 mb 0 mm/h
Tomorrow 10:00 am
weather icon
24° | 24°°C 0 mm 0% 5 mph 53 % 1025 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
29° | 29°°C 0 mm 0% 6 mph 40 % 1024 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€91,611.50
0.53%
Ethereum(ETH)
€2,071.89
-0.24%
Tether(USDT)
€0.85
-0.01%
XRP(XRP)
€1.87
4.84%
Solana(SOL)
€125.16
3.37%
USDC(USDC)
€0.85
-0.01%
Dogecoin(DOGE)
€0.138164
1.34%
Shiba Inu(SHIB)
€0.000009
2.15%
Pepe(PEPE)
€0.000008
2.18%
Scroll to Top