Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

MuddyWater Leveraging DCHSpy For Israel-Iran Conflict

0
Medium
Published: Thu Aug 21 2025 (08/21/2025, 16:16:28 UTC)
Source: AlienVault OTX General

Description

MuddyWater, an Iranian cyber espionage group linked to Iran's Ministry of Intelligence and Security, is deploying DCHSpy, an Android surveillanceware, amid the Israel-Iran conflict. DCHSpy is distributed via malicious VPN apps promoted on Telegram channels and is capable of extensive data collection including WhatsApp data, contacts, SMS, files, location, call logs, audio recordings, and photos. Recent variants have enhanced capabilities for exfiltrating data from specific files and WhatsApp. The malware's targeting appears to leverage StarLink-related lures, exploiting Iran's internet outages. DCHSpy shares infrastructure with SandStrike, another Android malware targeting Bahá’í practitioners. This threat poses significant espionage risks to individuals in conflict zones and those using Android devices in targeted regions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:16:22 UTC

Technical Analysis

The Iranian cyber espionage group MuddyWater is actively leveraging DCHSpy, a sophisticated Android surveillanceware tool, in the context of the ongoing Israel-Iran conflict. DCHSpy is designed to infiltrate Android devices primarily through malicious VPN applications advertised on Telegram channels, a popular communication platform in the region. Once installed, DCHSpy collects a broad spectrum of sensitive data including WhatsApp messages and metadata, user accounts, contact lists, SMS messages, files stored on the device, geolocation data, and call logs. It also has capabilities to record audio and capture photos covertly, enabling comprehensive surveillance of the victim. Recent samples indicate that DCHSpy has evolved to exfiltrate data from specific files and WhatsApp more effectively, increasing its espionage potential. The malware’s distribution strategy includes leveraging StarLink-related lures, which exploit the disruption of internet services in Iran, making users more susceptible to installing malicious VPNs to regain connectivity. Additionally, DCHSpy shares command and control infrastructure with SandStrike, another Android malware linked to targeting Bahá’í practitioners, suggesting a broader campaign of targeted surveillance by Iranian threat actors. The use of Telegram for distribution and the focus on Android devices highlight the attackers’ adaptation to regional communication habits and device usage patterns. This campaign aligns with MuddyWater’s known tactics, techniques, and procedures (TTPs), including the use of social engineering (T1204.002), data from local system sources (T1596), and exploitation of network infrastructure (T1583.001). The threat is significant given its potential to compromise personal privacy, gather intelligence, and support geopolitical objectives in a highly volatile conflict zone.

Potential Impact

The deployment of DCHSpy by MuddyWater poses a substantial risk to individuals and organizations in the Israel-Iran conflict zone, particularly those using Android devices. The malware’s ability to harvest extensive personal and communication data threatens confidentiality and privacy, potentially exposing sensitive information to Iranian intelligence services. The capability to record audio and capture images covertly can lead to real-time surveillance, endangering activists, journalists, dissidents, and other high-value targets. The exploitation of VPN apps as a delivery vector may also undermine trust in legitimate VPN services, affecting broader user populations. Organizations with personnel in the region or those connected to conflict-related activities may face espionage risks, including exposure of operational details and strategic communications. The shared infrastructure with SandStrike indicates a persistent and multifaceted surveillance campaign targeting minority groups, which could exacerbate human rights concerns. Although the malware currently targets Android devices, the impact on mobile device security and user trust is significant, especially given the widespread use of Android in the affected regions. The threat could also disrupt communications by exploiting internet outages and luring users into installing malicious software, potentially affecting availability indirectly.

Mitigation Recommendations

To mitigate the risks posed by DCHSpy, organizations and individuals should avoid installing VPN applications from untrusted sources, especially those promoted via Telegram or other social media channels. Employing mobile threat defense solutions that can detect and block surveillanceware and malicious VPN apps is critical. Users should be educated about the risks of installing apps outside official app stores and the dangers of clicking on links or downloading software from unverified Telegram channels. Implementing strict mobile device management (MDM) policies that restrict app installations and enforce app vetting can reduce exposure. Regularly updating Android devices and apps to the latest versions can help mitigate exploitation of known vulnerabilities. Network monitoring for unusual outbound traffic patterns, particularly to known MuddyWater or SandStrike infrastructure, can aid in early detection. Organizations should also consider isolating sensitive communications from mobile devices in high-risk environments and use end-to-end encrypted communication tools that are less susceptible to interception by surveillanceware. Finally, collaboration with threat intelligence providers to stay informed about evolving TTPs and indicators of compromise related to MuddyWater campaigns is essential for proactive defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.lookout.com/threat-intelligence/article/lookout-discovers-iranian-dchsy-surveillanceware"]
Adversary
MuddyWater
Pulse Id
68a7465ce5377b6e04b7d5aa
Threat Score
null

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2025-4609

Hash

ValueDescriptionCopy
hash04de3ee4398b9566a05f7a3d8bc8f441
hash17bbcce70b9554c550c1b0c909fa602a
hash3682be86f3ae1d874e40fb4e282527a9
hash48ab25bc1b06eaf2cbbdfed3c3127cea
hash7193569b9c4eef624e2c2f6d4372d26d
hashbdd0d556166ad0af9ded39ab4b9ed34f
hash556d7ac665fa3cc6e56070641d4f0f5c36670d38
hash67ab474e08890c266d242edaca7fab1b958d21d4
hash6c291b3e90325bea8e64a82742747d6cdce22e5b
hash8f37a3e2017d543f4a788de3b05889e5e0bc4b06
hash9dec46d71289710cd09582d84017718e0547f438
hashcb2ffe5accc89608828f5c1cd960d660aac2971d
hash162ce2ad2611626988c8520366f1f76feca2c75505a3686c955ecc25f4946442
hash3a052d56706a67f918ed3a9acec9a2da428a20065e261d8e40b73badb4c9d7f4
hash422819e7f665ae0d411cf2a877a2f7b6721abb8df44df852d2d0e76eb74331b7
hash55e8b2d87f80ba609dcf793afc50f66e5967e40dbf54229a256709fa348f3351
hasha4913f52bd90add74b796852e2a1d9acb1d6ecffe359b5710c59c82af59483ec
hashaa656a243d2008327e06fd5bbad919eea99aa271132dbaeabb146e22effbfd1b

Ip

ValueDescriptionCopy
ip46.30.188.243
ip79.132.128.81

Url

ValueDescriptionCopy
urlhttp://192.121.113.60/dev/run.php
urlhttp://194.26.213.176/class/mcrypt.php
urlhttp://45.86.163.10/class/mcrypt.php
urlhttp://46.30.188.243/class/mcrypt.php
urlhttp://77.75.230.135/class/mcrypt.php
urlhttp://79.132.128.81/dev/run.php
urlhttps://hs1.iphide.net:751
urlhttps://hs2.iphide.net:751
urlhttps://hs3.iphide.net:751
urlhttps://hs4.iphide.net:751
urlhttps://it1.comodo-vpn.com:1950
urlhttps://it1.comodo-vpn.com:1953
urlhttps://r1.earthvpn.org:3413
urlhttps://r2.earthvpn.org:3413

Domain

ValueDescriptionCopy
domainn14mit69company.top

Threat ID: 68a7745fad5a09ad00179d95

Added to database: 8/21/2025, 7:32:47 PM

Last enriched: 2/26/2026, 8:16:22 PM

Last updated: 3/21/2026, 10:57:23 AM

Views: 1381

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses