Reborn in Rust: MuddyWater Evolves Tooling with RustyWater Implant

Jan. 9, 2026, 10:06 a.m.

Description

MuddyWater APT group has launched a spearphishing campaign targeting various sectors in the Middle East, including diplomatic, maritime, financial, and telecom entities. The campaign employs icon spoofing and malicious Word documents to deliver a Rust-based implant dubbed 'RustyWater'. This new tool represents a significant upgrade from their traditional PowerShell and VBS loaders, offering capabilities such as asynchronous C2, anti-analysis features, registry persistence, and modular post-compromise expansion. The attack chain involves a malicious email with an attached document that triggers a multi-stage process, ultimately leading to the deployment of the RustyWater implant. This evolution in MuddyWater's toolkit demonstrates their adaptation to more sophisticated, structured, and stealthy attack methods.

Date

  • Created: Jan. 8, 2026, 6:12 p.m.
  • Published: Jan. 8, 2026, 6:12 p.m.
  • Modified: Jan. 9, 2026, 10:06 a.m.

Indicators

  • f38a56b8dc0e8a581999621eef65ef497f0ac0d35e953bd94335926f00e9464f
  • e61b2ed360052a256b3c8761f09d185dad15c67595599da3e587c2c553e83108
  • 76aad2a7fa265778520398411324522c57bfd7d2ff30a5cfe6460960491bc552
  • 7523e53c979692f9eecff6ec760ac3df5b47f172114286e570b6bba3b2133f58
  • c23bac59d70661bb9a99573cf098d668e9395a636dc6f6c20f92c41013c30be8
  • 3d1e43682c4d306e41127ca91993c7befd6db626ddbe3c1ee4b2cf44c0d2fb43
  • e081bc408f73158c7338823f01455e4f5185a4365c8aad1d60d777e29166abbd
  • ddc6e6c76ac325d89799a50dffd11ec69ed3b5341740619b8e595b8068220914
  • 42ad0c70e997a268286654b792c7833fd7c6a2a6a80d9f30d3f462518036d04c
  • a2001892410e9f34ff0d02c8bc9e7c53b0bd10da58461e1e9eab26bdbf410c79
  • 159.198.66.153
  • 159.198.68.25

Attack Patterns

  • RUSTRIC
  • Archer RAT
  • RustyWater
  • MuddyWater

Additional Informations

  • Finance
  • Education
  • Maritime
  • Telecommunications
  • Government
  • Israel
  • Turkmenistan