Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
    Cybersecurity

    Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

    adminBy adminMarch 7, 2026No Comments6 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New research from Broadcom’s Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding itself in several U.S. companies’ networks, including banks, airports, non-profit, and the Israeli arm of a software company.

    The activity has been attributed to a state-sponsored hacking group called MuddyWater (aka Seedworm). It’s affiliated with the Iranian Ministry of Intelligence and Security (MOIS). The campaign is assessed to have begun in early February, with recent activity detected following U.S. and Israeli military strikes on Iran.

    “The software company is a supplier to the defense and aerospace industries, among others, and has a presence in Israel, with the company’s Israel operation seeming to be the target in this activity,” the security vendor said in a report shared with The Hacker News.

    The attacks targeting the software company, as well as a U.S. bank and a Canadian non-profit, have been found to pave the way for a previously unknown backdoor dubbed Dindoor, which leverages the Deno JavaScript runtime for execution. Broadcom said it also identified an attempt to exfiltrate data from the software company using the Rclone utility to a Wasabi cloud storage bucket. However, it’s currently not known if the effort paid off.

    Also found in the networks of a U.S. airport and a non-profit was a separate Python backdoor called Fakeset, which was downloaded from servers belonging to Backblaze, an American cloud storage and data backup company. The digital certificate used to sign Fakeset has also been used to sign Stagecomp and Darkcomp malware, both previously linked to MuddyWater.

    “While this malware wasn’t seen on the targeted networks, the use of the same certificates suggests the same actor — namely Seedworm — was behind the activity on the networks of the U.S. companies,” Symantec and Carbon Black said.

    “Iranian threat actors have become increasingly proficient in recent years. Not only has their tooling and malware improved, but they’ve also demonstrated strong social engineering capabilities, including spear-phishing campaigns and ‘honeytrap’ operations used to build relationships with targets of interest to gain access to accounts or sensitive information.”

    The findings come against the backdrop of an escalating military conflict in Iran, triggering a barrage of cyber attacks in the digital sphere. Recent research from Check Point has uncovered the pro-Palestinian hacktivist group known as Handala Hack (aka Void Manticore) routing its operations through Starlink IP ranges to probe externally facing applications for misconfigurations and weak credentials.

    In recent months, multiple Iran-nexus adversaries, such as Agrius (aka Agonizing Serpens, Marshtreader, and Pink Sandstorm), have also observed scanning for vulnerable Hikvision cameras and video intercom solutions using known security flaws such as CVE-2017-7921 and CVE-2023-6895.

    The targeting, per Check Point, has intensified in the wake of the current Middle East conflict. The exploitation attempts against IP cameras have witnessed a surge in Israel and Gulf countries, including the U.A.E., Qatar, Bahrain, and Kuwait, along with Lebanon and Cyprus. The activity has singled out cameras from Dahua and Hikvision, weaponizing the two aforementioned vulnerabilities, as well as CVE-2021-36260, CVE-2025-34067, and CVE-2021-33044.

    “Taken together, these findings are consistent with the assessment that Iran, as part of its doctrine, leverages camera compromise for operational support and ongoing battle damage assessment (BDA) for missile operations, potentially in some cases prior to missile launches,” the company said.

    “As a result, tracking camera-targeting activity from specific, attributed infrastructures may serve as an early indicator of potential follow-on kinetic activity.”

    The U.S. and Israel’s war with Iran has also prompted an advisory from the Canadian Centre for Cyber Security (CCCS), which cautioned that Iran will likely use its cyber apparatus to stage retaliatory attacks against critical infrastructure and information operations to further the regime’s interests.

    Some other key developments that have unfolded in recent days are listed below –

    • Israeli intelligence agencies hacked into Tehran’s extensive traffic camera network for years to monitor the movements of bodyguards of Ayatollah Ali Khamenei and other top Iranian officials in the lead up to the assassination of the supreme leader last week, the Financial Times reported.
    • Iran’s Islamic Revolutionary Guard Corps (IRGC) targeted Amazon’s data center in Bahrain for the company’s support of the “enemy’s military and intelligence activities,” state media Fars News Agency said on Telegram.
    • Active wiper campaigns are said to be underway against Israeli energy, financial, government, and utilities sectors. “Iran’s wiper arsenal includes 15+ families (ZeroCleare, Meteor, Dustman, DEADWOOD, Apostle, BFG Agonizer, MultiLayer, PartialWasher, and others),” Anomali said.
    • Iranian state-sponsored APT groups like MuddyWater, Charming Kitten, OilRig, Elfin, and Fox Kitten “demonstrated clear signs of activation and rapid retooling, positioning themselves for retaliatory operations amid the escalating conflict,” LevelBlue said, adding “cyber represents one of Iran’s most accessible asymmetric tools for retaliation against Gulf states that condemned its attacks and support U.S. operations.”
    • According to Flashpoint, a massive #OpIsrael cyber campaign involving pro-Russian and pro-Iranian actors has targeted Israeli industrial control systems (ICS) and government portals across Kuwait, Jordan, and Bahrain. The campaign is driven by NoName057(16), Handala Hack, Fatemiyoun Electronic Team, and Cyber Islamic Resistance (aka 313 Team).
    • Between 28 February 2026 and 2 March 2026, pro-Russia hacktivist group Z-Pentest claimed responsibility for compromising several U.S.-based entities, including ICS and SCADA systems and multiple CCTV networks. “The timing of these unverified claims, coinciding with Operation Epic Fury, suggests Z-Pentest likely began prioritizing U.S. entities as targets,” Adam Meyers, head of Counter Adversary Operations at CrowdStrike, told The Hacker News.

    “Iran’s offensive cyber capability has matured into a durable instrument of state power used to support intelligence collection, regional influence, and strategic signaling during periods of geopolitical tension,” UltraViolet Cyber said. “A defining feature of Iran’s current cyber doctrine is its emphasis on identity and cloud control planes as the primary attack surface.”

    “Rather than prioritizing zero-day exploitation or highly novel malware at scale, Iranian operators tend to focus on repeatable access techniques such as credential theft, password spraying, and social engineering, followed by persistence through widely deployed enterprise services.”

    Organizations are advised to bolster their cybersecurity posture, strengthen monitoring capabilities, limit exposure to the internet, disable remote access to operational technology (OT) systems, enforce phishing-resistant multi-factor authentication (MFA), implement network segmentation, take offline backups, and ensure that all internet-facing applications, VPN gateways, and edge devices are up-to-date

    “Western organizations should continue to remain on high-alert for potential cyber response as the conflict continues and activity may move beyond hacktivism and into destructive operations,” Meyers said.

    backdoor Dindoor hackers IranLinked MuddyWater networks Target U.S
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article3 Prime Video shows with surging RT scores to watch this weekend (March 6
    Next Article These Bose Ultra Open Earbuds Are $100 Off Right Now
    admin
    • Website

    Related Posts

    Hexnode IdP brings device-aware authentication and zero trust to enterprise access

    March 7, 2026

    Nearly half of exploited zero-day flaws target enterprise-grade technology

    March 7, 2026

    Fake Claude Code install guides push infostealers in InstallFix attacks

    March 7, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    How structured data supports local visibility across Google and AI

    March 7, 2026

    These Bose Ultra Open Earbuds Are $100 Off Right Now

    March 7, 2026

    Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

    March 7, 2026

    3 Prime Video shows with surging RT scores to watch this weekend (March 6

    March 7, 2026
    Categories
    • Blogging (34)
    • Cybersecurity (650)
    • Privacy & Online Earning (93)
    • SEO & Digital Marketing (413)
    • Tech Tools & Mobile / Apps (792)
    • WiFi / Internet & Networking (114)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    How structured data supports local visibility across Google and AI

    March 7, 2026

    These Bose Ultra Open Earbuds Are $100 Off Right Now

    March 7, 2026

    Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

    March 7, 2026
    Most Popular
    • How structured data supports local visibility across Google and AI
    • These Bose Ultra Open Earbuds Are $100 Off Right Now
    • Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
    • 3 Prime Video shows with surging RT scores to watch this weekend (March 6
    • Hexnode IdP brings device-aware authentication and zero trust to enterprise access
    • Google Says Disavow Links If You’re Conflicted And Need To Be Sure
    • I watch movies on a projector instead of a TV, and it’s cheaper than you think
    • Nearly half of exploited zero-day flaws target enterprise-grade technology
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.