Executive Summary

We have been tracking ongoing cyberespionage campaigns by the threat group Boggy Serpens, also known as MuddyWater. Attributed to the Iranian Ministry of Intelligence and Security (MOIS), the group consistently targets diplomatic and critical infrastructure – including energy, maritime and finance – across the Middle East and other strategic targets around the world.

We provide a comprehensive threat assessment of Boggy Serpens’ activities over the last year. Our analysis reveals a highly adaptable threat actor that has refined its operational strategy to focus on trusted relationship compromises and multi-wave targeting of key strategic organizations.

While social engineering remains its defining trait, the group is also increasing its technological capabilities. Its diverse toolset includes AI-enhanced malware implants that incorporate anti-analysis techniques for long-term persistence. This combination of social engineering and rapidly developed tools creates a potent threat profile.

Boggy Serpens primarily leverages hijacked accounts to wage its attacks, targeting high-profile victims like diplomats and IT vendors. The attackers exploit this access to bypass reputation-based blocking and utilize a secondary social engineering prompt to deliver malware.

The group’s determination is best exemplified by a sustained campaign against a national marine and energy company in the UAE. We outline four distinct waves of attack against this single entity from August 2025 through February 2026, demonstrating the group’s attempts to infiltrate regional maritime infrastructure.

To maintain access, the group has matured its development approach, employing AI-generated code, and Rust-based tools like the BlackBeard backdoor to rapidly deploy custom implants. Additionally, the group leverages standard HTTP status codes, customized user diagram protocol (UDP)-based traffic, and the Telegram API for command and control (C2).

Palo Alto Networks customers are better protected against the threats discussed in this article through Cortex XDR and XSIAM, the Cortex Advanced Email Security module, Advanced WildFire, Advanced URL Filtering and Advanced DNS Security.

Cortex’s AgentiX Agentic Assistant can assist investigations by providing context and insights, as well as recommendations for actions to take.

If you think you might have been compromised or have an urgent matter, contact the Unit 42 Incident Response team.

Related Unit 42 Topics Boggy Serpens, Advanced Persistent Threat (APT), Malware, Cybercrime, Cyberespionage, RAT

Boggy Serpens Overview

Boggy Serpens is an Iranian nation-state cyberespionage group active since at least 2017. Assessed to be a subordinate element of the MOIS, the group has primarily targeted government, military and critical infrastructure sectors across the Middle East, the Caucasus, Central and Western Asia, South America and Europe.

Early campaigns by this group were characterized by a high-volume, low-sophistication operational style. Boggy Serpens favored speed over stealth, frequently launching noisy and widespread spear phishing campaigns. These campaigns heavily relied on living-off-the-land (LOTL) tactics, abusing legitimate remote monitoring and management (RMM) tools like Atera, ScreenConnect and SimpleHelp, alongside publicly available utilities such as LaZagne and CrackMapExec.

Recent campaigns reflect the group’s prioritization of long-term persistence, stealthier tactics, techniques and procedures (TTPs) and advanced defense evasion techniques. This is evidenced by its adoption of the Rust programming language and the integration of AI-assisted techniques into its malware development lifecycle.

Boggy Serpens is likely benefiting from a significant influx of resources and cross-unit coordination. Early 2025 operations highlighted operational overlaps with Evasive Serpens, also known as Lyceum (a subgroup of OilRig), indicating shared resources and intelligence coordination within the Iranian threat landscape.

While the group’s focus remains cyberespionage, Boggy Serpens has conducted disruptive operations in the past. In February 2023, the group targeted the Technion Israel Institute of Technology, masquerading as the DarkBit ransomware gang. The operation disrupted academic infrastructure under the guise of financial crime, masking its state-sponsored origins. This tactic introduced an additional dimension of psychological warfare through false flags and intimidation.

Over the last year, Boggy Serpens has implemented a more effective “trusted relationship compromise” model to bypass perimeter defenses. This technique relies on hijacking legitimate internal accounts. Boggy Serpens misuses established credibility to deliver malware that evades standard reputation-based filtering. Once access is established, the group sustains operations using custom-compiled toolkits.

The group’s targeting has expanded beyond government entities to encompass the maritime, aviation and financial sectors, reflecting a heightened interest in regional logistics and critical economic infrastructure. Recent campaigns have struck entities in Israel, Hungary, Turkey, Saudi Arabia, the UAE, Turkmenistan, Egypt and South America. These attacks demonstrate an ability to pivot between sectors while conducting multiple, consecutive attacks against different targets.

Figure 1 shows a chronological overview of the phishing campaigns and specific regional entities targeted throughout the last year that we attribute with high confidence to Boggy Serpens.

A world map visually represents Boggy Serpens' identified campaigns from April 2025 to February 2026. Regions targeted in the August 2025 campaign are highlighted in red, while other targeted campaigns are marked in orange. Lines illustrate global connections between affected areas.
Figure 1. Identified Boggy Serpens campaigns from April 2025 to February 2026.

Campaigns, Phishing Themes and Documents Analysis

Our analysis of Boggy Serpens phishing activity in 2025 and early 2026 reveals a significant shift in Boggy Serpens’ tradecraft, characterized by tailored social engineering lures and the deployment of specialized toolkits for mass email distribution and account exploitation.

Persistent Targeting of Critical Infrastructure

A defining example of Boggy Serpens’ recent operations is the targeting of an energy and marine services company in the UAE. The organization is a high-value industrial entity with significant ties to the local sovereign establishment.

Beyond its domestic significance, the company serves as a critical node in the regional energy supply chain, maintaining a long-term strategic partnership with Saudi Aramco – another known target of Iranian state cyber operations. Compromising these assets grants the actor a potential foothold within vital energy networks across the UAE and Saudi Arabia, enabling continued reconnaissance and access.

Over a six-month period, we observed four distinct attack waves targeting this UAE-based entity, each using lures customized to different internal departments. This persistence suggests a specific mandate to infiltrate regional maritime and engineering infrastructure.

Wave 1: Engineering Theme – Aug. 16, 2025

The initial campaign targeted project engineers using industry-specific terminology for subsea pipelines. The lure document was blurred in order to deceive targets into clicking “Enable Content,” thereby triggering the execution of the embedded macro. Figure 2 shows the document.

A computer screen displays a blurred Microsoft Word document, a lure from Boggy Serpens' Wave 1 campaign. The document, titled "Daily Progress Acknowledgment Report," is intentionally obscured to prompt users to enable malicious macros. The Word application interface and Windows taskbar are visible.
Figure 2. Lure document containing engineering terms to mimic a status update.

Wave 2: Financial Deception – Jan. 30, 2026

Shifting its focus to the finance and supply chain departments, in a subsequent attack the group deployed an Excel file that mimicked the target’s internal financial records. This lure was designed as a spreadsheet containing payment and cash flow projections.

As Figure 3 shows, the infected document contains specific references to “Engineering, Construction & Marine Services” and local currency (AED), alongside legitimate-looking transaction codes like “Payroll Payments via WPS”.

An Excel spreadsheet, used as a lure in Boggy Serpens' Wave 2 campaign, displays fabricated transaction details. Sections for entity name, payments, and international payments are visible, listing payment methods, currency in AED, transaction counts, and total values for monthly and annual figures.
Figure 3. The infected Excel document, masquerading as transaction and cash flow information.

Wave 3: Travel Ticket – Jan. 30, 2026

The group launched a parallel spear phishing effort targeting an individual associated with the company. The attackers created what appears to be a personalized Air Arabia flight reservation in Word format, as Figure 4 shows.

"A screenshot of a abricated AirArabia flight reservation confirmation, a lure from Boggy Serpens' Wave 3 campaign, displays details for a flight on 17 December 2025 from Abu Dhabi to Thiruvananthapuram. The document includes a reservation number, PIN, travel itinerary, fare type, baggage allowances, and contact information, designed to appear legitimate.
Figure 4. The fake airline ticket sent to a targeted individual.

The high level of detail – specifically the passenger name, flight route and “Corporate Fare” category – strongly suggests that this lure was not generated at random. The actor likely leveraged intelligence gathered from a prior compromise, such as exfiltrated internal emails and travel itineraries.

The delivery of a flight itinerary as a Word document instead of a native PDF is a distinct operational anomaly. This creates a situation in which high-quality social engineering is undermined by a technical delivery that creates a detectable point of friction for trained users and automated sandboxes.

In this campaign, the lure deploys malware named GhostBackDoor, a newly documented malware family recently identified by Group-IB.

Wave 4: Operational Logistics and Technical Evolution – Feb. 11, 2026

Most recently, we observed a fourth attack that utilized an Excel file titled Consumption Report (Jan 21 2025 – Feb 20 2026).xls, as Figure 5 shows.

A screenshot of a Microsoft Excel window displays a notification indicating the document was created in an earlier version, a tactic employed by Boggy Serpens. The message instructs the user to click "Enable editing" and "Enable content," which would activate malicious macros. The Excel logo is visible.
Figure 5. The Consumption Report Excel document.

While the social engineering themes and macro delivery structures remain consistent with Boggy Serpens TTPs, the group’s focus in this attack was on the final infection stage. In this campaign, the blurred document lure delivers an entirely new payload family, known as Nuso. See Appendix A for technical analysis of this custom HTTP backdoor family.

A Phishing Email Delivery Platform

To support its large-scale social engineering campaigns, Boggy Serpens uses a custom-built, web-based orchestration platform. This tool enables operators to automate mass email delivery while maintaining granular control over sender identities and target lists.

On Oct. 3, 2025, we observed the IP 157.20.182[.]75 hosting a unique web-based Python server on port 5000. We assess that the threat actor uses this server to deliver emails to targets. The platform includes the following input fields and controls:

  • Upload User Lists: Ability to upload files with target email addresses
  • Sender Email: Option to customize Sender Email
  • Email Subject: Field to customize Email Subject
  • Email Body
  • SMTP Server: Field to set the IP address of the SMTP Server
  • SMTP Port: Field to set the SMTP Port
  • Upload Attachment: Option to add an attachment to the email
  • Preview Email
  • Run

Figure 6 shows the platform interface.

A user interface for a custom-built email delivery platform, utilized by Boggy Serpens, is displayed. The platform features input fields for uploading target email lists, customizing sender email, subject, and HTML email body, configuring SMTP server details, and attaching files. "Preview Email" and "Run" buttons are present.
Figure 6. A mass email delivery platform that was seen on the attacker's infrastructure.

Exploiting Trusted Relationships for Payload Delivery

Throughout the last year, Boggy Serpens systematically hijacked official government and corporate accounts to bypass standard email filtering – a technique they utilized in over 15 attacks around the world.

In August 2025, Boggy Serpens leveraged a compromised mailbox of the Omani Ministry of Foreign Affairs to distribute documents to other foreign ministries in different countries. These documents were disguised as official diplomatic communications.

Following regional conflicts in  June 2025, the group sent a “Sustainable Peace” seminar invitation as a lure to solicit engagement from targeted recipients, as Figure 7 shows.

A screenshot of an email invitation letter from the Ministry of Foreign Affairs of Oman. The invitation is for an international seminar on the topic 'The Future of the Region after the Iran-Israel War and the Role of Middle Eastern Countries in Creating a Sustainable Peace'. The seminar invites participants from various Ministries of Foreign Affairs. The date and official invitation are included."
Figure 7. An email sent from a compromised email account to foreign embassies, government ministries and international organizations.

The suspicious content and thematic anomalies in the lure triggered Cortex XDR to flag this threat as high-risk, and prevent its execution before any user interaction could take place. The infection and prevention are shown in Figure 8.

A screenshot of a Cortex alert. It outlines an email flow with nodes. Alerts note 'Potential Phishing has been detected' and 'Suspicious theme and sentiment in email,' both from 'XDR Analytics.' The right panel highlights the title 'Phishing document content.
Figure 8. The infection chain originating in a phishing email, as seen, detected and prevented by Cortex XDR.

On Jan. 6, 2026, we observed a highly targeted attack against a major telecommunications provider in Turkmenistan. As shown in Figure 9, the threat actor used a compromised internal account info@<company_name>.tm to distribute a Cybersecurity.doc file.

A screenshot of an email displaying the message title "New Cybersecurity Guidelines." An attachment named "Cybersecurity.doc" is included. The body of the email briefly mentions the guidelines and refers to the attachment for details, ending with "Best regards.
Figure 9. Internal phishing email sent from the compromised account.

This tactic mirrors the campaign that targeted Israeli organizations on Nov. 17, 2025, as reported by the Israeli National Cyber Directorate (INCD), where the group hijacked internal accounts to distribute Webinar and HR lures.

In both instances, the emails received a negative spam confidence level (SCL -1), because they originated from authenticated, internal accounts. This negative value resulted in the emails bypassing spam filters.

Macros Analysis

Boggy Serpens utilizes a two-tiered social engineering strategy designed to bypass both automated filters and human intuition. First, the attackers hijack internal accounts. This deceives targeted victims into believing that an attachment was sent from a credible source. When a victim opens the file, a second layer of deception is triggered.

To coerce targets into enabling the malicious code, many of the documents are presented as blurred content when opened. The lure displays a message claiming that the content was created in an older version of Microsoft Word or Excel. Once the user clicks “Enable Content,” the VBA macro’s initial routine is to delete this overlay and reveal the clear, legible document underneath. This immediate visual feedback reinforces the apparent legitimacy of the lure, effectively masking the simultaneous execution of the dropper payload in the background.

Forensic analysis of last year’s campaign artifacts reveals that Boggy Serpens relies on a persistent VBA builder. The group split its operations into separate tracks to handle different types of targets:

  • Phoenix Lineage, delivering fully-fledged backdoors
  • UDPGangster Operations, delivering a more lightweight, less advanced backdoor

Figure 10 shows the technical overlap of these tracks. The similarities include an identical shared decryption key and the novaservice.exe file path, linking these parallel operations to a single development team.

 A diagram illustrates the technical overlap between Boggy Serpens' Phoenix Lineage and UDPGangster Operations. Two tracks labeled "Phoenix Track" and "UDPGangster Track" converge on a "Shared Dropper Code" box, detailing a specific decryption path. A box labeled "Crossover Discovery" indicates the Phoenix binary.
Figure 10. Correlation and shared artifacts among campaigns.

A detailed technical analysis of the VBA builders is available in Appendix B.

Boggy Serpens Toolset Overview

In recent campaigns, Boggy Serpens used several tools designed for persistence and evasion. This diverse toolkit allows the group to maintain resilient infrastructure capable of adapting to various defensive environments.

An analysis of the Rust-based backdoor known as “BlackBeard” and related infrastructure can be found in Appendix C.

The UDPGangster Backdoor

The UDPGangster backdoor is designed to bypass traditional network defenses, utilizing a UDP-based communication protocol to execute commands, exfiltrate data and deploy secondary payloads.

Building on recent findings by FortiGuard Labs, our analysis confirms that this malware is primarily delivered via Microsoft Office documents embedded with VBA macros. Upon execution, the malware employs multiple anti-analysis techniques to detect research environments, ensuring stealthy persistence on infected networks.

Mapping Multiple UDPGangster Variants

Analysis of campaign-specific document lures revealed multiple UDPGangster variants. Each sample was delivered via a highly tailored social engineering document whose theme, language, and content were specifically aligned with the intended target’s sector and geography.

By tracing the execution from the initial lure to the final payload, we mapped usernames to their respective targets based on the embedded PDBs paths, as shown in Table 1.

Country Sector PDB Path
Israel Aviation C:\Users\gangster\source\repos\udp_3.0 - Copy - Copy\x64\release_86\udp_3.0.pdb
Azerbaijan Finance C:\Users\piper\source\repos\udp_3.0 - Copy\x64\release_86\udp_3.0.pdb
Israel Telecom C:\Users\surge\source\repos\udp_3.0 - Copy\x64\release_86\udp_3.0.pdb

Table 1: Different users in the PDB paths and their respective targets.

Observed Live Activity by Boggy Serpens

During our analysis of UDPGangster, we observed live threat actor interaction with a controlled test environment. Approximately 12 hours after the initial C2 heartbeat connections were established, the threat actor began issuing commands to the simulated victim.

This interaction provided a unique window into the actor’s operational procedures, confirming a distinct shift from automated infection to manual, human-led triage.

  1. ~07:30 CST (17:00 Iranian standard time): The actor sent a packet prefixed with byte 0x0A. This instruction triggered the creation of a named pipe on the target host to facilitate subsequent command shell execution. This timestamp corresponds to 17:00 in Tehran, placing the activity directly at the end of the standard Iranian business day.
  2. Reconnaissance: Once the pipe was established, the actor issued a succession of reconnaissance commands via the UDP C2 channel:
    • nslookup ad
    • ipconfig /all
    • dir C:\users
    • dir C:\users\[REDACTED]\Desktop
    • Quser

The command dir C:\users\%username%\Desktop specifically targeted a user folder identified in the output of the previous dir command. This step confirms that a human operator was manually triaging the host in real-time, rather than relying on an automated script.

Anomalous Behavior

We also observed the actor sending a packet beginning with byte 0x0B – distinct from the functional 0x0A command. Static analysis of the malware indicates no functionality associated with 0x0B. This discrepancy suggests either a manual mistake by the threat actor during command entry, or the existence of separate malware versions with differing command sets.

LampoRAT

Our analysis uncovered another new tool used by Boggy Serpens – a remote access trojan (RAT) written in Rust named LampoRAT (also known as Olalampo). This binary was used in the recent targeted campaign against a UAE-based marine and energy company. The sample masquerades as an executable for legitimate security software – avp.exe (Kaspersky Anti-Virus process) – and embeds the string Kaspersky in the file’s metadata.

The malware leverages the Telegram Bot API for command and control, a technique that allows malicious traffic to blend in with legitimate encrypted HTTPS communications.

Functionally, the RAT is a streamlined shell executor. Upon infection, it connects to the hardcoded bot token (8398566164:AAEJbk6EOirZ_ybm4PJ-q8mOpr1RkZx1H7Q) and awaits instructions.

When a command is received, the malware passes it to a dispatcher logic that supports system execution and basic internal commands like /cd for navigation. The malware spawns a shell using a specific argument string: cmd.exe /e:ON /v:OFF /d /c <payload>. The dispatcher then captures the output and transmits the results back to the attacker’s Telegram chat.

An overview of the malware’s capabilities was recently published by Group-IB.

Bot Profile and Configuration

Querying the /getMe Telegram API for the hardcoded token reveals the bot’s public profile configuration, as seen in Figure 11.

A screenshot of a code snippet displays the public profile configuration of the Telegram bot. The bot's capabilities include joining groups and reading all group messages, with inline queries and web app features disabled.
Figure 11. Bot configuration with developer-assigned stager_51_bot identifier.

The metadata provides further insight into the attacker’s naming conventions and operational structure:

  • Display Name: Olalampo
  • Username: stager_51_bot

The specific choice of the username stager_51_bot indicates the malware’s intended function. In offensive operations, a stager is typically a lightweight payload designed to establish a foothold and download further modules. The “51” numbering suggests this may be part of a larger series of bots generated for distinct campaigns or targets, reinforcing the hypothesis of a segmented, high-volume infrastructure.

Indicators of AI-Assisted Development

A distinct stylistic artifact within the binary’s strings strongly suggests the threat actor used generative AI to accelerate development. The command dispatcher uses emojis for status reporting – specifically, strings such as the following:

  • CD to
  • CD error:

This usage is not typical for malware authors, who usually favor standard ASCII logging ([+] or ERROR: ), to ensure the output is readable on any system and to avoid creating unique signatures. In contrast, code generated by large language models (LLMs) frequently includes user-friendly visual indicators by default when prompted to create command-line interfaces (CLIs) or Telegram bots.

This finding is a strong indication that Boggy Serpens is leveraging generative AI to write code and accelerate the creation of new malware variants.

Conclusion

Boggy Serpens’ recent activity exemplifies a maturing threat profile, as the group integrates its established methodologies with refined mechanisms for operational persistence. By diversifying its development pipeline to include modern coding languages like Rust and AI-assisted workflows, the group creates parallel tracks that ensure the redundancy needed to sustain a high operational tempo. This persistence has enabled a coordinated campaign across critical sectors in the Middle East, the Caucasus, Central Asia and more.

The defining characteristic of the threat actor activity remains the exploitation of trusted relationships to bypass traditional security mechanisms. Merging sophisticated implants with high-confidence social engineering, the group demonstrates distinct agility in shifting targets. This strategy allowed it to pivot between sectors with ease, signaling a clear intent for economic espionage and potential capabilities for regional disruption.

As the group continues to prioritize identity-based attacks alongside rapid, AI-assisted development cycles, we believe that the attackers are well-positioned to expand this targeting to increasingly sensitive upstream entities.

Organizations must look beyond sender reputation and automated spam filters and focus on detecting underlying behavioral anomalies to counter this evolving threat. Neutralizing secondary infection stages requires strict macro execution policies, alongside behavioral monitoring of endpoint processes. These practices help detect evasive executable payloads and memory-resident payloads before they establish persistence.

Palo Alto Networks Protection and Mitigation

Palo Alto Networks customers are better protected from the threats discussed above through the following products:

  • Cortex XDR and XSIAM help to prevent the threats described in this article, by employing the Malware Prevention Engine. This approach combines several layers of protection, including Advanced WildFire, Behavioral Threat Protection and the Local Analysis module, designed to prevent both known and unknown malware from causing harm to endpoints.
  • Next-Generation Firewalls with Advanced WildFire identify and block the malicious VBA macros and binary payloads to help prevent initial infection.
  • Advanced URL Filtering and Advanced DNS Security can help categorize and block access to the malicious and compromised domains used for C2 and payload delivery.
  • The Cortex Advanced Email Security module extends the power of the Cortex platform into cloud-hosted email environments, providing a scalable, AI-driven layer for detection, investigation and response.
  • Cortex’s AgentiX Agentic Assistant streamlined our investigation by enabling the team to query the data using natural language, providing deeper context and insights, and suggesting clear recommendations on what should be done next. Figure 12 shows the AgentiX interface when querying for malicious activity in a tenant.
A screenshot of a text-based investigation summary on macro activities over the last 90 days. The report includes detection timelines from Jan 28th, 2026, and a consistent direction on activity pattern. It describes an overview of a recent malicious macro activity with two high‑severity detections from TRAPS, which relate to emails containing macro document links. The report highlights organizations involved and requests completion, offering to investigate further.
Figure 12. Querying for malicious activity in the tenant, using AgentiX.

If you think you may have been compromised or have an urgent matter, get in touch with the Unit 42 Incident Response team or call:

  • North America: Toll Free: +1 (866) 486-4842 (866.4.UNIT42)
  • UK: +44.20.3743.3660
  • Europe and Middle East: +31.20.299.3130
  • Asia: +65.6983.8730
  • Japan: +81.50.1790.0200
  • Australia: +61.2.4062.7950
  • India: 000 800 050 45107
  • South Korea: +82.080.467.8774

Palo Alto Networks has shared these findings with our fellow Cyber Threat Alliance (CTA) members. CTA members use this intelligence to rapidly deploy protections to their customers and to systematically disrupt malicious cyber actors. Learn more about the Cyber Threat Alliance.

Indicators of Compromise

Phishing Document IOCs

Lure Filename First Seen SHA256 Hash
Unknown file name April 17, 2025 c3afd5ce1ca50a38438bb5026cca27bfbf2d8e786e03f323adceb8ad17517eca
sh*t.doc (profanity masked) July 24, 2025 52d8fb9a11920f27b9a3b43f27c275767a57cdffc95af94b7b66433506287314
Online Seminar.FM.gov.om.doc August 19, 2025 b2c52fde1301a3624a9ceb995f2de4112d57fcbc6a4695799aec15af4fa0a122
Online Seminar.MFA.gov.ct.tr (2).doc August 19, 2025 1c16b271c0c4e277eb3d1a7795d4746ce80152f04827a4f3c5798aaf4d51f6a1
Transfer receipt #27790.doc August 11, 2025 4db3645f678fb519b9f529dde41f77944754f574f16a9a845c22d3703da5bed0
DPR for dredging in FreeSpan_16082025.2.doc August 16, 2025 2c92c7bf2d6574f9240032ec6adee738edddc2ba8d3207eb102eddf4ab963db0
AIC_2025.doc September 16, 2025 23f3a98befdff13c802eed32eea754018b8b525ec0dd3afce8459a0287df74ec
Middle East and Maritime Economy.doc October 2025 69e038b9f3a228f09059bc1ce92b1c5c49396bb70987a38df0fdb39eed380b22
sondouq.doc October 2025 84e665a0dfbff74b4c356bfa282c7c253ae3411a8f4d58bfe121c8411c52552c
Webinar.doc (in Webinar.zip) October/November 2025 6f079c1e2655ed391fb8f0b6bfafa126acf905732b5554f38a9d32d0b9ca407d
Scheduled_Internet_Outages.doc November 2025 7ea4b307e84c8b32c0220eca13155a4cf66617241f96b8af26ce2db8115e3d53
Cybersecurity.doc January 2026 f38a56b8dc0e8a581999621eef65ef497f0ac0d35e953bd94335926f00e9464f
Transaction Volumes Sheet_Filled.xls February 2026 0ce54a5a6f061b158e3891aadd03773d0bae220b0316e84fc042a741924b3525
Sajeev Saliha Beevi.doc February 2026 167d5ab70f55c100e51833fbfea44048095889c162e1330df0631423fc547409
Consumption Report (Jan 21 2025 – Feb 20 2026).xls February 2026 4d2958d93d4650fc4a70f70663fe6943e8c11d61b2824512da296e8fd84e5bb9

Domains

These domains serve as C2 infrastructure for various malware families, including the new Rust-based BlackBeard and the evolving Phoenix line.

  • bootcamptg[.]org
  • codefusiontech[.]org
  • maxisteq[.]org
  • miniquest[.]org
  • Netivtech[.]org
  • nomercys.it[.]com
  • promoverse[.]org
  • reminders[.]trahum[.]org
  • screenai[.]online
  • stratioai[.]org

IP Addresses

Port 1269/1259 – UDPGangster communication

  • 157.20.182[.]75

Hardcoded UDPGangster C2

  • 64.7.198[.]12

Phoenix C2

  • 46.101.36[.]39

BlackBeard C2

  • 159.198.68[.]25
  • 159.198.66[.]153

SHA256 File Hashes

This list includes the core Phoenix, BlackBeard, UDPGangster, LampoRAT and Nuso implants, their specialized loaders, and the initial malicious documents.

Category SHA256 Hash
BlackBeard Variant 156b325231742a73ded4104fbde1c55ad3913d2eaf09b5194ef74c81ee3ba393
BlackBeard Variant cc2ec568f978f328b6de112670a1b35ca1f9db377ff32cb9d313a5b2ac3c127b
BlackBeard Variant (Reddit.exe) 7523e53c979692f9eecff6ec760ac3df5b47f172114286e570b6bba3b2133f58
BlackBeard Variant (Reddit.exe) 0be499354dc498248d27f6d186eb3bb75a607ae4a2c0a6734c76f1a1b7b1d316
LampoRAT 81a6e6416eb7ab6ce6367c6102c031e2ae2730c3c50ab9ce0b8668fec3487848
Loader/Injector 47bb271c34210f52e3e08339a0c83688d9e9aa5c7cfc45b3e4bdffd1753f6cb2
Nuso Variant 1b9e6fe4b03285b2e768c57e320d84323ac9167598395918d56a12e568b0009a
Nuso Variant 9c207c51c448f96eaae91241a39c8bb85e2307f2d2a99244763a53176cf4c02f
Nuso Variant c91413ad7c94c0e2694862b9d671d1204873bf65576ba2cb91fbd562a4ccf79b
Phoenix v4/Mononoke 668dd5b6fb06fe30a98dd59dd802258b45394ccd7cd610f0aaab43d801bf1a1e
Phoenix v4/Mononoke 5ec5a2adaa82a983fcc42ed9f720f4e894652bd7bd1f366826a16ac98bb91839
Rust Payload (BlackBeard) a2001892410e9f34ff0d02c8bc9e7c53b0bd10da58461e1e9eab26bdbf410c79
Rust Payload (BlackBeard) 1bcd8d7dc7bed5873bbdd2822e84e19773a33d659b16587ca9dc6db204447a86
UDPGangster Payload fc4a7eed5cb18c52265622ac39a5cef31eec101c898b4016874458d2722ec430
GhostBackDoor 8d2227f2c53d7e22a57e12c45cecdd43dbec08dbc3ab93e74e6df52cdf80548b

PDBs

Context/Malware PDB Path
BlackBeard and generic Phoenix family variants C:\Users\win10\Desktop\phonix\phoenix\x64\Release\phoenix.pdb
LampoRAT Char.pdb
Nuso variant C:\Users\nuso\source\repos\http_vip\http_vip\f*ckAnalyzor.pdb
Nuso variant C:\Users\nuso\source\repos\http_last_ver\http_last_ver\f*ckAnalyser.pdb
Phoenix Dropper and Phoenix Malware D:\phonix\phoenixV3\phoenixV3\phoenixV2\x64\Release\phoenix.pdb
Phoenix v4 variant C:\Users\win10\Desktop\phoenixV4\phoenixV3\phoenixV2\x64\Release\phoenix.pdb
Phoenix v4/Mononoke backdoor C:\Users\win10\Desktop\phoenixV4\phoenixV3\phoenixV2\x64\Debug\phoenix.pdb
UDPGangster (Target: Azerbaijan) C:\Users\piper\source\repos\udp_3.0 - Copy\x64\release_86\udp_3.0.pdb
UDPGangster (Target: Israel) C:\Users\gangster\source\repos\udp_3.0 - Copy - Copy\x64\release_86\udp_3.0.pdb
UDPGangster (Target: Israel) C:\Users\SURGE\source\repos\udp_3.0 - Copy\x64\release_86\udp_3.0.pdb

Encryption Keys

AES-256-GCM Encryption – Rust Payload
File Hash 1bcd8d7dc7bed5873bbdd2822e84e19773a33d659b16587ca9dc6db204447a86
IV ft3mqb65h4hc
Key kqdkc83pe81zmq709c4npejvto9eg20e
XOR – C++ Dropper
File Hash 5323a573e3f423b69ef965dadb3c059879d718b1c9052038ef749868cf361891
Key jfdghkjfdgklhjdfhgsfd09g9045jlkdfjlkgedfg5949045dfjgdflgljkdfgdf

Telegram Bot IDs

Telegram Bot ID
Value 8398566164:AAEJbk6EOirZ_ybm4PJ-q8mOpr1RkZx1H7Q

Additional References

Appendix A: The Nuso Development Track

Nuso is a custom HTTP backdoor family identified as the final payload in Wave 4 of the campaign against an UAE-based energy company. Relying on Dynamic API Resolution rather than standard Import Address Tables (IAT), the malware serves as a highly evasive reconnaissance and command execution tool.

  • Command Execution: Instead of traditional command strings, Nuso uses HTTP status codes as triggers. For example, 201/204 initiates a remote shell, 210/222 updates the C2 polling interval, and 350/404 signals termination.
  • C2 Architecture: Nuso beacons over HTTP/S, exfiltrating system information via bit-rotated custom headers like X-Computer-Name and X-Username. Figure 13 shows an example request, including the custom headers.
A screenshot displays a coded script, illustrating a POST request within a programming environment.
Figure 13. Simulation of the first request sent by the malware to the C2 server.

The malware’s full capabilities are analyzed by Group-IB under the name HTTP_VIP.

Cross-Variant Attribution via PDB Metadata

We analyzed three distinct variants of the Nuso backdoor. The PDB paths in the compiled binaries of the second and third variants show that they are linked:

  • Variant 2: C:\Users\nuso\source\repos\http_vip\http_vip\f*ckAnalyzor.pdb (profanity masked)
  • Variant 3: C:\Users\nuso\source\repos\http_last_ver\http_last_ver\f*ckAnalyser.pdb

The presence of the nuso user profile in these paths identifies the developer’s environment. Furthermore, the transition from the misspelled Analyzor in the VIP build to the corrected Analyser in the Last Ver build suggests that a single author has been maintaining and refining the codebase over time.

Appendix B: Deconstructing the Phoenix and UDPGangster VBA Builders

Our analysis revealed two parallel development lines of VBA Builders, each employing a completely different payload. In this section, we analyze the VBA code and discuss the connection between the two lines.

The Phoenix Lineage

The Phoenix track represents the group’s primary development line, which delivers the Phoenix and BugSleep malware.

Analysis of the Phoenix macros development track reveals increasing technical maturity. Over the past year, we have observed more than 10 variants, with each subsequent iteration incorporating more complex analysis evasion techniques, several of which we highlight here.

Variant One

The group’s initial campaigns demonstrated the use of core obfuscation techniques. The early-stage macros that continue to characterize the group’s operations include:

  • Property-based payload encapsulation: The payload is not present in the macro code itself. Instead, it is concealed as a hexadecimal string within the properties of a generic user interface element UserForm1.TextBox1. The script retrieves and decodes this hidden string using a custom function named HH.
  • Drop-rename execution: The script writes the decoded payload to the C:\Users\public path with a benign .log extension to bypass initial file-write detection. Immediately after creation, the script renames the file extension to .exe and executes the payload using the ShellExecuteA API, completing the infection chain.

Variant Two: Novaservice

This variant introduced a custom hex-shift rotation cipher to decrypt the payload and implements the same drop-rename workflow:

  • Drop: Writes the malware as a benign text file: novaservice.txt
  • Rename: Renames the file extension to .exe
  • Execute: Launches the file using the ShellExecuteEx API

This rotation pattern is shown in Figure 14.

A screenshot of Visual Basic for Applications (VBA) code. The code defines a subroutine called "main" with variables and strings related to user input and file execution. The function `ShellExecute` is used to open a file, and there are commented-out lines.
Figure 14. A code snippet showing the rotation pattern.

Decoding the hexadecimal string in the above code snippet provides the malware’s path:

  • String: 4A41635C7A6C797A63577C6973706A634B767E757376686B7A6375767D687A6C797D706A6C356C7F6C
  • Decoded path: C:\Public\Downloads\novaservice.exe

Figure 15 shows the stages of the “drop-rename” Novaservice variant.

A flowchart visually illustrates a generic malware attack process, detailing the sequence of steps from initial compromise to payload execution and persistence.
Figure 15. The macro’s drop-rename flow.

Cortex XDR’s Behavioral Threat Protection is designed to block high-severity “drops and executes” actions by identifying abnormal behavior by the VBA script. While VBA scripts are capable of launching executables, it is not their intended behavior. Figure 16 shows the alert that is triggered.

A report screenshot details a staged malware detection, specifically "Office executable drops and executes EXE file," with "XDR Agent" as the source. The detection is marked with a severity level of "2."
Figure 16. Cortex XDR detection of the Office document dropping and executing malware.

Other features of the macros identified in more recent campaigns include:

  • Lateral execution: Instead of standard shell commands, this variant utilizes Windows Management Instrumentation (WMI) (Win32_Process.Create) or Windows API calls (CreateProcessW). This decouples the malware process from Microsoft Office documents, breaking the commonly monitored parent-child process tree.
  • Brute-force stalling: One variant implements a mathematical “time-loop” (function laylay) that forces the CPU to execute over 100 million operations. This stalls execution long enough for many automated analysis tools to time out, as Figure 17 shows.
A code snippet featuring a function named "laylay" in a programming language, characterized by nested loops iterating from "tmp1" to "tmp4."
Figure 17. A code snippet showing the time loop implemented in the macros.

The UDPGangster Operations

The UDPGangster backdoor operates in parallel to the Phoenix lineage, and was previously analyzed by Fortinet.

Comparative analysis of the dropper code reveals that UDPGangster and Novaservice share identical decryption routines and similar file paths. This overlap confirms that both malware families originate from a shared development pipeline.

Both VBA builders rely on the DSDSDSDS decryption function, stash their payloads in the same UserForm1.TextBox1 location and utilize an identical hex string starting with 4A4163. The hex decodes to one of the following locations for the drop path:

  • C:\Users\Public\Documents\novaservice.exe
  • C:\Users\Public\Documents\novaservice.txt

Figure 18 shows these functions.

A code snippet of Visual Basic for Applications (VBA) code. The code includes function declarations, string manipulations, object properties, and conditional statements. Some code comments and hexadecimal color codes are present. The script appears to perform operations involving process handling and manipulation of text or shapes within a document.
Figure 18. Code snippet showing reuse of the same hex and rotation mechanism to yield the same path.

Appendix C: BlackBeard, a Backdoor Written in Rust

Recently tracked by the Israeli National Cyber Directorate (INCD) as BlackBeard, this Rust-based backdoor marks a strategic shift toward memory-safe languages to complicate reverse engineering efforts. Despite the new language, its intermediate C++ loader contains PDB paths referencing phoenix, strongly suggesting it was developed by the same Boggy Serpens cell.

C++ Dropper and Injector Analysis

The intermediate C++ stager is built for stealth. It employs dynamic API resolution, string obfuscation (addition ciphers), and Fibonacci-based CPU delays to defeat sandboxes. The stager decrypts the final Rust payload using a hardcoded XOR key and executes it in memory using process hollowing (RunPE).

The deployed payload is the BlackBeard malware. Figure 19 illustrates this XOR decryption routine.

A screenshot displays a code snippet featuring a for loop. The loop initializes a variable, increments it, and includes a conditional break statement. An expression within the loop modifies a memory address using XOR and modulus operations with a variable and a key, and the function returns a result.
Figure 19. XOR decryption used by the malware.

Figure 20 illustrates how Cortex XDR’s Behavioral Threat Protection caught a suspicious PE injection to a remote process. This is a critical detection for any security team, because process injection is a well-known method for evading EDR tools and escalating privileges by executing malicious code within the memory space of a trusted, legitimate process.

A screenshot of a and XDR security alert detailing a "Suspicious PE Injection to a remote process." The source is listed as XDR Agent, module as Behavioral Threat Protection, category as Malware, and severity as High.
Figure 20. Process Injection detection of BlackBeard by Cortex XDR.

The Final BlackBeard Payload

The self-signed Rust binary initiates its execution by scanning the %PROGRAMDATA% directory for over 15 distinct security products. The BlackBeard payload operates through several modules:

  • C2 Communication
    • The malware communicates with stratioai[.]org using the reqwest Rust crate.
    • System data (such as antivirus vendors and username) is encrypted with AES-256-GCM, with a hardcoded key and initialization vector, and exfiltrated in the HTTP Expires header.
  • HTTP Status Commands
    • Like Nuso, the Rust binary relies on HTTP response codes.
    • Codes 201 and 202 instruct the malware to drop decrypted content received from the C2 server to the C:\ProgramData\WebDeepPlayer.scr path.
    • Code 418 triggers an exit.
  • Persistence
    • The group ensures malware persistence by creating a custom file association.
    • The payload registers the nonexistent .wdlp extension in the HKCU\Software\Classes\.wdlp registry to execute WebDeepPlayer.scr. This ensures that when a file with the .wdlp extension is opened, the WebDeepPlayer.scr program is executed.
    • The malware drops a file named Oregon.wdlp into the startup folder – effectively triggering the infection chain every time the computer is restarted.

Figure 21 shows the registry key that ensures malware execution.

A screenshot displays the Windows Registry Editor, showing a specific registry path. The right pane lists a default value along with its associated data, potentially indicating a persistence mechanism.
Figure 21. The registry key that is created to enforce the execution logic.
Enlarged Image