Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Iran-linked APT targets US critical sectors with new backdoors
    Cybersecurity

    Iran-linked APT targets US critical sectors with new backdoors

    adminBy adminMarch 6, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Singapore telcos breached in China-linked cyber espionage campaign
    Share
    Facebook Twitter LinkedIn Pinterest Email

    An Iran-linked hacking group has been active inside the networks of several US organizations since early February, raising concerns that the activity could precede broader cyber operations connected to escalating geopolitical tensions in the Middle East.

    New backdoors used by Seedworm

    Symantec and Carbon Black researchers have attributed the activity to Seedworm (aka MuddyWater), an Iranian advanced persistent threat (APT) group that has been linked to Iran’s Ministry of Intelligence and Security (MOIS), and is known for espionage campaigns targeting government agencies, telecommunications companies, and critical infrastructure.

    According to researchers, suspicious activity linked to Seedworm has been identified on the networks of:

    • A US bank
    • A US airport
    • Non-profit organizations, and
    • The Israeli operations of a US software company that supplies the defense and aerospace industries.

    The activity began in early February 2026 and has continued into recent days, and the group has been spotted leveraging previously unknown malware.

    • The Dindoor backdoor, named thus due to its use of Deno, a runtime environment for JavaScript and TypeScript, for executing commands on infected machines
    • A Python-based backdoor called Fakeset.

    According to the researchers, Dindoor was digitally signed with a certificate issued to an individual named “Amy Cherne”. Fakeset was also signed, using using certificates attributed to both “Amy Cherne” and “Donald Gay,” the latter of which has previously been associated with the Stagecomp and Darkcomp malware used by the Seedworm APT.

    The goal seems to be espionage: the attackers have been observed trying to exfiltrate data from the targeted software company to a cloud storage bucket hosted by Wasabi using the open-source tool Rclone.

    “While it’s not known if the operations of Seedworm are disrupted by the current conflict, already having a presence on US and Israeli networks prior to the current hostilities beginning means the threat group is in a potentially dangerous position to launch attacks,” the researchers noted.

    It is unknown what tricks or exploits the APT used to gain initial access to these organizations’ networks.

    Exposed VPS reveals Seedworm tooling

    In related news, independent threat-intel research collective Ctrl-Alt-Intel recently claimed to have accessed infrastructure used by Seedworm / Muddy Water, which allowed them to harvest “C2 tooling, scripts, logs, victim data, and other operational artefacts from a VPS hosted in the Netherlands.”

    After analyzing the collected data, they pinpointed other organizations targeted by the group: Israeli organizations (healthcare, hosting, immigration, intelligence), EgyptAir, Jordanian government, various UAE companies, US entities, and Jewish/Israeli-linked nn-governmental organizations..

    “The exposed infrastructure (…) provides a broad view into a MuddyWater operation – from initial reconnaissance through to data exfiltration. What stands out is not the sophistication of any single tool or malware, but the breadth of the operation: countless organisations targeted, multiple custom-developed C2 frameworks, exploitation of over a dozen CVEs including novel SQL injection vulnerabilities, password spraying campaigns, Ethereum-based C2 resolution, and multiple exfiltration channels spanning cloud storage & EC2 instances,” the group concluded.

    “MuddyWater continues to demonstrate a willingness to rapidly adopt public exploit code, modify it for operational use, and deploy it at scale – all while developing custom tooling in parallel.”

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    APT Backdoors Critical IranLinked Sectors Targets
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle AI Mode Cites Itself More Often, With More Organic Links
    Next Article Google puts apps that’ll drain your battery on blast in updated Play Store listings
    admin
    • Website

    Related Posts

    Trump’s new cybersecurity strategy makes promises but lacks details

    March 7, 2026

    Cognizant TriZetto breach exposes health data of 3.4 million patients

    March 6, 2026

    In Other News: FBI Hacked, US Security Pro Killed in Iran War, Hijacked Cameras Used in Khamenei Strike

    March 6, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Trump’s new cybersecurity strategy makes promises but lacks details

    March 7, 2026

    This Handheld Atari Console Comes With 200 Old-School Games, and It’s $50 Off

    March 7, 2026

    Cognizant TriZetto breach exposes health data of 3.4 million patients

    March 6, 2026

    6 smart home myths you should stop believing today

    March 6, 2026
    Categories
    • Blogging (34)
    • Cybersecurity (643)
    • Privacy & Online Earning (92)
    • SEO & Digital Marketing (408)
    • Tech Tools & Mobile / Apps (783)
    • WiFi / Internet & Networking (114)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Trump’s new cybersecurity strategy makes promises but lacks details

    March 7, 2026

    This Handheld Atari Console Comes With 200 Old-School Games, and It’s $50 Off

    March 7, 2026

    Cognizant TriZetto breach exposes health data of 3.4 million patients

    March 6, 2026
    Most Popular
    • Trump’s new cybersecurity strategy makes promises but lacks details
    • This Handheld Atari Console Comes With 200 Old-School Games, and It’s $50 Off
    • Cognizant TriZetto breach exposes health data of 3.4 million patients
    • 6 smart home myths you should stop believing today
    • In Other News: FBI Hacked, US Security Pro Killed in Iran War, Hijacked Cameras Used in Khamenei Strike
    • Google’s AI Mode is citing Google more than any other site: Study
    • HISTORY: Shows & Documentaries (Android TV) 8.4.0 APK Download by A+E Global Media
    • Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.