The Iranian nation-state actor, MuddyWater, has been using a new command-and-control (C2) framework called MuddyC2Go in cyber espionage attacks on the telecommunications sector in Egypt, Sudan, and Tanzania. The activity, also tracked as Seedworm, involves a Golang-based tool replacing PhonyC2 and MuddyC3. MuddyWater, linked to Iran’s Ministry of Intelligence and Security, has been active since at least 2017, primarily targeting entities in the Middle East. The attacks involve the use of SimpleHelp, Venom Proxy, a custom keylogger, and other publicly available tools, aiming to evade detection and achieve strategic objectives. The latest intrusions occurred in November 2023. Symantec recommends organizations to be vigilant regarding the suspicious use of PowerShell on their networks.
Trending
New Leadership Appointed for Kenya’s Electric Mobility Sector
Kenya Pipeline and Syokinet Unveil 1.6 Tbps Capacity on New Fiber Line
iPhone 16 Review: Apple’s Most Advanced Smartphone Yet, Redefining Performance and Innovation
Lobby Group Files Lawsuit Against Safaricom and CA Over Starlink
Vivo Y28 Launches in Kenya: Features MediaTek G85 SoC, 6,000mAh Battery – Price and Specifications
Selected Startups for Britam’s BetaLab Incubation Programme Revealed
TCL Unveils C855 QD-Mini LED TV in Kenya
TCL C655 QLED TV: Features and Availability in Kenya
Greenspoon Partners with Roam Electric Motorcycles for Speedier Deliveries
CloudPay, a payment solutions firm, raises $120 million in funding to expand its global customer base