Cipher&Counsel
Threat Intelligence · Research Report ← Portfolio
UTSA Capstone · 2025 Threat Intelligence Report TLP:WHITE · Unclassified · Shadow Sample

Boggy Serpens
Threat Assessment

AI-Enhanced Cyberespionage — Multi-Wave Campaign Against Critical Infrastructure

Iranian threat group Boggy Serpens — also tracked as MuddyWater, G0069, and TA450 — has significantly escalated its cyberespionage operations from April 2025 through March 2026. The group is attributed with high confidence to Iran's Ministry of Intelligence and Security (MOIS) and has demonstrated a marked evolution in tradecraft: moving from high-volume, noisy phishing operations to precision multi-wave campaigns against diplomats, maritime operators, energy companies, and financial institutions. Most significantly, the group has integrated AI-generated code and Rust-based implants into its toolchain, dramatically accelerating custom malware development and complicating detection and reverse engineering.

Threat Actor
Boggy Serpens
MuddyWater · G0069
Attribution
Iran · MOIS
High Confidence
Active Period
Apr 2025 · Mar 2026
Ongoing
Primary Targets
Diplomats · Energy
Maritime · Finance
Report Date
March 2026
UTSA Research Initiative
Shadow Sample — Original threat intelligence research produced as a UTSA capstone portfolio piece. All TTPs, malware families, campaign details, and statistics are sourced from publicly available Unit 42, Group-IB, CISA, and MITRE ATT&CK research. No proprietary or classified data is reproduced.
· ·
```
Threat at a Glance

What You Need to Know

4waves
Distinct attack waves against a single UAE marine & energy company — August 2025 through February 2026
100+
Government entities targeted in a single phishing campaign using a compromised Omani Ministry of Foreign Affairs account
AI-gen
First documented use of AI-generated code in Boggy Serpens implants — accelerating custom malware development and evasion

Boggy Serpens is an Iranian state-sponsored cyber espionage group active since 2017. Its mission is intelligence collection in support of Iran's Ministry of Intelligence and Security — targeting government ministries, diplomatic missions, energy infrastructure, maritime operators, and financial institutions across the Middle East, Europe, Central Asia, and the Americas.

What changed in 2025 is not the target profile — it is the operational sophistication. The group shifted from noisy, high-volume phishing to precision multi-wave campaigns built on compromised trusted accounts, AI-assisted malware development, and custom implants designed specifically to defeat behavioral detection and evade reverse engineering.

Campaign Timeline

How the Campaign Unfolded

The defining operation of this reporting period was a six-month, four-wave campaign against a UAE-based marine and energy company with strategic links to regional energy supply chains. Each wave was tailored to a different business unit — engineering, finance, operations — demonstrating a specific mandate to penetrate the organization at every level.

01
August 2025
Account Compromise & Diplomatic Lure
Boggy Serpens hijacks an Omani Ministry of Foreign Affairs email account and sends fabricated "Sustainable Peace" seminar invitations to more than 100 embassies and government organizations worldwide. The trusted sender identity bypasses reputation-based email filtering entirely.
02
September · October 2025
Escalation — Waves 1 and 2 Against Marine Target
First and second attack waves against the UAE marine and energy company deploy macro-laden Office documents tailored to engineering and operations departments. Lures include references to local currency (AED) and legitimate-looking transaction codes to increase credibility and bypass user skepticism.
03
November · December 2025
Wave 3 — Custom Platform Deployment
Unit 42 identifies a custom-built web-based orchestration platform hosted on a Python server, enabling operators to automate mass email delivery while maintaining granular control over sender identities and target lists. This infrastructure formalization signals a shift from opportunistic to systematic operations.
04
January · February 2026
Wave 4 — New Payload Family Nuso Deployed
The fourth wave introduces Nuso, an entirely new custom HTTP backdoor, delivered via an Excel document titled "Consumption Report (Jan 21 2025 – Feb 20 2026)." The shift to a new payload family mid-campaign demonstrates the group's capacity for rapid tool development — enabled in part by AI code generation.
Sector Risk Assessment

Who Is at Risk

SectorRisk LevelWhy TargetedObserved Activity
Government & Diplomatic CRITICAL Intelligence collection; diplomatic access; policy intelligence Compromised ministry accounts; fabricated diplomatic invitations
Energy & Maritime CRITICAL Strategic infrastructure disruption; energy supply chain intelligence Four-wave sustained campaign against UAE marine and energy company
Aviation HIGH Critical infrastructure access; national security implications Confirmed targeting across Middle East aviation sector
Financial Services HIGH Financial intelligence; sanctions evasion support Active targeting confirmed in Middle East financial sector
Telecommunications MEDIUM Communication interception; network access for lateral expansion Historical targeting consistent with current operational profile
Executive Recommendations

What to Do Now

Priority 01
Enforce Multi-Factor Authentication on All Email Accounts
The group's primary initial access vector is hijacked internal email accounts. MFA that cannot be bypassed by credential theft — such as hardware security keys or phishing-resistant authenticators — is the single highest-impact defensive control against this actor.
Priority 02
Deploy Behavioral Email Analytics Beyond Sender Reputation
Boggy Serpens emails originate from compromised legitimate accounts, making traditional sender reputation controls ineffective. Email security must assess behavioral anomalies — unusual recipients, content themes inconsistent with sender history, attachment patterns — not just sender identity.
Priority 03
Restrict Macro Execution Across All Microsoft Office Environments
The group's primary malware delivery mechanism is macro-laden Office documents. Enforcing Group Policy to disable macros for all users except verified business processes eliminates the initial execution vector across all four documented campaign waves.
Priority 04
Monitor for UDP-Based Command and Control Traffic
The UDPGangster implant uses UDP channels to execute commands and exfiltrate data — bypassing traditional TCP-focused network defenses. Network monitoring must include UDP traffic analysis at the perimeter and between internal segments.
Strategic Context

The 2026 Unit 42 Global Incident Response Report documents that 65% of all initial access in major incidents was driven by identity-based techniques — stolen credentials, token abuse, and account compromise — consistent with Boggy Serpens' core methodology. Organizations that have not implemented phishing-resistant MFA and behavioral email analytics are systematically exposed to this actor's primary attack chain.

```
```
Actor Overview

Boggy Serpens — Group Profile

Boggy Serpens (MITRE ATT&CK G0069) is an Iranian advanced persistent threat group assessed with high confidence to be a subordinate element of Iran's Ministry of Intelligence and Security (MOIS). Also tracked as MuddyWater, Seedworm, TA450, Earth Vetala, MERCURY, and Mango Sandstorm, the group has been active since at least 2017 with consistent targeting of government, diplomatic, telecommunications, energy, and financial sector organizations across the Middle East, Asia, Africa, Europe, and North America.

The group's historical tradecraft relied heavily on living-off-the-land (LotL) techniques, abusing legitimate remote monitoring and management (RMM) tools including Atera, ScreenConnect, SimpleHelp, and PDQ RMM, alongside public post-exploitation utilities including LaZagne and CrackMapExec. From 2025 forward, Unit 42 and Group-IB analysis documents a deliberate shift toward custom-compiled toolkits, including Rust-based backdoors, UDP-based implants, and AI-assisted malware development — a maturation that significantly complicates detection and incident response.

MITRE ATT&CK Mapping

Documented Techniques — April 2025 to March 2026

The following technique table maps observed Boggy Serpens TTPs to MITRE ATT&CK Enterprise v18 (October 2025), sourced from Unit 42 Threat Assessment and Group-IB analysis of the October 2025 Phoenix backdoor campaign.

Technique ID Tactic Technique Name Observed Implementation Freq
T1566.001 Initial Access Phishing: Spearphishing Attachment Macro-laden Excel and Word documents; lures tailored to target department and geography HIGH
T1078 Initial Access Valid Accounts Compromised government and corporate mailboxes used as trusted senders; Omani MFA mailbox used to target 100+ embassies HIGH
T1059.001 Execution PowerShell POWERSTATS first-stage backdoor; VBA macros dropping PS-based loaders HIGH
T1059.005 Execution Visual Basic Dual VBA builder tracks — Phoenix Lineage and UDPGangster Operations sharing identical decryption key and novaservice.exe path HIGH
T1053.005 Persistence Scheduled Task / Job Scheduled tasks used for persistence across victim environments following initial compromise HIGH
T1071.001 Command & Control Application Layer Protocol: Web Protocols BlackBeard communicates via standard HTTP status codes for tasking; data embedded in headers HIGH
T1095 Command & Control Non-Application Layer Protocol UDPGangster uses UDP channels for command execution, data exfiltration, and payload delivery — bypassing TCP-focused defenses HIGH
T1483 / T1132 Command & Control Domain Generation / Encoding Telegram API used for C2 communications in select campaigns; data encoding in HTTP headers MED
T1041 Exfiltration Exfiltration Over C2 Channel Data exfiltration via established C2 channels — HTTP, UDP, and Telegram API HIGH
T1027 Defense Evasion Obfuscated Files or Information Rust-based tooling (BlackBeard) uses memory-safe constructs to hinder reverse engineering; AI-generated code incorporates anti-analysis techniques HIGH
T1219 Command & Control Remote Access Software Historical: Atera, ScreenConnect, SimpleHelp, PDQ RMM abused for LotL persistence; decreasing frequency in 2025–26 MED
MITRE ATT&CK Enterprise v18, October 2025 · attack.mitre.org · Unit 42 Boggy Serpens Threat Assessment, March 2026 · Group-IB MuddyWater Espionage Analysis, October 2025
Malware Toolkit

Custom Implant Families — 2025 to 2026

The group's toolchain expanded significantly over this reporting period, with three newly identified malware families representing a departure from earlier reliance on public RMM tools and PowerShell-based loaders. The integration of Rust as an implementation language and AI-assisted code generation marks a meaningful capability development milestone.

NameAlso Known AsLanguageC2 ProtocolPrimary FunctionStatus
BlackBeard Rust HTTP (status codes for tasking; data in headers) Backdoor; persistence; lateral movement. Anti-analysis via Rust memory-safe constructs. NEW 2025
Nuso HTTP_VIP Unknown Custom HTTP Custom HTTP backdoor; deployed in Wave 4 of UAE campaign. Distinct payload family introduced mid-campaign. NEW 2026
UDPGangster Unknown UDP Command execution; data exfiltration; payload delivery via UDP. Bypasses TCP-focused network defenses. NEW 2025
GhostBackDoor Unknown Unknown Backdoor deployed in UAE campaign alongside Nuso. Limited public technical documentation. NEW 2026
Phoenix VBA / loader HTTP Full backdoor delivered via Phoenix Lineage VBA builder track. Shares decryption key with UDPGangster — common development pipeline. Active
LampoRAT CHAR Unknown Unknown Remote access trojan in active toolset. Limited public technical documentation. Active
POWERSTATS PowerShell HTTP / HTTPS First-stage backdoor; hallmark Boggy Serpens tool since 2017. Continued use alongside newer custom tooling. Legacy · Active
Unit 42 Boggy Serpens Threat Assessment, March 2026 · CISA KEV Entry CVE-2025-54068, March 2026 · Group-IB MuddyWater Espionage Analysis, October 2025 · Israeli National Cyber Directorate BlackBeard tracking
Infrastructure Analysis

Command and Control Infrastructure

Mass Email Delivery Platform

On October 3, 2025, Unit 42 identified IP 157.20.182[.]75 hosting a unique web-based Python server on port 5000 assessed to be the group's custom mass email delivery platform. This infrastructure enables operators to automate large-scale phishing operations while maintaining granular control over sender identities and target lists — a significant capability formalization compared to earlier ad-hoc phishing operations.

Group-IB Phoenix C2 Infrastructure — August 2025

Group-IB analysis of the October 2025 Phoenix backdoor campaign identified C2 domain screenai[.]online, registered August 17, 2025 via NameCheap, resolving to 159[.]198[.]36[.]115 behind Cloudflare infrastructure. The C2 was active for approximately five days before takedown, consistent with Boggy Serpens' pattern of short, tightly controlled attack windows. The server initially ran on Uvicorn before switching to Apache — indicating active management and operational security awareness during the campaign window.

Indicator Summary

IndicatorTypeContext
157.20.182[.]75 IP Address Mass email delivery platform — Python server port 5000, observed October 2025
screenai[.]online Domain Phoenix backdoor C2 — August 2025, active ~5 days
159[.]198[.]36[.]115 IP Address Real IP behind screenai[.]online Cloudflare infrastructure — NameCheap ASN
novaservice.exe File Path Shared file path across Phoenix Lineage and UDPGangster — confirms common development pipeline
Consumption Report (Jan 21 2025 – Feb 20 2026).xls Filename Wave 4 lure document delivering Nuso HTTP backdoor — UAE marine/energy target

Note: IOCs are defanged per TLP:WHITE conventions. Restore brackets before use in detection tooling. Additional IOCs available in the Unit 42 Boggy Serpens Threat Assessment published March 2026.

Unit 42 Boggy Serpens Threat Assessment, March 2026 · Group-IB MuddyWater Espionage Analysis, October 2025 · MITRE ATT&CK G0069, v18
Detection Guidance

Detection and Mitigation Recommendations

Email Security Controls

Detection
  • Implement email security controls that assess behavioral and thematic anomalies beyond sender reputation — compromised trusted accounts bypass standard reputation filtering entirely
  • Flag emails from known-compromised domains; monitor for external emails claiming government or diplomatic sender identity
  • Implement DMARC, DKIM, and SPF enforcement and monitor for alignment failures on inbound mail
  • Require MFA that cannot be bypassed by credential theft — hardware security keys or phishing-resistant FIDO2 authenticators are recommended over SMS or TOTP

Endpoint Detection

Detection
  • Enforce Group Policy to block macro execution in Office applications for all users except verified business process owners; monitor for macro execution by flagged processes
  • Monitor for novaservice.exe process creation — shared across Phoenix Lineage and UDPGangster toolchains
  • Deploy behavioral endpoint monitoring capable of detecting drop-and-execute activity from Office processes, particularly spawning of PowerShell or cmd.exe child processes
  • Alert on execution of Rust-compiled binaries from user-writable directories — consistent with BlackBeard deployment patterns

Network Detection

Detection
  • Implement UDP traffic monitoring at perimeter and east-west segments — UDPGangster C2 bypasses TCP-focused network defenses and standard IDS signatures
  • Alert on unexpected HTTP responses using non-standard status code patterns — BlackBeard uses HTTP status codes for tasking with data embedded in response headers
  • Monitor for Telegram API traffic from non-user endpoints — consistent with C2 channel abuse observed in select Boggy Serpens campaigns
  • Block and monitor Python server activity on non-standard ports (port 5000 observed in email delivery infrastructure)
Unit 42 Boggy Serpens Threat Assessment, March 2026 · CISA Advisory — Iranian Government-Sponsored MuddyWater Actors, February 2022 · Group-IB MuddyWater Espionage Analysis, October 2025
```
Sources

Citations & References

All technical content is sourced from publicly available threat research. No proprietary or classified data is reproduced. All IOCs are defanged per TLP:WHITE conventions.

  • [1]Unit 42 — Boggy Serpens Threat Assessment · Palo Alto Networks · unit42.paloaltonetworks.com · March 2026
  • [2]Unit 42 — Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization · Palo Alto Networks · March 2026
  • [3]Unit 42 — Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran · Palo Alto Networks · March 2026
  • [4]Unit 42 — 2026 Global Incident Response Report · Palo Alto Networks · February 2026
  • [5]Group-IB — Unmasking MuddyWater's New Malware Toolkit Driving International Espionage · group-ib.com · October 2025
  • [6]CISA — Iranian Government-Sponsored MuddyWater Actors Conducting Malicious Cyber Operations · cisa.gov · February 2022
  • [7]MITRE ATT&CK — MuddyWater Group Profile G0069 · attack.mitre.org/groups/G0069 · Updated October 2025 (v18)
  • [8]CISA KEV — CVE-2025-54068 Laravel Livewire Exploitation Flagged in Boggy Serpens Activity · March 2026
  • [9]Malpedia — MuddyWater Actor Profile · malpedia.caad.fkie.fraunhofer.de/actor/muddywater
  • [10]Israeli National Cyber Directorate — BlackBeard Backdoor Tracking · 2025
  • [11]Lookout Security — DCHSpy: Iranian APT MuddyWater Leveraging New Spyware · July 2025
  • [12]FBI / CISA / CNMF / NCSC-UK — Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks · February 2022