MuddyC2Go: New C2 Framework Iranian Hackers Using Against Israel

Cyber Security

Products You May Like

Nov 09, 2023NewsroomCyber Attack / Malware

Iranian nation-state actors have been observed using a previously undocumented command-and-control (C2) framework called MuddyC2Go as part of attacks targeting Israel.

“The framework’s web component is written in the Go programming language,” Deep Instinct security researcher Simon Kenin said in a technical report published Wednesday.

The tool has been attributed to MuddyWater, an Iranian state-sponsored hacking crew that’s affiliated to the country’s Ministry of Intelligence and Security (MOIS).

Cybersecurity

The cybersecurity firm said the C2 framework may have been put to use by the threat actor since early 2020, with recent attacks leveraging it in place of PhonyC2, another custom C2 platform from MuddyWater that came to light in June 2023 and has had its source code leaked.

Typical attack sequences observed over the years have involved sending spear-phishing emails bearing malware-laced archives or bogus links that lead to the deployment of legitimate remote administration tools.

The installation of the remote administration software paves the way for the delivery of additional payloads, including PhonyC2.

MuddyWater’s modus operandi has since received a facelift, using password-protected archives to evade email security solutions and distributing an executable instead of a remote administration tool.

“This executable contains an embedded PowerShell script that automatically connects to MuddyWater’s C2, eliminating the need for manual execution by the operator,” Kenin explained.

Cybersecurity

The MuddyC2Go server, in return, sends a PowerShell script, which runs every 10 seconds and waits for further commands from the operator.

While the full extent of MuddyC2Go’s features are unknown, it’s suspected to be a framework that’s responsible for generating PowerShell payloads in order to conduct post-exploitation activities.

“We recommend disabling PowerShell if it is not needed,” Kenin said. “If it is enabled, we recommend close monitoring of PowerShell activity.”

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Products You May Like

Articles You May Like

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns
X Down? Several Users Report Outage Across the Globe, Including India
Infinix Hot 50 5G India Launch Date Set for September 5; Design, Key Features Revealed Ahead of Debut
NCLT Approves Merger of Viacom 18, Star India After CCI Nod
The sneaky way Big Tech is acquiring AI unicorns without buying the companies

Leave a Reply

Your email address will not be published. Required fields are marked *