Iran’s MuddyWater Hacker Group is Exploiting New Malware

This article has been indexed from

CySecurity News – Latest Information Security and Hacking Incidents

 

According to a notice issued by US security and law enforcement authorities, Iran-linked cyber activities are targeting a variety of government and private organizations in several areas across Asia, Africa, Europe, and North America.
“MuddyWater actors are poised to deliver stolen data and access to the Iranian government, as well as to share them with other cybercriminal actors,” the agencies stated. The FBI, the Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Cyber Command Cyber National Mission Force (CNMF), and the National Cyber Security Centre of the United Kingdom have issued a combined advisory (NCSC) in the regard.
This year, the cyber-espionage actor was revealed to be working for Iran’s Ministry of Intelligence and Security (MOIS), conducting malicious operations against a wide range of state and private organisations in Asia, Africa, Europe, and North America, including telecommunications, defence, local government, and the oil and natural gas sectors. 
MuddyWater is also known by the aliases Earth Vetala, MERCURY, Static Kitten, Seedworm, and TEMP. Aside from publicly disclosed vulnerabilities, the hacker group has already been seen using open-source tools to get access to sensitive information, deliver ransomware, and maintain resilience on victim networks. 
Late last month, Cisco Talos conducted a follow-up analysis and discovered a previously unknown malware campaign focused on Turkis

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: