MuddyWater Deploys Blockchain-Based ChainShell via Russian MaaS
Iranian APT MuddyWater adopts Russian TAG-150 malware-as-a-service platform to deploy ChainShell RAT against Israeli targets. C2 addresses resolved via Ethereum smart contracts evade takedowns.
Iran's MuddyWater espionage group has shifted tactics by adopting a Russian-built malware-as-a-service platform to target Israeli organizations with a previously undocumented implant called ChainShell. The Node.js-based agent resolves its command-and-control addresses directly from Ethereum smart contracts—making traditional sinkholing and IP blocking ineffective.
This marks a notable operational evolution for MuddyWater, which has historically relied on custom-developed tools. The pivot to criminal infrastructure suggests either capability gaps or a deliberate choice to complicate attribution.
ChainShell and Blockchain C2
ChainShell connects to 10 different Ethereum RPC providers to read its C2 address from a smart contract on the blockchain. Unlike conventional malware that phones home to fixed domains or IPs, ChainShell's C2 endpoint lives on immutable blockchain infrastructure.
Defenders can't sinkhole a smart contract the way they can seize a domain. And blocking one RPC provider means nothing when nine others remain available.
Communication occurs over AES-256-CBC encrypted WebSocket traffic, adding another layer of detection evasion. The sophistication represents a real problem for incident responders—the C2 address can be updated on-chain without touching the malware binary.
Russian MaaS Infrastructure
MuddyWater's ChainShell campaign leverages the TAG-150 malware-as-a-service platform, a Russian-operated criminal infrastructure that also provides CastleRAT. Together, these tools give MuddyWater capabilities including:
- Hidden VNC sessions
- Chrome cookie decryption
- Blockchain-resistant C2 communication
- Steganographic payload concealment
The backend infrastructure uses shared domains (such as serialmenot[.]com) with per-operation JWT credentials to separate access and tracking across deployments. This campaignized approach suggests TAG-150 operators maintain strict operational security around their clientele.
Attribution Indicators
Despite the infrastructure rental, attribution remains possible through code-signing analysis. The delivery chain is signed with certificates procured under the names "Amy Cherne" and "Donald Gay" from SSL.com—the same certificates that sign StageComp, a known MuddyWater tool.
PowerShell deployer scripts (reset.ps1) and PE payloads concealed via steganography match patterns from prior MuddyWater operations, including earlier campaigns against US banks and airports.
Why Rent Criminal Infrastructure?
Several factors may explain MuddyWater's shift to commercial malware services:
Plausible Deniability — Using Russian criminal infrastructure muddies attribution. If caught, Iran can claim the attack was criminal rather than state-sponsored.
Capability Access — Blockchain C2 and advanced evasion features may exceed what MuddyWater's developers can build in-house.
Operational Tempo — Commercial tools deploy faster than custom development cycles allow.
This mirrors the broader trend of nation-state APTs adopting criminal tools. The line between state espionage and cybercrime infrastructure continues to blur.
Campaign Targets
Current operations primarily target Israeli organizations, consistent with MuddyWater's historical focus on regional adversaries. The group, linked to Iran's Ministry of Intelligence and Security (MOIS), has previously targeted government, telecommunications, and energy sectors across the Middle East.
The timing aligns with escalated Iranian cyber activity documented in recent CISA advisories about Iranian APTs targeting critical infrastructure.
Detection Challenges
ChainShell presents several detection challenges:
- No static IOCs for C2 — The smart contract can update C2 addresses at will
- Legitimate RPC traffic — Ethereum RPC calls blend with cryptocurrency-related business activity
- Encrypted WebSocket — Traffic analysis requires TLS interception
- Steganographic delivery — Initial payloads hide in legitimate-looking image files
Network defenders should monitor for outbound connections to public Ethereum RPC endpoints (Infura, Alchemy, etc.) from unexpected hosts. Endpoint detection should flag Node.js processes making blockchain RPC calls in environments where that's unexpected.
Recommended Mitigations
- Block known TAG-150 infrastructure including serialmenot[.]com at the network perimeter
- Monitor Ethereum RPC traffic from non-cryptocurrency systems
- Hunt for Node.js persistence in unexpected locations
- Verify code-signing certificates against known-bad certificate subjects
- Deploy behavioral detection for steganographic payload extraction
For organizations in targeted sectors, assume MuddyWater will continue evolving its toolkit. The blockchain C2 approach may spread to other threat actors once the technique matures.
Related Articles
MuddyWater Deploys Dindoor Backdoor Against US Bank, Airport
Iranian APT group breaches US critical infrastructure using novel Dindoor malware built on Deno runtime. Symantec links campaign to MOIS.
Mar 12, 2026MuddyWater Deploys GhostFetch and Telegram-Based Backdoors
Iranian APT MuddyWater launches Operation Olalampo against MENA organizations, deploying four new malware families including GhostFetch and CHAR, a Rust backdoor controlled via Telegram.
Feb 23, 2026Iran's Infy APT Drops Tornado v51 After Internet Blackout
SafeBreach tracks Infy APT deploying Tornado v51 malware with blockchain-based C2 after Iran's internet blackout, confirming state sponsorship ties.
Feb 8, 2026MuddyWater Deploys Rust-Based RAT in Middle East Campaign
Iranian APT group shifts tactics with RustyWater implant targeting diplomatic, financial, and telecom sectors across the Middle East via spear-phishing.
Feb 1, 2026