MuddyWater Leveraging DCHSpy For Israel-Iran Conflict
MuddyWater, an Iranian cyber espionage group linked to Iran's Ministry of Intelligence and Security, is deploying DCHSpy, an Android surveillanceware, amid the Israel-Iran conflict. DCHSpy is distributed via malicious VPN apps promoted on Telegram channels and is capable of extensive data collection including WhatsApp data, contacts, SMS, files, location, call logs, audio recordings, and photos. Recent variants have enhanced capabilities for exfiltrating data from specific files and WhatsApp. The malware's targeting appears to leverage StarLink-related lures, exploiting Iran's internet outages. DCHSpy shares infrastructure with SandStrike, another Android malware targeting Bahá’í practitioners. This threat poses significant espionage risks to individuals in conflict zones and those using Android devices in targeted regions.
AI Analysis
Technical Summary
The Iranian cyber espionage group MuddyWater is actively leveraging DCHSpy, a sophisticated Android surveillanceware tool, in the context of the ongoing Israel-Iran conflict. DCHSpy is designed to infiltrate Android devices primarily through malicious VPN applications advertised on Telegram channels, a popular communication platform in the region. Once installed, DCHSpy collects a broad spectrum of sensitive data including WhatsApp messages and metadata, user accounts, contact lists, SMS messages, files stored on the device, geolocation data, and call logs. It also has capabilities to record audio and capture photos covertly, enabling comprehensive surveillance of the victim. Recent samples indicate that DCHSpy has evolved to exfiltrate data from specific files and WhatsApp more effectively, increasing its espionage potential. The malware’s distribution strategy includes leveraging StarLink-related lures, which exploit the disruption of internet services in Iran, making users more susceptible to installing malicious VPNs to regain connectivity. Additionally, DCHSpy shares command and control infrastructure with SandStrike, another Android malware linked to targeting Bahá’í practitioners, suggesting a broader campaign of targeted surveillance by Iranian threat actors. The use of Telegram for distribution and the focus on Android devices highlight the attackers’ adaptation to regional communication habits and device usage patterns. This campaign aligns with MuddyWater’s known tactics, techniques, and procedures (TTPs), including the use of social engineering (T1204.002), data from local system sources (T1596), and exploitation of network infrastructure (T1583.001). The threat is significant given its potential to compromise personal privacy, gather intelligence, and support geopolitical objectives in a highly volatile conflict zone.
Potential Impact
The deployment of DCHSpy by MuddyWater poses a substantial risk to individuals and organizations in the Israel-Iran conflict zone, particularly those using Android devices. The malware’s ability to harvest extensive personal and communication data threatens confidentiality and privacy, potentially exposing sensitive information to Iranian intelligence services. The capability to record audio and capture images covertly can lead to real-time surveillance, endangering activists, journalists, dissidents, and other high-value targets. The exploitation of VPN apps as a delivery vector may also undermine trust in legitimate VPN services, affecting broader user populations. Organizations with personnel in the region or those connected to conflict-related activities may face espionage risks, including exposure of operational details and strategic communications. The shared infrastructure with SandStrike indicates a persistent and multifaceted surveillance campaign targeting minority groups, which could exacerbate human rights concerns. Although the malware currently targets Android devices, the impact on mobile device security and user trust is significant, especially given the widespread use of Android in the affected regions. The threat could also disrupt communications by exploiting internet outages and luring users into installing malicious software, potentially affecting availability indirectly.
Mitigation Recommendations
To mitigate the risks posed by DCHSpy, organizations and individuals should avoid installing VPN applications from untrusted sources, especially those promoted via Telegram or other social media channels. Employing mobile threat defense solutions that can detect and block surveillanceware and malicious VPN apps is critical. Users should be educated about the risks of installing apps outside official app stores and the dangers of clicking on links or downloading software from unverified Telegram channels. Implementing strict mobile device management (MDM) policies that restrict app installations and enforce app vetting can reduce exposure. Regularly updating Android devices and apps to the latest versions can help mitigate exploitation of known vulnerabilities. Network monitoring for unusual outbound traffic patterns, particularly to known MuddyWater or SandStrike infrastructure, can aid in early detection. Organizations should also consider isolating sensitive communications from mobile devices in high-risk environments and use end-to-end encrypted communication tools that are less susceptible to interception by surveillanceware. Finally, collaboration with threat intelligence providers to stay informed about evolving TTPs and indicators of compromise related to MuddyWater campaigns is essential for proactive defense.
Affected Countries
Iran, Israel, United States, United Kingdom, Germany, France, Canada, Australia, United Arab Emirates, Turkey
Indicators of Compromise
- cve: CVE-2025-4609
- hash: 04de3ee4398b9566a05f7a3d8bc8f441
- hash: 17bbcce70b9554c550c1b0c909fa602a
- hash: 3682be86f3ae1d874e40fb4e282527a9
- hash: 48ab25bc1b06eaf2cbbdfed3c3127cea
- hash: 7193569b9c4eef624e2c2f6d4372d26d
- hash: bdd0d556166ad0af9ded39ab4b9ed34f
- hash: 556d7ac665fa3cc6e56070641d4f0f5c36670d38
- hash: 67ab474e08890c266d242edaca7fab1b958d21d4
- hash: 6c291b3e90325bea8e64a82742747d6cdce22e5b
- hash: 8f37a3e2017d543f4a788de3b05889e5e0bc4b06
- hash: 9dec46d71289710cd09582d84017718e0547f438
- hash: cb2ffe5accc89608828f5c1cd960d660aac2971d
- hash: 162ce2ad2611626988c8520366f1f76feca2c75505a3686c955ecc25f4946442
- hash: 3a052d56706a67f918ed3a9acec9a2da428a20065e261d8e40b73badb4c9d7f4
- hash: 422819e7f665ae0d411cf2a877a2f7b6721abb8df44df852d2d0e76eb74331b7
- hash: 55e8b2d87f80ba609dcf793afc50f66e5967e40dbf54229a256709fa348f3351
- hash: a4913f52bd90add74b796852e2a1d9acb1d6ecffe359b5710c59c82af59483ec
- hash: aa656a243d2008327e06fd5bbad919eea99aa271132dbaeabb146e22effbfd1b
- ip: 46.30.188.243
- ip: 79.132.128.81
- url: http://192.121.113.60/dev/run.php
- url: http://194.26.213.176/class/mcrypt.php
- url: http://45.86.163.10/class/mcrypt.php
- url: http://46.30.188.243/class/mcrypt.php
- url: http://77.75.230.135/class/mcrypt.php
- url: http://79.132.128.81/dev/run.php
- url: https://hs1.iphide.net:751
- url: https://hs2.iphide.net:751
- url: https://hs3.iphide.net:751
- url: https://hs4.iphide.net:751
- url: https://it1.comodo-vpn.com:1950
- url: https://it1.comodo-vpn.com:1953
- url: https://r1.earthvpn.org:3413
- url: https://r2.earthvpn.org:3413
- domain: n14mit69company.top
MuddyWater Leveraging DCHSpy For Israel-Iran Conflict
Description
MuddyWater, an Iranian cyber espionage group linked to Iran's Ministry of Intelligence and Security, is deploying DCHSpy, an Android surveillanceware, amid the Israel-Iran conflict. DCHSpy is distributed via malicious VPN apps promoted on Telegram channels and is capable of extensive data collection including WhatsApp data, contacts, SMS, files, location, call logs, audio recordings, and photos. Recent variants have enhanced capabilities for exfiltrating data from specific files and WhatsApp. The malware's targeting appears to leverage StarLink-related lures, exploiting Iran's internet outages. DCHSpy shares infrastructure with SandStrike, another Android malware targeting Bahá’í practitioners. This threat poses significant espionage risks to individuals in conflict zones and those using Android devices in targeted regions.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Iranian cyber espionage group MuddyWater is actively leveraging DCHSpy, a sophisticated Android surveillanceware tool, in the context of the ongoing Israel-Iran conflict. DCHSpy is designed to infiltrate Android devices primarily through malicious VPN applications advertised on Telegram channels, a popular communication platform in the region. Once installed, DCHSpy collects a broad spectrum of sensitive data including WhatsApp messages and metadata, user accounts, contact lists, SMS messages, files stored on the device, geolocation data, and call logs. It also has capabilities to record audio and capture photos covertly, enabling comprehensive surveillance of the victim. Recent samples indicate that DCHSpy has evolved to exfiltrate data from specific files and WhatsApp more effectively, increasing its espionage potential. The malware’s distribution strategy includes leveraging StarLink-related lures, which exploit the disruption of internet services in Iran, making users more susceptible to installing malicious VPNs to regain connectivity. Additionally, DCHSpy shares command and control infrastructure with SandStrike, another Android malware linked to targeting Bahá’í practitioners, suggesting a broader campaign of targeted surveillance by Iranian threat actors. The use of Telegram for distribution and the focus on Android devices highlight the attackers’ adaptation to regional communication habits and device usage patterns. This campaign aligns with MuddyWater’s known tactics, techniques, and procedures (TTPs), including the use of social engineering (T1204.002), data from local system sources (T1596), and exploitation of network infrastructure (T1583.001). The threat is significant given its potential to compromise personal privacy, gather intelligence, and support geopolitical objectives in a highly volatile conflict zone.
Potential Impact
The deployment of DCHSpy by MuddyWater poses a substantial risk to individuals and organizations in the Israel-Iran conflict zone, particularly those using Android devices. The malware’s ability to harvest extensive personal and communication data threatens confidentiality and privacy, potentially exposing sensitive information to Iranian intelligence services. The capability to record audio and capture images covertly can lead to real-time surveillance, endangering activists, journalists, dissidents, and other high-value targets. The exploitation of VPN apps as a delivery vector may also undermine trust in legitimate VPN services, affecting broader user populations. Organizations with personnel in the region or those connected to conflict-related activities may face espionage risks, including exposure of operational details and strategic communications. The shared infrastructure with SandStrike indicates a persistent and multifaceted surveillance campaign targeting minority groups, which could exacerbate human rights concerns. Although the malware currently targets Android devices, the impact on mobile device security and user trust is significant, especially given the widespread use of Android in the affected regions. The threat could also disrupt communications by exploiting internet outages and luring users into installing malicious software, potentially affecting availability indirectly.
Mitigation Recommendations
To mitigate the risks posed by DCHSpy, organizations and individuals should avoid installing VPN applications from untrusted sources, especially those promoted via Telegram or other social media channels. Employing mobile threat defense solutions that can detect and block surveillanceware and malicious VPN apps is critical. Users should be educated about the risks of installing apps outside official app stores and the dangers of clicking on links or downloading software from unverified Telegram channels. Implementing strict mobile device management (MDM) policies that restrict app installations and enforce app vetting can reduce exposure. Regularly updating Android devices and apps to the latest versions can help mitigate exploitation of known vulnerabilities. Network monitoring for unusual outbound traffic patterns, particularly to known MuddyWater or SandStrike infrastructure, can aid in early detection. Organizations should also consider isolating sensitive communications from mobile devices in high-risk environments and use end-to-end encrypted communication tools that are less susceptible to interception by surveillanceware. Finally, collaboration with threat intelligence providers to stay informed about evolving TTPs and indicators of compromise related to MuddyWater campaigns is essential for proactive defense.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.lookout.com/threat-intelligence/article/lookout-discovers-iranian-dchsy-surveillanceware"]
- Adversary
- MuddyWater
- Pulse Id
- 68a7465ce5377b6e04b7d5aa
- Threat Score
- null
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2025-4609 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash04de3ee4398b9566a05f7a3d8bc8f441 | — | |
hash17bbcce70b9554c550c1b0c909fa602a | — | |
hash3682be86f3ae1d874e40fb4e282527a9 | — | |
hash48ab25bc1b06eaf2cbbdfed3c3127cea | — | |
hash7193569b9c4eef624e2c2f6d4372d26d | — | |
hashbdd0d556166ad0af9ded39ab4b9ed34f | — | |
hash556d7ac665fa3cc6e56070641d4f0f5c36670d38 | — | |
hash67ab474e08890c266d242edaca7fab1b958d21d4 | — | |
hash6c291b3e90325bea8e64a82742747d6cdce22e5b | — | |
hash8f37a3e2017d543f4a788de3b05889e5e0bc4b06 | — | |
hash9dec46d71289710cd09582d84017718e0547f438 | — | |
hashcb2ffe5accc89608828f5c1cd960d660aac2971d | — | |
hash162ce2ad2611626988c8520366f1f76feca2c75505a3686c955ecc25f4946442 | — | |
hash3a052d56706a67f918ed3a9acec9a2da428a20065e261d8e40b73badb4c9d7f4 | — | |
hash422819e7f665ae0d411cf2a877a2f7b6721abb8df44df852d2d0e76eb74331b7 | — | |
hash55e8b2d87f80ba609dcf793afc50f66e5967e40dbf54229a256709fa348f3351 | — | |
hasha4913f52bd90add74b796852e2a1d9acb1d6ecffe359b5710c59c82af59483ec | — | |
hashaa656a243d2008327e06fd5bbad919eea99aa271132dbaeabb146e22effbfd1b | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip46.30.188.243 | — | |
ip79.132.128.81 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://192.121.113.60/dev/run.php | — | |
urlhttp://194.26.213.176/class/mcrypt.php | — | |
urlhttp://45.86.163.10/class/mcrypt.php | — | |
urlhttp://46.30.188.243/class/mcrypt.php | — | |
urlhttp://77.75.230.135/class/mcrypt.php | — | |
urlhttp://79.132.128.81/dev/run.php | — | |
urlhttps://hs1.iphide.net:751 | — | |
urlhttps://hs2.iphide.net:751 | — | |
urlhttps://hs3.iphide.net:751 | — | |
urlhttps://hs4.iphide.net:751 | — | |
urlhttps://it1.comodo-vpn.com:1950 | — | |
urlhttps://it1.comodo-vpn.com:1953 | — | |
urlhttps://r1.earthvpn.org:3413 | — | |
urlhttps://r2.earthvpn.org:3413 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainn14mit69company.top | — |
Threat ID: 68a7745fad5a09ad00179d95
Added to database: 8/21/2025, 7:32:47 PM
Last enriched: 2/26/2026, 8:16:22 PM
Last updated: 3/21/2026, 10:57:23 AM
Views: 1381
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.