Descripción
MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign The Iranian hacking group known as MuddyWater has been observed leveraging a new backdoor dubbed that uses the User Datagram Protocol (UDP) for command-and-control (C2) purposes. cyber espionage activity targeted users Turkey, Israel, and Azerbaijan, according to report from Fortinet FortiGuard Labs. "This malware enables remote control of compromised systems by allowing attackers execute commands, exfiltrate files, deploy additional payloads – all communicated through UDP channels designed evade traditional network defenses," security researcher Cara Lin said . attack chain involves using spear-phishing tactics distribute booby-trapped Microsoft Word documents trigger execution malicious payload once macros are enabled. Some phishing messages impersonate Turkish Republic Northern Cyprus Ministry Foreign Affairs purport invite recipients an online seminar titled "Presidential Elections a...
https://thehackernews.com/2025/12/muddywater-deploys-udpgangster-backdoor.html