Back

MuddyWater's Operation Olalampo Targets MENA Region with New Malware

Severity: High (Score: 77.0)

Sources: Circleid, main.whoisxmlapi.com, www.group-ib.com

Summary

MuddyWater, an advanced persistent threat (APT) group, has launched 'Operation Olalampo,' targeting organizations and individuals in the MENA region amid ongoing geopolitical tensions. The operation involves the deployment of new malware variants and the use of Telegram bots for command-and-control (C&C) purposes. Group-IB identified seven indicators of compromise (IoCs), including four domains and three IP addresses, all of which were confirmed to lack legitimate ownership. Investigations revealed extensive historical data for the domains and IPs, indicating potential victim communications. The threat actors' tactics and tools suggest a sophisticated approach to cyber operations. The current status of the campaign remains active, with ongoing analysis and threat detection efforts recommended. A sample of the findings is available for further investigation. Key Points: • MuddyWater's Operation Olalampo targets the MENA region using new malware and Telegram bots. • Seven IoCs identified, including four domains and three IP addresses, all with no legitimate ownership. • Ongoing investigations reveal extensive historical data linked to the identified IoCs.

Key Entities

  • MuddyWater (apt_group)
  • Malware (attack_type)
  • Operation Olalampo (campaign)
  • T1071 - Application Layer Protocol (mitre_attack)
  • Telegram (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed