MuddyWater Deploys GhostFetch and Telegram-Based Backdoors
Iranian APT MuddyWater launches Operation Olalampo against MENA organizations, deploying four new malware families including GhostFetch and CHAR, a Rust backdoor controlled via Telegram.
Iranian threat group MuddyWater has launched a fresh espionage campaign against organizations across the Middle East and North Africa, deploying four previously undocumented malware families that use Telegram bots for command-and-control, according to new research from Group-IB.
The campaign, tracked as Operation Olalampo, was first observed on January 26, 2026, and marks another evolution in the group's persistent targeting of the META region.
New Malware Arsenal
Group-IB's analysis identified four distinct malware families working in concert:
GhostFetch serves as the first-stage downloader. Before executing payloads, it profiles target systems by validating mouse movements, checking screen resolution to detect headless environments, and scanning for antivirus software. Payloads execute directly in memory to avoid disk-based detection.
GhostBackDoor arrives via GhostFetch and provides attackers with an interactive shell, file read/write capabilities, and the ability to re-execute GhostFetch for persistence.
HTTP_VIP is a native downloader that conducts system reconnaissance before authenticating with a C2 server at codefusiontech[.]org. It deploys AnyDesk for remote access—a technique we've seen MuddyWater use before in their credential harvesting campaigns against Middle Eastern targets.
CHAR is a Rust-based backdoor controlled entirely through a Telegram bot with the username "stager_51_bot" and first name "Olalampo"—the namesake for the operation. It executes cmd.exe or PowerShell commands on demand.
Signs of AI-Assisted Development
Group-IB researchers noted peculiar artifacts in CHAR's code, including emoji characters embedded in debug strings. Combined with structural similarities to other malware families like BlackBeard and RUSTRIC, analysts assess the developers may be leveraging generative AI tools to accelerate development.
This mirrors a broader pattern. Iranian APT groups have been experimenting with AI tools including Google Gemini to synthesize reconnaissance data and generate phishing content. The operational tempo of Iranian groups has visibly increased alongside AI adoption.
Attack Chain
Infections begin with phishing emails containing malicious Microsoft Office documents. Attackers use region-specific lures including flight tickets, energy sector reports, and marine services company impersonations.
Once victims enable macros, the infection branches into two paths:
- Malicious Excel files deploy the CHAR backdoor
- GhostFetch downloads and installs GhostBackDoor
HTTP_VIP variants then deploy AnyDesk for hands-on keyboard access, giving operators full remote control of compromised systems.
Who's Being Targeted
The campaign focuses on organizations and individuals across the MENA region, consistent with MuddyWater's historical targeting patterns. Previous campaigns have hit government agencies, telecommunications providers, and energy sector organizations.
MuddyWater—also tracked as Earth Vetala, Mango Sandstorm, and MUDDYCOAST—operates as part of Iran's Ministry of Intelligence and Security (MOIS). The group has maintained persistent operations against Middle Eastern targets for years. For context on Iran's broader cyber toolkit, our coverage of the Infy malware's evolution with blockchain-based C2 illustrates the continued innovation in their tradecraft.
Indicators of Compromise
Organizations should monitor for:
- Connections to codefusiontech[.]org
- Telegram API calls to bot endpoints from enterprise systems
- AnyDesk installations on systems where it wasn't authorized
- In-memory execution patterns following Office macro activation
Defensive Recommendations
- Block execution of macros in Office documents from external sources
- Monitor for unauthorized remote access tool installations
- Implement network segmentation to limit lateral movement
- Add known IOCs to detection systems and threat feeds
- Review logs for Telegram API connections from corporate networks
The continued expansion of MuddyWater's malware arsenal underscores their commitment to maintaining long-term access in the region. Organizations in the MENA should treat this as an active threat requiring immediate attention. For broader guidance on defending against nation-state threats, see our social engineering defense guide.
Related Articles
MuddyWater Deploys Rust-Based RAT in Middle East Campaign
Iranian APT group shifts tactics with RustyWater implant targeting diplomatic, financial, and telecom sectors across the Middle East via spear-phishing.
Feb 1, 2026Iran's Infy APT Drops Tornado v51 After Internet Blackout
SafeBreach tracks Infy APT deploying Tornado v51 malware with blockchain-based C2 after Iran's internet blackout, confirming state sponsorship ties.
Feb 8, 2026RedKitten Malware Targets Iranian Protest Documenters
French researchers uncover SloppyMIO, an AI-assisted malware campaign using fabricated victim lists to target individuals documenting human rights abuses during Iranian protests.
Jan 31, 2026Iran's Hacktivists Were State Actors All Along, CSIS Report Finds
Analysis reveals CyberAv3ngers and other 'hacktivist' groups targeting US infrastructure are actually IRGC-controlled operations masquerading as ideological actors.
Jan 30, 2026