{"id":7498,"date":"2022-03-01T09:53:42","date_gmt":"2022-03-01T17:53:42","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7498"},"modified":"2022-03-01T12:58:18","modified_gmt":"2022-03-01T20:58:18","slug":"joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/","title":{"rendered":"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Cyber Command Cyber National Mission Force (CNMF), and the United Kingdom\u2019s National Cyber Security Centre (NCSCUK) have called out the MuddyWater threat actors and their involvement in cyber espionage and malicious cyber operations. <\/span><a href=\"https:\/\/attack.mitre.org\/groups\/G0069\"><span style=\"font-weight: 400;\">MuddyWater<\/span><\/a><span style=\"font-weight: 400;\"> is an Iranian threat group that has primarily targeted Middle Eastern nations, and has also targeted European and North American nations. Activity from the MuddyWater group was previously linked to <\/span><a href=\"https:\/\/attack.mitre.org\/groups\/G0046\"><span style=\"font-weight: 400;\">FIN7<\/span><\/a><span style=\"font-weight: 400;\">, but the group is believed to be a distinct group, possibly motivated by espionage. Per MITRE ATT&amp;CK, MuddyWater is also known to cyber defenders as Earth Vetala, MERCURY, Static Kitten, Seedworm, TEMP.Zagros. The MuddyWater victims are mainly in the telecommunications, government (IT services), and oil sectors. These malicious activities are happening worldwide and have been observed and documented in Asia, Africa, Europe, and North America.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the past, MuddyWater relied heavily on spear phishing. Spear phishing uses email communications which are designed to penetrate and compromise the resources of the targeted individual, business, or government agency. The MuddyWater threat actors would send a carefully targeted email to the target organization. Once the target organization\u2019s networks have been successfully penetrated, then MuddyWater moves to steal legitimate documents from the compromised systems. These legitimate documents are, in turn, weaponized and then used to continue further distribution to other victims to produce a cascade of information compromise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MuddyWater creates socially engineered malicious documents which frequently deliver their \u201cPOWERSTATS\u201d as a first stage backdoor. The POWERSTATS backdoor can receive commands from the attackers and then enable a wide variety of malicious activities.\u00a0 MuddyWater has evolved this attack over the years and moved to also deliver second stage executables which are not written in PowerShell.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MuddyWater threat actors maintain persistence on victim networks via tactics such as side-loading dynamic link libraries (DLLs) which can to trick legitimate programs into running malware, and obfuscating PowerShell scripts to hide command and control (C2) functions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The government agencies behind the <\/span><a href=\"https:\/\/media.defense.gov\/2022\/Feb\/24\/2002944274\/-1\/-1\/0\/CSA_AA22-055A_Iranian_Government-Sponsored_Actors_Conduct_Cyber_Operations.PDF\"><span style=\"font-weight: 400;\">Joint Cybersecurity Advisory<\/span><\/a><span style=\"font-weight: 400;\"> have all observed MuddyWater threat actors using various malware variants of PowGoop, Small Sieve, Canopy (also known as Starwhale), Mori, and POWERSTATS as mentioned earlier, along with other tools to support their malicious criminal activity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This important <\/span><a href=\"https:\/\/media.defense.gov\/2022\/Feb\/24\/2002944274\/-1\/-1\/0\/CSA_AA22-055A_Iranian_Government-Sponsored_Actors_Conduct_Cyber_Operations.PDF\"><span style=\"font-weight: 400;\">Joint Cybersecurity Advisory<\/span><\/a><span style=\"font-weight: 400;\"> provides observed tactics, techniques, and procedures (TTPs); malware; and indicators of compromise (IOCs) associated with this Iranian government-sponsored APT activity to aid organizations in the identification of malicious activity against sensitive networks. MITRE ATT&amp;CK references are used to help disambiguate the TTPs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Joint Cybersecurity Advisory recommends mitigations to include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Protective Controls and Architecture.<\/b><span style=\"font-weight: 400;\"> Deploy application control software to limit the applications and executable code that can be run by users. Email attachments and files downloaded via links in emails often contain executable code.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Identity and Access Management. <\/b><span style=\"font-weight: 400;\">Use multifactor authentication where possible, particularly for webmail, virtual private networks, and accounts that access critical systems.\u00a0 Limit the use of administrator privileges. Users who browse the internet, use email, and execute code with administrator privileges make for excellent spear phishing targets because their system\u2014once infected\u2014enables attackers to move laterally across the network, gain additional privileges, and access highly sensitive information.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Phishing Protection.<\/b><span style=\"font-weight: 400;\"> Enable antivirus and anti-malware software and update signature definitions in a timely manner. Well-maintained antivirus software may prevent use of commonly deployed attacker tools that are delivered via spear phishing.\u00a0 Be suspicious of unsolicited contact via email or social media from any individual you do not know personally. Do not click on hyperlinks or open attachments in these communications.\u00a0 Consider adding an email banner to emails received from outside your organization and disabling hyperlinks in received emails.\u00a0 Train users through awareness and simulations to recognize and report phishing and social engineering attempts. Identify and suspend access of user accounts exhibiting unusual activity.\u00a0 Adopt threat reputation services at the network device, operating system, application, and email service levels. Reputation services can be used to detect or prevent low-reputation email addresses, files, URLs, and IP addresses used in spear phishing attacks.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Vulnerability and Configuration Mgmt.<\/strong> Install updates\/patch operating systems, software, and firmware as soon as updates\/patches are released. Prioritize patching known exploited vulnerabilities.<\/span><\/li>\n<\/ul>\n<h3><b>DNS Security is Mainstream &#8211; don\u2019t be a Late Adopter!<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Using a DNS security solution like Infoblox\u2019s <\/span><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">BloxOne\u00ae Threat Defense<\/span><\/a><span style=\"font-weight: 400;\"> as part of defense in depth to mitigate threats, including Phishing attacks, is highly recommended. Coupled with Microsoft\u2019s recommendations for multifactor authentication, the audit of delegated admin privileges, and more, BloxOne Threat Defense would enhance a strong ecosystem for hardened defense against sophisticated threats.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DNS security is designed to prevent users\u2019 connection to malicious destinations, and to detect anomalous behaviors in the network such as C&amp;C communications, phishing, advanced persistent threat activity, domain generation algorithm (DGA) activity, botnet communications, DNS tunneling, and data exfiltration. BloxOne Threat Defense combines advanced analytics based on machine learning, highly accurate and aggregated threat intelligence and automation to detect and prevent a broad range of threats, including DGA families, data exfiltration, look-alike domain use and many others.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, Infoblox DNS security integrates with Security Orchestration Automation and Remediation (SOAR) systems, ITSM solutions, vulnerability scanners and other security ecosystem tools to trigger remediation actions automatically when any malicious activity is detected. This helps speed up an organization\u2019s response to security events and provides rapid threat containment.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Analyzing DNS logs is a highly effective way to see what resources a client has been accessing historically. DHCP fingerprint and IPAM metadata provide contextual information on compromised devices such as type of device, OS information, network location and current and historical IP address allocations. All this information helps with event correlation and understanding the scope of a breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To find out more about our programs and products please reach out to us via <\/span><a href=\"https:\/\/info.infoblox.com\/contact-sales.html\"><span style=\"font-weight: 400;\">https:\/\/info.infoblox.com\/contact-sales.html<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.cisa.gov\/shields-up\"><span style=\"font-weight: 400;\">Shields Up | CISA<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past year, cyber incidents have impacted many companies, non-profits, and other organizations, large and small, across multiple sectors of the economy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">www.cisa.gov<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Cyber Command Cyber National Mission Force (CNMF), and the United Kingdom\u2019s National Cyber Security Centre (NCSCUK) have called out the MuddyWater threat actors and their involvement in cyber espionage and malicious cyber operations. MuddyWater is an Iranian threat group that [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":6962,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[648,649,650,345,651,652],"class_list":{"0":"post-7498","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-muddywater","9":"tag-fin7","10":"tag-spear-fishing","11":"tag-spearfishing","12":"tag-powerstats","13":"tag-joint-cybersecurity-advisory","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater<\/title>\n<meta name=\"description\" content=\"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Cyber Command Cyber National Mission Force (CNMF), and the United Kingdom\u2019s National Cyber Security Centre (NCSCUK) have called out the MuddyWater threat actors and their involvement in cyber espionage and malicious cyber operations. MuddyWater is an Iranian threat group that has primarily targeted Middle Eastern nations, and has also targeted European and North American nations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater\" \/>\n<meta property=\"og:description\" content=\"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Cyber Command Cyber National Mission Force (CNMF), and the United Kingdom\u2019s National Cyber Security Centre (NCSCUK) have called out the MuddyWater threat actors and their involvement in cyber espionage and malicious cyber operations. MuddyWater is an Iranian threat group that has primarily targeted Middle Eastern nations, and has also targeted European and North American nations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-01T17:53:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-01T20:58:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater\",\"datePublished\":\"2022-03-01T17:53:42+00:00\",\"dateModified\":\"2022-03-01T20:58:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/\"},\"wordCount\":1043,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guloader-delivers-remcos-rat.jpg\",\"keywords\":[\"MuddyWater\",\"FIN7\",\"spear fishing\",\"spearfishing\",\"POWERSTATS\",\"Joint Cybersecurity Advisory\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/\",\"name\":\"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guloader-delivers-remcos-rat.jpg\",\"datePublished\":\"2022-03-01T17:53:42+00:00\",\"dateModified\":\"2022-03-01T20:58:18+00:00\",\"description\":\"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Cyber Command Cyber National Mission Force (CNMF), and the United Kingdom\u2019s National Cyber Security Centre (NCSCUK) have called out the MuddyWater threat actors and their involvement in cyber espionage and malicious cyber operations. MuddyWater is an Iranian threat group that has primarily targeted Middle Eastern nations, and has also targeted European and North American nations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guloader-delivers-remcos-rat.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/guloader-delivers-remcos-rat.jpg\",\"width\":612,\"height\":408,\"caption\":\"Cyber protection shield icon on server room background. Information Security and virus detection.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater","description":"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Cyber Command Cyber National Mission Force (CNMF), and the United Kingdom\u2019s National Cyber Security Centre (NCSCUK) have called out the MuddyWater threat actors and their involvement in cyber espionage and malicious cyber operations. MuddyWater is an Iranian threat group that has primarily targeted Middle Eastern nations, and has also targeted European and North American nations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/","og_locale":"en_US","og_type":"article","og_title":"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater","og_description":"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Cyber Command Cyber National Mission Force (CNMF), and the United Kingdom\u2019s National Cyber Security Centre (NCSCUK) have called out the MuddyWater threat actors and their involvement in cyber espionage and malicious cyber operations. MuddyWater is an Iranian threat group that has primarily targeted Middle Eastern nations, and has also targeted European and North American nations.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/","og_site_name":"Infoblox Blog","article_published_time":"2022-03-01T17:53:42+00:00","article_modified_time":"2022-03-01T20:58:18+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater","datePublished":"2022-03-01T17:53:42+00:00","dateModified":"2022-03-01T20:58:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/"},"wordCount":1043,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg","keywords":["MuddyWater","FIN7","spear fishing","spearfishing","POWERSTATS","Joint Cybersecurity Advisory"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/","url":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/","name":"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg","datePublished":"2022-03-01T17:53:42+00:00","dateModified":"2022-03-01T20:58:18+00:00","description":"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Cyber Command Cyber National Mission Force (CNMF), and the United Kingdom\u2019s National Cyber Security Centre (NCSCUK) have called out the MuddyWater threat actors and their involvement in cyber espionage and malicious cyber operations. MuddyWater is an Iranian threat group that has primarily targeted Middle Eastern nations, and has also targeted European and North American nations.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/guloader-delivers-remcos-rat.jpg","width":612,"height":408,"caption":"Cyber protection shield icon on server room background. Information Security and virus detection."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/joint-cybersecurity-advisory-malicious-activity-attributed-to-iranian-government-sponsored-threat-actor-muddywater\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Joint Cybersecurity Advisory\u2014Malicious Activity Attributed to Iranian Government-Sponsored Threat Actor MuddyWater"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7498"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7498\/revisions"}],"predecessor-version":[{"id":7504,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7498\/revisions\/7504"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6962"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}