Skip to content

US Cyber Command exposes hacking tools used by Iranian intelligence

  • by
  • 2 min read

The US Cyber Command has identified and disclosed several open-source tools that Iranian intelligence actors, known as MuddyWater, are using to infiltrate networks worldwide. 

MuddyWater is an Iran-based threat group previously reported to be targetting Middle Eastern nations and several European and North American countries. The group is considered a branch of the Iranian Ministry of Intelligence and Security, which, in the words of the Congressional Research Service, “conducts domestic surveillance to identify regime opponents”.

The disclosure is aimed at helping people identity MuddyWater’s infiltrations in their network. Should a network operator or administrator identify any of these tools on their network, it can be a good indication of the presence of Iranian cyber actors.

In the News: Europol ordered to delete data of individuals with no criminal activity

Identifying malicous actors in networks

The Cyber Command also unveiled some technical aspects of how these threat actors could be using malware in target networks. These include side-loading DLLs to hijack legitimate programs to run malware and muddling Powershell scripts to hide their traces and any command and control functions.

Additionally, samples of different parts of the suite used by MuddyWater as well as JavaScript files used to establish connections back to the host infrastructure have been submitted to Virus Total.

  • PowGoop Samples: The detected samples are part of the PowGoop instance which hides malicious processes in legitmate ones. In this instance, a file called Goopdate.dll hides communication with the threat actors’ servers by executing with the legitimate Google Update Service.
  • PowGoop DLL sideloading vaiants: Uses the aforementioend technique to de-obfuscate files and decode Powershell scripts. The code has been previously used for espionage and ransomware and uses different naming convenctions to avoid antivirus and manual detections. 
  • PowGoop Loader variants: Instances of these files can also indicate the presence of a threat actor in your network. They also de-obfuscate Powershell scripts that allow attacker command and control functionality.
  • PowGoop C2 Beacon variants: These files establish contact between the target network and the malicious host.
  • JavaScript samples: The samples issue a GET request to the malicious host servers.
  • Mori Backdoor samples: The presence of the sample is an indicator of the network already being compromised. The Mori backdoor is used by threat actors for espionage. It uses DNS tunneling to communicate with the command and control infrastructure. 

In the News: North Korean hackers infiltrate Russian Foreign Affairs Ministry

Yadullah Abidi

Yadullah Abidi

Yadullah is a Computer Science graduate who writes/edits/shoots/codes all things cybersecurity, gaming, and tech hardware. When he's not, he streams himself racing virtual cars. He's been writing and reporting on tech and cybersecurity with websites like Candid.Technology and MakeUseOf since 2018. You can contact him here: