Muddy water is a very capable APT group active since 2017, and has recently resurfaced, targeting various organizations. It’s main focus is to target government organizations in the Middle East but it has targeted various organizations in US and Europe as well.
The threat actors dig up actionable information about their targets, meanwhile preferring speed over operational security. The first trace of this threat actor was a public Github repository containing scripts that very closely match those observed in Seedworm operations.
Threat indicators associated with this new campaign are given below.
Indicators of Compromise
IP(s) / Hostname(s)
Malware Hash (MD5/SHA1/SH256)