MuddyWatter Strikes Again: New BugSleep Malware Targets Global Networks
MuddyWatter, the Iranian-backed hacking group, has rolled out a new malware called BugSleep. This custom-tailored implant is being distributed through slick phishing emails masquerading as webinar invitations. With targets ranging from government entities to airlines, BugSleep is the latest tool in their cyber-espionage arsenal.
Hot Take:
Who knew that MuddyWatter could make a splash in cybersecurity with their new malware, BugSleep? Sounds like they’ve been binge-watching too many hacker movies and decided to add “trial-and-error” flair to their nefarious activities. Someone should tell them they’re not auditioning for ‘Hackers: The Sequel.’
Key Points:
– MuddyWatter, an Iranian-backed hacking group, has introduced a new malware implant called BugSleep.
– BugSleep is being deployed through phishing emails disguised as invitations to webinars or online courses.
– The malware uses a custom loader to inject itself into common applications like Microsoft Edge and Google Chrome.
– This shift marks a move away from using legitimate Remote Management Tools (RMM) for maintaining network access.
– The group targets various sectors worldwide, including government, municipalities, airlines, and media outlets.