Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenAI Sued for Sharing ChatGPT Data with Google, Class-Action Privacy
May 14, 2026
Langflow CVE-2026-33017 Exploited to Steal AWS Keys and Deploy
May 14, 2026
Packagist: Urgent Composer Update After GitHub Token Leak
May 14, 2026
Home/Threats/MuddyWater Hackers Scan Systems, Hit MuddyWater-Style Before
Threats

MuddyWater Hackers Scan Systems, Hit MuddyWater-Style Before

A sophisticated cyber campaign, exhibiting strong operational similarities to the notorious MuddyWater threat group, has been identified conducting extensive reconnaissance. Threat actors behind this...

David kimber
David kimber
April 15, 2026 3 Min Read
7 0

A sophisticated cyber campaign, exhibiting strong operational similarities to the notorious MuddyWater threat group, has been identified conducting extensive reconnaissance. Threat actors behind this operation

The attack unfolded through a structured, multi-stage process rather than a single opportunistic breach. Attackers began with wide-scale vulnerability reconnaissance and then pivoted to selective credential harvesting before ultimately reaching full data exfiltration.

To carry out the initial scanning phase, the threat actor weaponized at least five newly disclosed CVEs targeting a broad range of systems — from web applications and email servers to IT management platforms and workflow automation tools.

The five exploited vulnerabilities include CVE-2025-54068 (Laravel Livewire RCE), CVE-2025-52691 (SmarterMail RCE), CVE-2025-68613 (n8n RCE), CVE-2025-9316 (Unauthenticated Session ID Generation in RMM systems), and CVE-2025-34291 (Langflow RCE).

Oasis Security researchers identified and analyzed this campaign in detail, tracing attacker-controlled infrastructure back to a server located in the Netherlands with the IP address 157.20.182.49.

Analysts collected a large volume of server-side files from that infrastructure, uncovering modular C2 components, operational scripts, and evidence of coordinated scanning activity.

The timing of the campaign, beginning just weeks before heightened regional tensions, raises clear concerns about the strategic intent driving the operation.

With reconnaissance complete, the threat actor shifted focus toward credential-based intrusion. Attackers launched Outlook Web Access (OWA) brute-force attacks using custom tools including owa.py and multi-threaded attack software like Patator, running targeted username enumeration against specific organizations.

Evidence of successful credential harvesting via OWA brute-force attacks (Source - Oasis)
Evidence of successful credential harvesting via OWA brute-force attacks (Source – Oasis)

These efforts were concentrated on entities in Egypt, Israel, and the United Arab Emirates. In one confirmed case, an Egyptian firefighting enterprise had its employee credentials successfully stolen, while administrator account lists were also recovered from a targeted organization in the UAE.

Administrator account list associated with a targeted organization (Source - Oasis)
Administrator account list associated with a targeted organization (Source – Oasis)

The operation moved beyond access attempts into confirmed data exfiltration, specifically from an aviation organization based in Egypt.

Evidence of staged data exfiltration (Source - Oasis)
Evidence of staged data exfiltration (Source – Oasis)

Roughly 200 staged files were discovered in attacker-controlled directories, containing passport and visa records, payroll and salary data, credit card details, and internal corporate documents.

Additional targeting was identified across entities in Portugal and India, indicating the campaign’s reach extended well beyond the Middle East.

Modular C2 Infrastructure Built for Resilient Control

Among the most technically significant discoveries in this campaign was the Command and Control (C2) architecture the attackers deployed to manage their compromised systems.

Oasis Security’s analysis revealed a multi-layered infrastructure built across different programming languages and communication protocols, deliberately designed to remain functional, adaptable, and difficult to disrupt even if parts of it were discovered by defenders.

TCP-based C2 controller 'tcp_serv[.]py' using a custom BIIH header structure (Source - Oasis)
TCP-based C2 controller ‘tcp_serv[.]py’ using a custom BIIH header structure (Source – Oasis)

The C2 setup included Python-based controllers — tcp_serv.py and udp_3.0.py — alongside Go-based binaries including server and client.exe.

The tcp_serv.py controller was configured to listen and accept inbound connections over TCP port 5009, while the UDP controller followed nearly identical structural patterns.

Both controllers used a distinct custom packet header format known as <BIIH, which appeared consistently across all controller variants identified in attacker-controlled directories.

More advanced HTTP-based controllers were also found, managing encrypted client sessions through API-style endpoints such as /command, /result, /signup, and /feed.

The Go-based ex-server binary handled AES (CTR mode)-encrypted data exchanges via the /signup and /feed endpoints, with cookie-based cid values used to identify and track individual infected hosts.

These communication patterns closely align with MuddyWater’s ArenaC2 framework, reinforcing the attribution assessment made by Oasis Security.

Organizations exposed to any of the five exploited CVEs should apply available patches without delay and review OWA access logs for signs of brute-force activity.

Security teams are advised to block outbound traffic on port 5009, monitor for encrypted HTTP connections to unrecognized endpoints, and audit internal file directories for bulk staging behaviors that may indicate active data collection ahead of exfiltration.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCVEExploitHackerPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Hackers Use Google Cloud to Bypass Filters, Deliver Remcos

Next Post

Critical Adobe Acrobat Reader Flaws Allow Code Execution

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical NGINX Vulnerability Allows Remote Code Execution –
May 14, 2026
Critical MongoDB Flaw Allows Arbitrary Code Execution
May 14, 2026
Gentlemen RaaS Exploits Fortinet & Leverages Cisco
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us