Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Operation Olalampo: Inside MuddyWater's Latest Campaign

0
Medium
Published: Mon Feb 23 2026 (02/23/2026, 10:13:38 UTC)
Source: AlienVault OTX General

Description

MuddyWater APT has launched Operation Olalampo, targeting organizations in the MENA region. The campaign involves new malware variants, including a Rust backdoor called CHAR, downloaders GhostFetch and HTTP_VIP, and an advanced backdoor GhostBackDoor. Notably, the group is using Telegram bots for command-and-control, revealing insights into their post-exploitation tactics. The operation, first observed on January 26, 2026, shows tactical and technical overlaps with previous MuddyWater activities. Key discoveries include potential AI-assisted malware development and infrastructure reuse dating back to October 2025. The campaign aligns with ongoing geopolitical tensions and provides valuable information on the threat actor's evolving techniques.

AI-Powered Analysis

AILast updated: 02/23/2026, 10:33:10 UTC

Technical Analysis

Operation Olalampo represents the latest campaign by the MuddyWater advanced persistent threat (APT) group, focusing on entities within the Middle East and North Africa (MENA) region. This campaign is notable for deploying multiple new malware variants, including a Rust-based backdoor named CHAR, which is uncommon and suggests an emphasis on stealth and cross-platform capabilities. The campaign also uses downloaders GhostFetch and HTTP_VIP to deliver payloads, and an advanced backdoor called GhostBackDoor, which likely provides persistent access and extensive control over compromised systems. Command-and-control (C2) infrastructure is implemented via Telegram bots, a tactic that leverages a legitimate messaging platform to evade detection and complicate network defense efforts. The campaign was first observed in late January 2026, with infrastructure reuse traced back to October 2025, indicating a sustained and evolving operation. Technical overlaps with previous MuddyWater campaigns suggest continuity in tactics, techniques, and procedures (TTPs), but with enhancements such as potential AI-assisted malware development, which could improve malware evasion and adaptability. The campaign employs a broad range of MITRE ATT&CK techniques, including credential access, process injection, command execution, and data exfiltration, reflecting a comprehensive post-exploitation toolkit. Although no public exploits are currently reported, the sophistication and targeted nature of the operation underscore a significant espionage threat to organizations in the MENA region, particularly those involved in government, energy, telecommunications, and critical infrastructure sectors.

Potential Impact

The primary impact of Operation Olalampo is espionage and unauthorized data access, potentially compromising sensitive governmental, industrial, and strategic information within the MENA region. The use of advanced malware and stealthy C2 channels like Telegram bots enables prolonged undetected access, increasing the risk of extensive data exfiltration and intellectual property theft. Organizations may experience operational disruptions if malware components interfere with system stability or if incident response activities require system quarantines. The campaign’s AI-assisted malware development hints at rapidly evolving threats that could bypass traditional detection mechanisms, raising the difficulty and cost of defense. While the campaign currently appears regionally focused, the reuse of infrastructure and modular malware design could allow expansion or collateral impact beyond initial targets. The geopolitical context suggests that affected organizations may face targeted attacks aligned with regional conflicts or intelligence gathering efforts, amplifying the strategic consequences of successful intrusions.

Mitigation Recommendations

Organizations should implement targeted detection rules for the specific malware variants CHAR, GhostFetch, HTTP_VIP, and GhostBackDoor, including behavioral analytics to identify unusual process execution and network traffic patterns associated with Telegram bot communications. Network defenders should monitor and restrict unauthorized use of Telegram and similar messaging platforms for C2 traffic, employing deep packet inspection and anomaly detection. Endpoint detection and response (EDR) solutions should be tuned to detect Rust-based malware signatures and suspicious downloader activities. Incident response teams must investigate any signs of infrastructure reuse or overlapping indicators with previous MuddyWater campaigns. Employing threat hunting focused on MITRE ATT&CK techniques observed in this campaign (e.g., credential dumping, process injection, scheduled task abuse) can uncover latent infections. Organizations should also enforce strict access controls, multi-factor authentication, and network segmentation to limit lateral movement. Sharing threat intelligence with regional CERTs and industry groups will enhance collective defense. Given the potential AI-assisted malware, investing in advanced machine learning-based detection tools and continuous monitoring is advisable. Finally, regular security awareness training should include information on social engineering tactics that may facilitate initial access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.group-ib.com/blog/muddywater-operation-olalampo/"]
Adversary
MuddyWater
Pulse Id
699c2852f2e41e1678d750b5
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0f839cafa6565f74303e5e5f414f9d8c
hash2533307ec1ef8b0611c8896e1460b076
hash64af4e6216026ed8fcfbf8b07ee20707
hashbb3587d3da3fbe4ab8c36721d9435327
hashc6160e69af601077892cbc669bc00926
hashdc706b45a9e6770ae327adff4ccd1a7e
hashf5ef5f40922113c2dfb32c202ae2b3f5
hashf96e2225af8dbf7555f3f4669d685d41
hash0365daf83e37d2c6daaae6c28b4c8343288ef2f9
hash0588cf26b6e9210f86a266ac0366af1fd29f135c
hash06f3b55f0d66913cd53d2f0e76a5e2d67ff8ed04
hash270dbaedfbeef9333e0780f3c4e74c01392ce381
hash2993b0ab9786ddc29eb9cf1ace4a28c6e34ea4fb
hash2eea39dbe11889e5713cbca020f7ede653bc48ec
hash2f5166086da5a57d7e59a767a54ed6fe9a6db444
hash324918c73b985875d5f974da3471f2a0a4874687
hash3441306816018d08dd03a97ac306fac0200e9152
hash392a36717fa948f7e00d35711e8598108fbe2f72
hash3c47eab6ebe5b48097c0099ff18f2a8bc13c12f7
hash56380a652471962387693f4bcc893fd21f0fc324
hash5c1500296857ed0b0bb7230a1cb17993d25ab69b
hash62ed16701a14ce26314f2436d9532fe606c15407
hash777040bed9d26f5da97e8977c6efc0586beae064
hash7bd04218276fc8f375c0ce3be43a710f6a2b4d09
hash7d3757d5165e2e95b0b89e33316025a4b9301e2d
hash80cea18e19665c5a57e7b9ca0bf36aad06096e93
hash8632b62fa14fd679fa97cfe50e6c25696b846129
hash88cb6169fd7dd21e6d6aa3a8df0a78938e698028
hash8c592d9ab58264e68dfe029ea90f80862c526670
hash92e2f826804d762679b13283102f3560078eb4cb
hash975c763e050d0a9a46f0aafdde66d3e7f0626c5b
hash9ca11fcbd75420bd7a578e8bf6ef855e7bd0fb8e
hash9defffba933fc44f8e3b6e25b31508bc17d29077
hashac982b7b46e085e0bb51cba2edb61bff5910b6a8
hashb55e063607e8f56c9b398b289ba04ddca11398fe
hashceb9b7dfb8a36ee8fe223063a6e3f730f2dcefd1
hashd0d7d0c816753639b5c577aacf14fd2e994b64b0
hashd3fa50a9eba93a7fbc79e7ad0c4889d762718a5f
hashd97d21536c061e7a7151a453242d36f3ab196a14
hashdc785be0c4430bfc5b507255f892bf30134a02b6
hashe21564fd0fc3103c1d18b1e1525a0b40e9077d40
hashe3cc95ca6e271ddf04cd88c85051b2cc9ce04e8e
hashe79ccc3f6517c911d6c1df79c94e88896f574e64
hashea80deaed00c8b71aa0033b00fe0ef5b63840b99
hashefb18cf7cf227037e034c0b525f502e642815f94
hashf449b95830c584cef72dfb60fb78ee3d6c69ecb4
hashf4e0f4449dc50e33e912403082e093dd8e4bc55d
hashf5a129ba4141361ca266950dc4adcb2c548aa949
hashf77499a8fc6e615e21bf111a88c658ba3d5f0f81
hashf779a3b1dcc0c3aacacf7ebfa4ed57d53af7e26c
hashfeb4318a90057d92ea5ab6420ed6164dd9605013
hash3a19c19d9f3bac6628a968110477ee01e5867b2534e914e1be5c4485947bd819
hash3fa148e2d3fb86cecc15c276c5329496beba9aba14a6024b561efabf2e4e68af
hash556e86667fcaee82976e83a653acb73a3e953f3560a5ba5aa7fc75a6d1a2c399
hash81a6e6416eb7ab6ce6367c6102c031e2ae2730c3c50ab9ce0b8668fec3487848
hash9b4cd87d338d2fcf30d75f9e5c7abb8be085dc8c4f573df19597b872d8ae8c2d
hashaee523056d602571ff006565b432148715a6a13d098d518ba8131ccbe719c043
hashc91413ad7c94c0e2694862b9d671d1204873bf65576ba2cb91fbd562a4ccf79b
hashcb08fd349397af4528cb8cd94cc69434388747f93424da44c31169ccddc876ac
hashe25892603c42e34bd7ba0d8ea73be600d898cadc290e3417a82c04d6281b743b
hashef22f16d56334c01032bba80144e98a5dfb2eb87ce839411ea82d1e3ee4d0cef

Ip

ValueDescriptionCopy
ip143.198.5.41
ip162.0.230.185
ip209.74.87.100
ip209.74.87.67

Domain

ValueDescriptionCopy
domaincodefusiontech.org
domainjerusalemsolutions.com
domainminiquest.org
domainpromoverse.org

Threat ID: 699c28f3be58cf853b724307

Added to database: 2/23/2026, 10:16:19 AM

Last enriched: 2/23/2026, 10:33:10 AM

Last updated: 2/24/2026, 1:08:50 AM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats