MuddyWater Deploys Dindoor Backdoor Against US Bank, Airport
Iranian APT group breaches US critical infrastructure using novel Dindoor malware built on Deno runtime. Symantec links campaign to MOIS.
Iranian state-sponsored hackers have compromised networks at a US bank, an airport, and a software company supplying the defense sector, deploying a previously unknown backdoor that abuses the Deno JavaScript runtime to evade detection. Symantec and Carbon Black researchers attribute the campaign to MuddyWater, an APT group linked to Iran's Ministry of Intelligence and Security.
TL;DR
- What happened: MuddyWater breached multiple US organizations using new Dindoor backdoor
- Who's affected: US banks, airports, defense contractors, non-profits in US and Canada
- Attribution: MOIS-affiliated Seedworm/MuddyWater APT
- Action required: Hunt for Deno runtime abuse; block Wasabi cloud exfiltration; review spear-phishing controls
The Dindoor Backdoor
Researchers discovered Dindoor on compromised networks belonging to a US-based software company with Israeli operations and ties to the defense and aerospace sectors. The malware was also found at a US bank and a Canadian non-profit organization.
What sets Dindoor apart is its execution environment. Rather than traditional compiled malware, it leverages Deno, a modern JavaScript and TypeScript runtime. This choice helps the backdoor blend with legitimate developer tooling and complicates signature-based detection.
Dindoor provides attackers with:
- Remote command execution
- File system access
- Persistent network presence
- Encrypted communications designed to merge with normal traffic
The use of Deno represents an evolution in Iranian threat actor tooling. MuddyWater has historically relied on PowerShell and Python for post-exploitation, but Dindoor suggests the group is experimenting with newer technologies to stay ahead of defenders.
Data Exfiltration via Cloud Storage
Beyond Dindoor, researchers observed attackers attempting to exfiltrate data using Rclone, a command-line tool for managing cloud storage. The stolen data was destined for Wasabi cloud storage buckets controlled by the threat actors.
Rclone abuse has become a common technique among ransomware groups and APTs alike. The tool's legitimate use for cloud backups makes it harder to detect when weaponized, and its support for multiple cloud providers gives attackers flexibility.
Supporting Malware: Fakeset
A second backdoor called Fakeset appeared on networks at the airport and non-profit targets. This Python-based implant was downloaded from Backblaze cloud storage servers.
The digital certificate used to sign Fakeset matches certificates previously used to sign MuddyWater tools Stagecomp and Darkcomp. Security vendors detect Fakeset as:
- Microsoft: Trojan:Python/MuddyWater.DB!MTB
- Kaspersky: Backdoor.Python.MuddyWater.a
This certificate overlap provided researchers with high-confidence attribution to the Seedworm cluster, which the security community tracks as MuddyWater.
Escalating Iran-US Cyber Conflict
The timing matters. This campaign launched in early February 2026, weeks before US and Israeli military strikes against Iranian targets on February 28. Since those strikes, Iranian cyber operations have intensified dramatically.
Unit 42's recent threat brief on Iranian cyber escalation documents dozens of active hacktivist groups conducting DDoS attacks, website defacements, and data destruction operations. MuddyWater's quiet intelligence gathering stands in contrast to the loud hacktivist campaigns, but both serve Iranian strategic interests.
We've seen similar patterns from other Iranian groups. The APT28 MSHTML zero-day campaign showed how state actors exploit geopolitical tensions to expand their operations. Iran's cyber apparatus operates under the same playbook.
Who is MuddyWater?
MuddyWater, also tracked as Seedworm, Earth Vetala, and Static Kitten, has operated since at least 2017. The group focuses on espionage campaigns targeting government agencies, telecommunications companies, and critical infrastructure across the Middle East, Europe, and North America.
US and UK intelligence agencies have publicly attributed MuddyWater to Iran's MOIS. The group is known for:
- Sophisticated spear-phishing campaigns
- "Honeytrap" social engineering operations
- Credential theft and password spraying
- Exploitation of identity and cloud control planes
Defensive Recommendations
Organizations in sectors of interest to Iranian intelligence should:
- Monitor for Deno runtime abuse - Unexpected Deno processes on servers warrant investigation
- Block unauthorized cloud storage access - Restrict Rclone and similar tools; monitor for connections to Wasabi, Backblaze
- Implement phishing-resistant MFA - MuddyWater excels at credential theft
- Audit third-party software providers - Supply chain compromise remains a priority for this group
- Segment critical networks - Limit lateral movement opportunities
The current geopolitical climate makes Iranian intrusion attempts highly likely to continue. Organizations with any connection to defense, aerospace, financial services, or infrastructure should assume they're targets.
Related Articles
MuddyWater Deploys GhostFetch and Telegram-Based Backdoors
Iranian APT MuddyWater launches Operation Olalampo against MENA organizations, deploying four new malware families including GhostFetch and CHAR, a Rust backdoor controlled via Telegram.
Feb 23, 2026MuddyWater Deploys Rust-Based RAT in Middle East Campaign
Iranian APT group shifts tactics with RustyWater implant targeting diplomatic, financial, and telecom sectors across the Middle East via spear-phishing.
Feb 1, 2026Iran-Linked Dust Specter APT Deploys AI-Assisted Malware Against Iraq
Zscaler uncovers Dust Specter campaign targeting Iraqi government officials with novel SPLITDROP and GHOSTFORM malware. Evidence suggests AI-assisted development.
Mar 7, 2026Iran's Infy APT Drops Tornado v51 After Internet Blackout
SafeBreach tracks Infy APT deploying Tornado v51 malware with blockchain-based C2 after Iran's internet blackout, confirming state sponsorship ties.
Feb 8, 2026