Security researchers at CloudSEK have identified a new spear-phishing campaign by the Iranian threat actor MuddyWater, deploying a previously unseen Rust-based implant dubbed RustyWater. The malware represents a significant upgrade to the group’s capabilities, incorporating advanced anti-analysis techniques.

Campaign overview

AttributeDetails
Threat actorMuddyWater (MERCURY, Static Kitten, Seedworm, Mango Sandstorm, Earth Vetala, TA450)
AttributionIranian Ministry of Intelligence and Security (MOIS)
Campaign periodDecember 2025 – January 2026
Primary targetsMiddle East diplomatic, maritime, financial, telecom
Initial vectorSpear-phishing with malicious Word documents
PayloadRustyWater Rust-based implant
Also known asArcher RAT, RUSTRIC

Target profile

MuddyWater is targeting organizations of strategic interest to Iranian intelligence:

SectorTarget Examples
DiplomaticEmbassies, foreign ministries, international organizations
MaritimeShipping companies, port authorities, logistics firms
FinancialBanks, investment firms, payment processors
TelecommunicationsISPs, mobile carriers, infrastructure providers
IT servicesMSPs, software development companies
Human resourcesHR organizations with personnel data

Geographic targeting

RegionStatus
IsraelPrimary focus
IndiaExpanded targeting observed
UAERegional targeting
TurkmenistanObserved lure impersonation
Middle East (general)Consistent with historical patterns

Geographic focus remains the Middle East, consistent with MuddyWater’s historical targeting patterns aligned with Iranian regional interests.

Parallel campaign: Operation IconCat

Seqrite Labs independently identified similar RUSTRIC malware activity in late December 2025:

AttributeDetails
Campaign nameOperation IconCat
Tracking IDUNG0801
Target geographyIsrael
Target sectorsIT companies, MSPs, HR organizations, software developers
TimeframeLate December 2025

This parallel campaign suggests a broader coordinated effort across multiple targeting vectors.

Attack chain

Stage 1: Spear-phishing

Emails are tailored to each target organization:

  • Sender spoofing — Impersonates known contacts or relevant organizations
  • Relevant lures — Documents themed to victim’s industry or current events
  • Icon spoofing — Word documents display legitimate-looking icons

Observed lure: One campaign used a document titled “Cybersecurity Guidelines” originating from an address mimicking the official contact for TMCell, Turkmenistan’s primary mobile operator.

Stage 2: Macro execution

When victims open the document and “enable content”:

  1. VBA macro executes
  2. Macro extracts and executes multi-stage payload
  3. RustyWater payload deployed
  4. Persistence mechanism established
  5. Implant begins C2 communication

Stage 3: RustyWater deployment

The Rust-based implant establishes foothold and awaits commands from operators.

RustyWater technical analysis

Why Rust?

MuddyWater’s adoption of Rust reflects a broader APT trend toward the language:

BenefitExplanation
Memory safetyFewer crashes, more reliable implant
Cross-platformSame codebase compiles for Windows, Linux
Reverse engineering difficultyRust binaries are harder to analyze
Modern toolingBetter development experience
Detection evasionLess familiar to AV signatures

CloudSEK notes: “Historically, Muddy Water has relied on PowerShell and VBS loaders for initial access and post-compromise operations. The introduction of Rust-based implants represents a notable tooling evolution toward more structured, modular, and low noise RAT capabilities.”

Anti-analysis techniques

RustyWater incorporates multiple evasion mechanisms:

Anti-debugging:

  • Registers a Vectored Exception Handler (VEH) to catch debugging attempts
  • Timing checks to detect single-stepping
  • API hooking detection

Anti-VM:

  • Hardware fingerprinting
  • VM-specific artifact detection
  • Resource usage analysis

Security tool detection:

CloudSEK found that RustyWater scans for more than 25 AV/EDR products by checking:

  • Agent files
  • Service names
  • Installation paths
Detection methodTarget
File presenceAV agent executables
Service enumerationSecurity service names
Path checkingInstallation directories

String obfuscation:

  • Position-independent XOR encryption
  • Encrypted strings decrypted at runtime
  • No plaintext C2 addresses in binary

Capabilities

FunctionDescription
System reconnaissanceOS version, hostname, username, domain membership, network config
PersistenceRegistry modification, scheduled tasks
File operationsUpload, download, delete
Command executionShell command execution
Data exfiltrationEncrypted transfer to C2
Security evasionDetects and adapts to security tools

Command and control

C2 server identified:

nomercys.it[.]com

Communication uses HTTPS to blend with legitimate traffic. The implant implements custom encryption for C2 payloads beyond TLS.

Detection

AV detection rate: At time of analysis, RustyWater was detected by 25+ antivirus engines—indicating security vendors have developed signatures.

Indicators of compromise

Network IOCs:

nomercys.it[.]com (C2 server)

Behavioral indicators:

  • Office application spawning PowerShell or cmd.exe
  • Rust binaries in user temp directories
  • Unusual HTTPS traffic patterns to unfamiliar domains
  • Registry modifications for persistence
  • Processes checking for 25+ security products

YARA rules: CloudSEK has published detection rules for RustyWater. Security teams should incorporate these into endpoint and network monitoring.

MuddyWater background

MuddyWater has been active since at least 2017, primarily conducting cyber espionage operations supporting Iranian intelligence objectives.

Known aliases:

  • MERCURY (Microsoft)
  • Mango Sandstorm (Microsoft - current)
  • Static Kitten (CrowdStrike)
  • Seedworm (Symantec)
  • TEMP.Zagros (FireEye/Mandiant)
  • Earth Vetala (Trend Micro)
  • TA450 (Proofpoint)

Attribution: Linked to Iran’s Ministry of Intelligence and Security (MOIS), distinct from the Islamic Revolutionary Guard Corps (IRGC) cyber units.

Historical operations:

  • Targeting government entities across Middle East
  • Campaigns against Turkey, Pakistan, UAE, Saudi Arabia
  • Focus on intelligence gathering rather than destructive attacks

Recent activity context

DateActivity
September 2024 – March 2025MuddyViper backdoor deployed against Israeli organizations (ESET)
December 2024ESET publishes MuddyViper research
Late December 2025Operation IconCat identified (Seqrite Labs)
January 2026RustyWater campaign documented (CloudSEK)

The timing of this campaign, emerging in early 2026, underscores the persistent geopolitical tensions in the region where cyber espionage serves as a proxy for broader conflicts.

Toolkit evolution

RustyWater represents the latest evolution in MuddyWater’s malware arsenal:

YearToolLanguageNotes
2017-2019POWERSTATSPowerShellEarly operations
2019-2020KOADICPython/JScriptOpen-source RAT
2021-2023Small SievePythonCustom backdoor
2024-2025PhonyC2GoGolang-based framework
2024-2025MuddyViperN/ABackdoor targeting Israel
2026RustyWaterRustCurrent campaign

The shift from interpreted languages (PowerShell, Python) to compiled languages (Go, Rust) reflects increasing operational security awareness.

Recommendations

For targeted sectors:

ControlImplementation
Macro policiesDisable macros from internet-sourced documents
Email securityBlock executable attachments, scan for malicious macros
Endpoint detectionDeploy EDR with behavioral analysis
Network monitoringMonitor for C2 communication patterns
User trainingSpear-phishing awareness for high-risk roles
Geographic alertingFlag communications from high-risk regions

Detection priorities:

  1. Office applications spawning child processes
  2. Rust binaries in unexpected locations
  3. Registry persistence mechanisms
  4. C2 traffic to known MuddyWater infrastructure
  5. Processes enumerating security products

Threat intelligence:

  • Subscribe to CloudSEK, Seqrite, and other vendor reporting on MuddyWater
  • Integrate IOCs into security tooling
  • Monitor for infrastructure overlap with known campaigns

Context

MuddyWater’s adoption of Rust follows similar moves by other sophisticated threat actors. The language’s combination of performance, safety, and analysis difficulty makes it attractive for implant development.

Organizations in targeted sectors should assume they are of interest to Iranian intelligence and implement defenses accordingly. MuddyWater’s persistent focus on diplomatic and critical infrastructure targets makes them a significant threat to regional stability.

Evolution patternImplication
From PowerShell/VBSTo compiled Rust
From noisy operationsTo low-noise modular RAT
From regional focusTo expanded geographic targeting
From known toolsTo custom development

The campaign’s timing—coinciding with ongoing regional tensions—suggests intelligence collection in support of Iranian policy objectives. The parallel identification by multiple research teams (CloudSEK, Seqrite Labs) indicates MuddyWater is conducting broad, coordinated operations across the region.