PROBABLYPWNED
Threat IntelligenceApril 16, 20264 min read

MuddyWater Deploys Blockchain-Based ChainShell via Russian MaaS

Iranian APT MuddyWater adopts Russian TAG-150 malware-as-a-service platform to deploy ChainShell RAT against Israeli targets. C2 addresses resolved via Ethereum smart contracts evade takedowns.

Alex Kowalski

Iran's MuddyWater espionage group has shifted tactics by adopting a Russian-built malware-as-a-service platform to target Israeli organizations with a previously undocumented implant called ChainShell. The Node.js-based agent resolves its command-and-control addresses directly from Ethereum smart contracts—making traditional sinkholing and IP blocking ineffective.

This marks a notable operational evolution for MuddyWater, which has historically relied on custom-developed tools. The pivot to criminal infrastructure suggests either capability gaps or a deliberate choice to complicate attribution.

ChainShell and Blockchain C2

ChainShell connects to 10 different Ethereum RPC providers to read its C2 address from a smart contract on the blockchain. Unlike conventional malware that phones home to fixed domains or IPs, ChainShell's C2 endpoint lives on immutable blockchain infrastructure.

Defenders can't sinkhole a smart contract the way they can seize a domain. And blocking one RPC provider means nothing when nine others remain available.

Communication occurs over AES-256-CBC encrypted WebSocket traffic, adding another layer of detection evasion. The sophistication represents a real problem for incident responders—the C2 address can be updated on-chain without touching the malware binary.

Russian MaaS Infrastructure

MuddyWater's ChainShell campaign leverages the TAG-150 malware-as-a-service platform, a Russian-operated criminal infrastructure that also provides CastleRAT. Together, these tools give MuddyWater capabilities including:

  • Hidden VNC sessions
  • Chrome cookie decryption
  • Blockchain-resistant C2 communication
  • Steganographic payload concealment

The backend infrastructure uses shared domains (such as serialmenot[.]com) with per-operation JWT credentials to separate access and tracking across deployments. This campaignized approach suggests TAG-150 operators maintain strict operational security around their clientele.

Attribution Indicators

Despite the infrastructure rental, attribution remains possible through code-signing analysis. The delivery chain is signed with certificates procured under the names "Amy Cherne" and "Donald Gay" from SSL.com—the same certificates that sign StageComp, a known MuddyWater tool.

PowerShell deployer scripts (reset.ps1) and PE payloads concealed via steganography match patterns from prior MuddyWater operations, including earlier campaigns against US banks and airports.

Why Rent Criminal Infrastructure?

Several factors may explain MuddyWater's shift to commercial malware services:

Plausible Deniability — Using Russian criminal infrastructure muddies attribution. If caught, Iran can claim the attack was criminal rather than state-sponsored.

Capability Access — Blockchain C2 and advanced evasion features may exceed what MuddyWater's developers can build in-house.

Operational Tempo — Commercial tools deploy faster than custom development cycles allow.

This mirrors the broader trend of nation-state APTs adopting criminal tools. The line between state espionage and cybercrime infrastructure continues to blur.

Campaign Targets

Current operations primarily target Israeli organizations, consistent with MuddyWater's historical focus on regional adversaries. The group, linked to Iran's Ministry of Intelligence and Security (MOIS), has previously targeted government, telecommunications, and energy sectors across the Middle East.

The timing aligns with escalated Iranian cyber activity documented in recent CISA advisories about Iranian APTs targeting critical infrastructure.

Detection Challenges

ChainShell presents several detection challenges:

  1. No static IOCs for C2 — The smart contract can update C2 addresses at will
  2. Legitimate RPC traffic — Ethereum RPC calls blend with cryptocurrency-related business activity
  3. Encrypted WebSocket — Traffic analysis requires TLS interception
  4. Steganographic delivery — Initial payloads hide in legitimate-looking image files

Network defenders should monitor for outbound connections to public Ethereum RPC endpoints (Infura, Alchemy, etc.) from unexpected hosts. Endpoint detection should flag Node.js processes making blockchain RPC calls in environments where that's unexpected.

Recommended Mitigations

  1. Block known TAG-150 infrastructure including serialmenot[.]com at the network perimeter
  2. Monitor Ethereum RPC traffic from non-cryptocurrency systems
  3. Hunt for Node.js persistence in unexpected locations
  4. Verify code-signing certificates against known-bad certificate subjects
  5. Deploy behavioral detection for steganographic payload extraction

For organizations in targeted sectors, assume MuddyWater will continue evolving its toolkit. The blockchain C2 approach may spread to other threat actors once the technique matures.

Related Articles