Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
Iranian Hackers Embed Themselves in U.S. Networks Amid Escalating Middle East Conflict
A sophisticated Iranian state-sponsored hacking group has infiltrated the networks of multiple U.S. companies, including banks, airports, non-profits, and an Israeli software firm, according to new research from Broadcom’s Symantec and Carbon Black Threat Hunter Team. The campaign, attributed to MuddyWater (aka Seedworm) and linked to Iran’s Ministry of Intelligence and Security (MOIS), represents a significant escalation in cyber operations amid the ongoing U.S.-Israel conflict with Iran.
The Dindoor Backdoor: A New Weapon in Iran’s Arsenal
The attackers deployed a previously unknown backdoor dubbed “Dindoor” that leverages the Deno JavaScript runtime for execution. This sophisticated malware was discovered on the networks of a U.S. bank and a Canadian non-profit, where it established persistent access and attempted data exfiltration using the Rclone utility to a Wasabi cloud storage bucket. While researchers couldn’t confirm if the data theft was successful, the campaign’s sophistication suggests significant operational capabilities.
Fakeset Malware and Certificate Reuse
In parallel operations targeting a U.S. airport and another non-profit, the attackers deployed a Python backdoor called Fakeset. What makes this particularly concerning is that the digital certificate used to sign Fakeset has been previously associated with Stagecomp and Darkcomp malware—both linked to MuddyWater operations. This pattern of certificate reuse demonstrates the group’s operational continuity and resource optimization.
The Broader Context: Cyber Warfare in the Middle East
“These findings come against the backdrop of an escalating military conflict in Iran, triggering a barrage of cyber attacks in the digital sphere,” the security researchers noted. The timing is particularly significant, with activity detected following U.S. and Israeli military strikes on Iran, suggesting a coordinated response strategy.
Expanding Iranian Cyber Capabilities
Recent research from Check Point has uncovered the pro-Palestinian hacktivist group Handala Hack (aka Void Manticore) routing operations through Starlink IP ranges to probe external applications for vulnerabilities. Meanwhile, Iranian adversaries like Agrius (also known as Agonizing Serpens, Marshtreader, and Pink Sandstorm) have been observed scanning for vulnerable Hikvision cameras and video intercom solutions using known security flaws including CVE-2017-7921 and CVE-2023-6895.
IP Camera Targeting Intensifies
The exploitation attempts against IP cameras have surged dramatically in Israel and Gulf countries, including the UAE, Qatar, Bahrain, and Kuwait, along with Lebanon and Cyprus. The activity has specifically targeted cameras from Dahua and Hikvision, weaponizing multiple vulnerabilities such as CVE-2021-36260, CVE-2025-34067, and CVE-2021-33044. “Taken together, these findings are consistent with the assessment that Iran leverages camera compromise for operational support and ongoing battle damage assessment for missile operations,” Check Point researchers stated.
Canadian Warning and Global Implications
The Canadian Centre for Cyber Security (CCCS) has issued an advisory warning that Iran will likely use its cyber apparatus to stage retaliatory attacks against critical infrastructure and conduct information operations to further the regime’s interests. This global perspective underscores the widespread nature of the threat.
Recent Developments in the Cyber Conflict
Israeli intelligence agencies reportedly hacked into Tehran’s extensive traffic camera network for years to monitor the movements of bodyguards of Ayatollah Ali Khamenei and other top Iranian officials. Meanwhile, Iran’s Islamic Revolutionary Guard Corps (IRGC) targeted Amazon’s data center in Bahrain for the company’s support of “enemy’s military and intelligence activities,” according to state media.
Active wiper campaigns are underway against Israeli energy, financial, government, and utilities sectors. “Iran’s wiper arsenal includes 15+ families including ZeroCleare, Meteor, Dustman, DEADWOOD, Apostle, BFG Agonizer, MultiLayer, and PartialWasher,” according to Anomali’s analysis.
The Evolution of Iranian Cyber Doctrine
“Iran’s offensive cyber capability has matured into a durable instrument of state power used to support intelligence collection, regional influence, and strategic signaling during periods of geopolitical tension,” UltraViolet Cyber reported. A defining feature of Iran’s current cyber doctrine is its emphasis on identity and cloud control planes as the primary attack surface.
Rather than prioritizing zero-day exploitation or highly novel malware at scale, Iranian operators tend to focus on repeatable access techniques such as credential theft, password spraying, and social engineering, followed by persistence through widely deployed enterprise services.
Critical Security Recommendations
Organizations are advised to take immediate action to bolster their cybersecurity posture:
- Strengthen monitoring capabilities and implement 24/7 security operations
- Limit exposure to the internet by removing unnecessary services
- Disable remote access to operational technology (OT) systems
- Enforce phishing-resistant multi-factor authentication (MFA)
- Implement network segmentation to contain potential breaches
- Take offline backups and test restoration procedures
- Ensure all internet-facing applications, VPN gateways, and edge devices are up-to-date
“Western organizations should continue to remain on high-alert for potential cyber response as the conflict continues and activity may move beyond hacktivism and into destructive operations,” warned Adam Meyers, head of Counter Adversary Operations at CrowdStrike.
The sophistication and scale of these Iranian cyber operations demonstrate that state-sponsored hacking has evolved into a critical component of modern warfare, capable of causing significant disruption and damage while operating in the shadows of conventional military conflict.
Tags: Iranian hackers, MuddyWater, Seedworm, Dindoor backdoor, Fakeset malware, cyber warfare, Middle East conflict, state-sponsored hacking, Deno JavaScript, Rclone exfiltration, Hikvision vulnerabilities, IP camera exploitation, wiper malware, cyber espionage, MOIS, IRGC cyber operations
Viral Phrases: “Iranian cyber capabilities mature,” “cyber represents asymmetric warfare,” “tracking camera-targeting activity,” “cyber response amid conflict,” “destructive operations beyond hacktivism,” “repeatable access techniques,” “cloud control planes primary attack surface,” “cyber conflict escalates globally,” “Iranian hackers embed deep,” “state-sponsored cyber operations intensify”
Viral Sentences: “Iranian threat actors have become increasingly proficient in recent years,” “Iranian operators tend to focus on repeatable access techniques,” “cyber represents one of Iran’s most accessible asymmetric tools,” “tracking camera-targeting activity from specific infrastructures may serve as an early indicator,” “Western organizations should remain on high-alert for potential cyber response”
,




Leave a Reply
Want to join the discussion?Feel free to contribute!