• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
muddyc2go: new c2 framework iranian hackers using against israel

MuddyC2Go: New C2 Framework Iranian Hackers Using Against Israel

You are here: Home / General Cyber Security News / MuddyC2Go: New C2 Framework Iranian Hackers Using Against Israel
November 9, 2023

Iranian country-condition actors have been noticed working with a earlier undocumented command-and-manage (C2) framework termed MuddyC2Go as section of attacks focusing on Israel.

“The framework’s web part is prepared in the Go programming language,” Deep Intuition security researcher Simon Kenin mentioned in a technological report released Wednesday.

The resource has been attributed to MuddyWater, an Iranian condition-sponsored hacking crew which is affiliated to the country’s Ministry of Intelligence and Security (MOIS).

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The cybersecurity business stated the C2 framework may possibly have been put to use by the threat actor given that early 2020, with recent attacks leveraging it in location of PhonyC2, an additional tailor made C2 system from MuddyWater that came to gentle in June 2023 and has had its resource code leaked.

Typical attack sequences observed above the years have involved sending spear-phishing e-mail bearing malware-laced archives or bogus one-way links that direct to the deployment of legit distant administration tools.

The installation of the remote administration program paves the way for the shipping of extra payloads, which include PhonyC2.

MuddyWater’s modus operandi has since received a facelift, working with password-shielded archives to evade email security remedies and distributing an executable instead of a remote administration device.

“This executable is made up of an embedded PowerShell script that instantly connects to MuddyWater’s C2, eradicating the will need for handbook execution by the operator,” Kenin explained.

Cybersecurity

The MuddyC2Go server, in return, sends a PowerShell script, which runs every 10 seconds and waits for even further instructions from the operator.

Though the whole extent of MuddyC2Go’s characteristics are not known, it truly is suspected to be a framework which is dependable for building PowerShell payloads in order to conduct post-exploitation routines.

“We propose disabling PowerShell if it is not wanted,” Kenin claimed. “If it is enabled, we advise close monitoring of PowerShell exercise.”

Uncovered this report appealing? Adhere to us on Twitter  and LinkedIn to browse extra unique articles we write-up.


Some pieces of this write-up are sourced from:
thehackernews.com

Previous Post: «cisa alerts: high severity slp vulnerability now under active exploitation CISA Alerts: High-Severity SLP Vulnerability Now Under Active Exploitation
Next Post: When Email Security Meets SaaS Security: Uncovering Risky Auto-Forwarding Rules when email security meets saas security: uncovering risky auto forwarding rules»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.