New MuddyWater Campaign Hits Israeli Targets
The victims in Israel span multiple industries, including technology, engineering, manufacturing, local government, and education.

The victims in Israel span multiple industries, including technology, engineering, manufacturing, local government, and education.
December 1, 2025 | 2 min read

A new, technically advanced campaign by the Iran-aligned cyberespionage group known as MuddyWater has been targeting critical infrastructure organizations in Israel and deploying a new backdoor called MuddyViper that’s used for persistence and data theft.
The victims in Israel span multiple industries, including technology, engineering, manufacturing, local government, and education. Researchers at ESET, who identified the campaign, also have found at least one victim in Egypt. MuddyWater, which is linked to the Ministry of Intelligence and National Security of Iran, continues its focus on attacking government and critical infrastructure organizations. Aside from the deployment of the previously unseen MuddyViper backdoor, this campaign mainly used known tools and techniques that threat researchers are able to identify and contain relatively easily.
This campaign starts with targeted spearphishing emails that often contain PDF attachments that link to installers for legitimate Remote Monitoring and Management (RMM) software, such as Atera, Level, PDQ, and SimpleHelp. The installers are hosted on free file-sharing platforms such as OneHub, Egnyte, or Mega, establishing a foothold in the victim's network.
New and Evolving Toolset
The new campaign showcases a set of previously undocumented, custom tools designed for improved defense evasion and persistence, indicating a technical evolution for the group:
Stealth and Sophistication
Beyond the new malware, the campaign demonstrates increased operational stealth. The developers adopted CNG, the next-generation Windows cryptographic API, a technique that ESET researchers say is unique to Iran-aligned groups. Also, the operators deliberately avoided "hands-on-keyboard" interactive sessions, a noisy historical technique, in favor of a more precise and strategically targeted approach. MuddyWater is one of the more prominent Iran state-backed threat groups and threat intelligence teams have been tracking its activities for more than eight years. The group typically focuses on cyberespionage and often targets Israeli companies and governments organizations.
While some components remain easily detected, ESET’s analysis shows the overall campaign reflects a clear evolution for MuddyWater toward increased precision and a more advanced toolset. This activity follows a pattern of cooperation with other Iran-aligned groups, such as an operational overlap with the Lyceum (OilRig subgroup) campaign in early 2025, which suggests MuddyWater may be acting as an initial access broker.
December 1, 2025 | 2 min read
Dennis Fisher is an award-winning journalist and author. He is one of the co-founders of Decipher and Threatpost and has been writing about cybersecurity since 2000. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. He is the author of 2.5 novels and once met Shaq. Contact: dennis at decipher.sc.