Operation Olalampo: MuddyWater’s New AI-Enhanced Cyber Offensive in MENA Region

Summary:

MuddyWater has launched a new cyber campaign, Operation Olalampo, targeting organizations across the Middle East and North Africa (MENA). The operation leverages advanced custom malware families, including GhostFetch, GhostBackDoor, HTTP_VIP, and the Rust-based CHAR backdoor, combined with phishing-based initial access techniques.

To enhance evasion and operational agility, the campaign employs malicious Microsoft Office documents, in-memory payload execution, Telegram-based command-and-control (C2) channels, and abuse of legitimate remote administration tools such as AnyDesk. Indicators of AI-assisted development techniques further suggest efforts to accelerate tooling evolution and improve evasion capabilities.

The campaign reinforces MuddyWater’s continued intent to compromise regional government and enterprise networks, demonstrating diversified C2 infrastructure, persistent remote access mechanisms, and evolving malware sophistication. These developments highlight the urgent need for strengthened email security, endpoint monitoring, and proactive vulnerability management controls across MENA organizations.

Technical Description:

Operation Olalampo follows a multi-phase infection chain initiated through spear-phishing emails delivering weaponized Microsoft Office documents. These documents require macro execution to decode and release initial payloads. Depending on the campaign variant, the macro either deploys the Rust-based CHAR backdoor directly or installs GhostFetch or HTTP_VIP downloaders.

To evade disk-based detection, GhostFetch executes secondary payloads such as GhostBackDoor entirely in memory. It also performs environmental profiling, including mouse movement validation, screen resolution checks, and detection of debuggers, virtual machines, and antivirus solutions.

HTTP_VIP establishes authenticated communication with remote C2 infrastructure, deploys legitimate remote access tools such as AnyDesk, and conducts host reconnaissance. Recent iterations expand functionality to include file transfer, clipboard capture, interactive shell access, and configurable beacon intervals.

The Rust-based CHAR backdoor demonstrates modular architecture and anti-analysis controls. Leveraging Telegram bot-based C2 communications, it enables command execution, directory traversal, data exfiltration, SOCKS5 proxy deployment, and secondary payload delivery. These capabilities reflect increasing operational sophistication and dynamic tasking flexibility. Further technical details of the campaign are outlined below.

Delivery and Infection Chain:

MuddyWater primarily initiates Operation Olalampo through spear-phishing emails containing malicious Microsoft Office attachments, particularly Excel documents. To enhance credibility, phishing lures reference regionally relevant themes such as corporate reports, airline itineraries, and energy-sector communications.

Victims are prompted to enable macros, which decode embedded payloads and execute them locally. Beyond email-based intrusion, the group has also exploited newly disclosed vulnerabilities in internet-facing servers to obtain initial access.

The infection chain has been identified as follows:

  • Spear-phishing emails deliver malicious Microsoft Office attachments (primarily Excel files) prompting victims to enable macros, which decode and execute embedded payloads.
  • The macro deploys and launches a first-stage downloader (GhostFetch or HTTP_VIP) or, in certain variants, directly installs the Rust-based CHAR backdoor.
  • The downloader conducts host reconnaissance and anti-analysis checks (e.g., VM/debugger detection, antivirus checks, user interaction validation) before establishing communication with attacker-controlled infrastructure.
  • Secondary payloads are retrieved and executed, frequently in memory, including GhostBackDoor or legitimate remote access tools such as AnyDesk, enabling persistent remote access and interactive command execution.
  • Post-exploitation activities include file upload and download, credential and browser data theft, SOCKS5 proxy deployment, lateral movement, and sustained command-and-control through HTTP-based servers or Telegram bot infrastructure.

Technical Capabilities:

Operation Olalampo showcases a modular and evasive malware architecture engineered to ensure stealth, adaptability, and long-term persistence. Initial loaders GhostFetch and HTTP_VIP conduct extensive system reconnaissance, including environment fingerprinting, screen resolution validation, mouse activity monitoring, and detection of debugging tools, virtual machines, and antivirus software.

To minimize disk artifacts and evade signature-based detection, payloads are frequently executed directly in memory. GhostFetch retrieves secondary implants such as GhostBackDoor, which facilitates interactive shell access, file manipulation, and re-execution of earlier infection stages.

HTTP_VIP authenticates with C2 infrastructure and may deploy legitimate remote administration tools such as AnyDesk to blend malicious activity with authorized administrative traffic.

The Rust-based CHAR backdoor further enhances operational capabilities via Telegram bot-based C2 communications. It enables execution of PowerShell and cmd.exe commands, SOCKS5 reverse proxy creation, browser credential exfiltration, file upload and download, and execution of additional payloads. Adjustable beacon intervals and dynamic tasking allow flexible post-exploitation operations.

The toolkit’s sophistication is further evidenced by anti-analysis mechanisms, diversified C2 channels (HTTP and Telegram), modular payload distribution, and indications of AI-assisted development practices designed to accelerate code generation and enhance evasion techniques.

Attribution and Evolution:

Operation Olalampo is attributed to MuddyWater, also tracked as Earth Vetala, Mango Sandstorm, and MUDDYCOAST. The campaign demonstrates continuity with previously observed tactics, techniques, and procedures (TTPs), including macro-enabled phishing and deployment of custom backdoors.

The CHAR malware shares structural similarities with earlier Rust-based malware families associated with the group, indicating evolutionary codebase development. Indicators of AI-assisted development, including structured debug artifacts and distinctive coding patterns, suggest experimentation with generative AI tools to accelerate malware customization and operational deployment.

Active Campaign and Geographic Spread:

Activity observed since January 2026 indicates primary targeting of organizations within the Middle East and North Africa (MENA), including government agencies, regional enterprises, and energy and marine service providers.

The group’s sustained focus on the Middle East, Turkey, and Africa (META) region aligns with historical targeting patterns consistent with Iranian geopolitical and strategic interests. The use of diversified infrastructure and varied phishing themes suggests a continuous, adaptive campaign rather than isolated intrusion attempts.

Conclusion:

Operation Olalampo illustrates MuddyWater’s continued operational maturation through the integration of traditional phishing techniques with Rust-based malware, memory-resident execution, Telegram-based C2 channels, and AI-assisted development methodologies.

The campaign underscores the necessity for strengthened macro controls, advanced endpoint detection, proactive vulnerability management, and rigorous monitoring of remote administration tool misuse across MENA enterprises.

Impact:

A successful compromise enables full remote control of affected systems, including command execution, credential harvesting, data exfiltration, and potential lateral movement across organizational networks.

The abuse of legitimate administrative tools complicates detection efforts and enhances operational stealth. The malware’s modular design supports dynamic payload updates and sustained persistence, increasing the risk of espionage, operational disruption, and prolonged network compromise.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Execution, Persistence, Defense Evasion, Command and Control, Discovery, Credential Access, Lateral Movement, Exfiltration
Technique Name Spear-Phishing Attachment
User Execution
Command and Scripting Interpreter
Ingress Tool Transfer
Remote Services
System Information Discovery
Sub Technique Name Office Macros
PowerShell
Windows Command Shell
SOCKS5 Proxy
Web-Based C2 Communication
Exfiltration Over Command and Control Channel
Attack Type Malware
Targeted Applications Microsoft Excel, Microsoft Office Suite, Windows cmd.exe, PowerShell, Telegram (for C2), AnyDesk
Region Impacted Middle East and North Africa (MENA), Turkey
Industry Impacted Government, Energy & Marine Services, Telecommunications, Enterprise Organizations, Critical Infrastructure
IOC’s Domains
codefusiontech.org
Promoverse.org
miniquest.org
jerusalemsolutions.com

IP Addresses
162.0.230.185
209.74.87.100
143.198.5.41
209.74.87.67

SHA-1 Hashes
f4e0f4449dc50e33e912403082e093dd8e4bc55d
3441306816018d08dd03a97ac306fac0200e9152
9ca11fcbd75420bd7a578e8bf6ef855e7bd0fb8e
06f3b55f0d66913cd53d2f0e76a5e2d67ff8ed04
7bd04218276fc8f375c0ce3be43a710f6a2b4d09
2f5166086da5a57d7e59a767a54ed6fe9a6db444
8c592d9ab58264e68dfe029ea90f80862c526670
f779a3b1dcc0c3aacacf7ebfa4ed57d53af7e26c
2993b0ab9786ddc29eb9cf1ace4a28c6e34ea4fb
e3cc95ca6e271ddf04cd88c85051b2cc9ce04e8e
270dbaedfbeef9333e0780f3c4e74c01392ce381
d3fa50a9eba93a7fbc79e7ad0c4889d762718a5f
392a36717fa948f7e00d35711e8598108fbe2f72
62ed16701a14ce26314f2436d9532fe606c15407
ceb9b7dfb8a36ee8fe223063a6e3f730f2dcefd1
88cb6169fd7dd21e6d6aa3a8df0a78938e698028
d0d7d0c816753639b5c577aacf14fd2e994b64b0
b55e063607e8f56c9b398b289ba04ddca11398fe
5c1500296857ed0b0bb7230a1cb17993d25ab69b
f449b95830c584cef72dfb60fb78ee3d6c69ecb4
3c47eab6ebe5b48097c0099ff18f2a8bc13c12f7
324918c73b985875d5f974da3471f2a0a4874687
e21564fd0fc3103c1d18b1e1525a0b40e9077d40
feb4318a90057d92ea5ab6420ed6164dd9605013
0365daf83e37d2c6daaae6c28b4c8343288ef2f9
777040bed9d26f5da97e8977c6efc0586beae064
f5a129ba4141361ca266950dc4adcb2c548aa949
f77499a8fc6e615e21bf111a88c658ba3d5f0f81
dc785be0c4430bfc5b507255f892bf30134a02b6
e79ccc3f6517c911d6c1df79c94e88896f574e64
2eea39dbe11889e5713cbca020f7ede653bc48ec
975c763e050d0a9a46f0aafdde66d3e7f0626c5b
d97d21536c061e7a7151a453242d36f3ab196a14
56380a652471962387693f4bcc893fd21f0fc324
9defffba933fc44f8e3b6e25b31508bc17d29077
efb18cf7cf227037e034c0b525f502e642815f94
0588cf26b6e9210f86a266ac0366af1fd29f135c
80cea18e19665c5a57e7b9ca0bf36aad06096e93
7d3757d5165e2e95b0b89e33316025a4b9301e2d
ac982b7b46e085e0bb51cba2edb61bff5910b6a8
8632b62fa14fd679fa97cfe50e6c25696b846129
ea80deaed00c8b71aa0033b00fe0ef5b63840b99
92e2f826804d762679b13283102f3560078eb4cb
CVE NA

Recommended Actions:

  • Disable Microsoft Office macro execution by default and enforce Group Policy controls to block macros in internet-originated documents.
  • Implement advanced email security controls, including attachment sandboxing, URL rewriting, and DMARC/SPF/DKIM enforcement, to reduce phishing-based initial access.
  • Deploy and properly tune Endpoint Detection and Response (EDR) solutions to monitor in-memory execution, suspicious PowerShell activity, cmd.exe abuse, and anomalous parent-child process relationships.
  • Restrict and monitor use of remote administration tools such as AnyDesk, enforcing application allowlisting and alerting on unauthorized installations.
  • Conduct continuous vulnerability scanning of public-facing assets and implement timely patch management to remediate newly disclosed and actively exploited vulnerabilities.
  • Monitor outbound network traffic for suspicious HTTP/HTTPS beaconing patterns, connections to newly registered or low-reputation domains, and unauthorized Telegram communications.
  • Enforce least-privilege access controls and network segmentation to limit lateral movement and reduce the impact of compromised credentials.
  • Establish proactive threat hunting focused on behaviors associated with MuddyWater TTPs, including macro-enabled document execution, SOCKS5 proxy creation, browser credential theft, and anomalous interactive shell activity.

Reference:

https://www.group-ib.com/blog/muddywater-operation-olalampo/