Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape
💧

MuddyWater

Aliases

MuddyWater (CHKP), Mango Sandstorm (MS), Mercury (MS)

Tags
State-Sponsored
Attribution
🇮🇷/MOIS
Incidents
MuddyWater cloud destruction operation
Last edited
Jun 24, 2025 10:49 AM
Status
Finalized
Cloud-fluent
Targeted geography
Middle East

MuddyWater, also known as MERCURY, Static Kitten, Seedworm, and TEMP.Zagros, is a cyber espionage group assessed to be a subordinate element within Iran's Ministry of Intelligence and Security (MOIS). Active since at least 2017, MuddyWater has targeted a range of government and private organizations across sectors, including telecommunications, local government, defense, and oil and natural gas organizations, in the Middle East, Asia, Africa, Europe, and North America.

The group employs various tactics, techniques, and procedures (TTPs) to infiltrate and persist within target networks. These include exploiting publicly reported vulnerabilities, using open-source tools, and deploying malware such as PowGoop, Small Sieve, Canopy (also known as Starwhale), Mori, and POWERSTATS. MuddyWater actors have been observed maintaining persistence on victim networks via tactics such as side-loading dynamic link libraries (DLLs) to trick legitimate programs into running malware and obfuscating PowerShell scripts to hide command and control functions.

In addition to cyber espionage, MuddyWater has been linked to ransomware deployments, indicating a multifaceted threat profile. The group's activities underscore the importance of robust cybersecurity measures, including timely patching of vulnerabilities, user training to recognize phishing attempts, and the implementation of multi-factor authentication.

Made with 💙 by Wiz

Last Updated: April 3, 2025