By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
Computing

MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign

News Room
Last updated: 2025/12/08 at 2:16 AM
News Room Published 8 December 2025
Share
MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
SHARE

Dec 08, 2025Ravie LakshmananNetwork Security / Vulnerability

The Iranian hacking group known as MuddyWater has been observed leveraging a new backdoor dubbed UDPGangster that uses the User Datagram Protocol (UDP) for command-and-control (C2) purposes.

The cyber espionage activity targeted users in Turkey, Israel, and Azerbaijan, according to a report from Fortinet FortiGuard Labs.

“This malware enables remote control of compromised systems by allowing attackers to execute commands, exfiltrate files, and deploy additional payloads – all communicated through UDP channels designed to evade traditional network defenses,” security researcher Cara Lin said.

The attack chain involves using spear-phishing tactics to distribute booby-trapped Microsoft Word documents that trigger the execution of a malicious payload once macros are enabled. Some of the phishing messages impersonate the Turkish Republic of Northern Cyprus Ministry of Foreign Affairs and purport to invite recipients to an online seminar titled “Presidential Elections and Results.”

Cybersecurity

Attached along with the emails are a ZIP file (“seminer.zip”) and a Word document (“seminer.doc”). The ZIP file also contains the same Word file, opening which users are asked to enable macros to stealthily execute embedded VBA code.

For its part, the VBA script in the dropper file is equipped to conceal any sign of malicious activity by displaying a Hebrew-language decoy image from Israeli telecommunications provider Bezeq about supposed disconnection periods in the first week of November 2025 across various cities in the country.

“The macro uses the Document_Open() event to automatically execute, decoding Base64-encoded data from a hidden form field (UserForm1.bodf90.Text) and writing the decoded content to C:UsersPublicui.txt,” Lin explained. “It then executes this file using the Windows API CreateProcessA, launching the UDPGangster payload.”

UDPGangster establishes persistence through Windows Registry modifications and boasts of various anti-analysis checks to resist efforts made by security researchers to take it apart. This includes –

  • Verifying if the process is being debugged
  • Analyzing CPU configurations for sandboxes or virtual machines
  • Determining if the system has less than 2048 MB of RAM
  • Retrieving network adapter information to validate if the MAC address prefix matches a list of known virtual machine vendors
  • Validating if the computer is part of the default Windows workgroup rather than a joined domain
  • Examining running processes for tools like VBoxService.exe, VBoxTray.exe, vmware.exe, and vmtoolsd.exe
  • Running Registry scans to searches for matches to known virtualization vendor identifiers, such as VBox, VMBox, QEMU, VIRTUAL, VIRTUALBOX, VMWARE, and Xen
  • Searching for known sandboxing or debugging tools, and
  • Ascertaining whether the file is running in an analysis environment
Cybersecurity

It’s only after these checks are satisfied does UDPGangster proceed to gather system information and connects to an external server (“157.20.182[.]75”) over UDP port 1269 to exfiltrate collected data, run commands using “cmd.exe,” transmit files, update C2 server, and drop and execute additional payloads.

“UDPGangster uses macro-based droppers for initial access and incorporates extensive anti-analysis routines to evade detection,” Lin said. “Users and organizations should remain cautious of unsolicited documents, particularly those requesting macro activation.”

The development comes days after ESET attributed the threat actor to attacks spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors in Israel that delivered another backdoor referred to as MuddyViper.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Real or AI? The 7 Telltale Signs Every Fake Image Still Can’t Hide Real or AI? The 7 Telltale Signs Every Fake Image Still Can’t Hide
Next Article OpenAI’s App Suggestions Create Confusion, Concern About Intrusive Ads OpenAI’s App Suggestions Create Confusion, Concern About Intrusive Ads
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Tribit StormBox Mini+ Review: The Best-Sounding  Bluetooth Speaker We’ve Tested
Tribit StormBox Mini+ Review: The Best-Sounding $40 Bluetooth Speaker We’ve Tested
News
Google might soon limit this popular Pixel Watch feature when you choose extra security
Google might soon limit this popular Pixel Watch feature when you choose extra security
News
Level Lock Pro: Hands on review with Matter, Thread, and more
Level Lock Pro: Hands on review with Matter, Thread, and more
News
5 Best Low-Cost Options Trading Platforms in the UAE
5 Best Low-Cost Options Trading Platforms in the UAE
Gadget

You Might also Like

👨🏿‍🚀 Daily – Mobile money turf war |
Computing

👨🏿‍🚀 Daily – Mobile money turf war |

3 Min Read
Redmi 14C unpacked: Full specs, price, and value in Nigeria
Computing

Redmi 14C unpacked: Full specs, price, and value in Nigeria

12 Min Read
Multiple Chinese cities pause trade-in subsidies, sparking confusion amid 618 sales rush · TechNode
Computing

Multiple Chinese cities pause trade-in subsidies, sparking confusion amid 618 sales rush · TechNode

1 Min Read
Model 3 joins Model Y as Tesla China orders push into 2026 · TechNode
Computing

Model 3 joins Model Y as Tesla China orders push into 2026 · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?