Operation Olalampo: Inside MuddyWater's Latest Campaign
MuddyWater APT has launched Operation Olalampo, targeting organizations in the MENA region. The campaign involves new malware variants, including a Rust backdoor called CHAR, downloaders GhostFetch and HTTP_VIP, and an advanced backdoor GhostBackDoor. Notably, the group is using Telegram bots for command-and-control, revealing insights into their post-exploitation tactics. The operation, first observed on January 26, 2026, shows tactical and technical overlaps with previous MuddyWater activities. Key discoveries include potential AI-assisted malware development and infrastructure reuse dating back to October 2025. The campaign aligns with ongoing geopolitical tensions and provides valuable information on the threat actor's evolving techniques.
AI Analysis
Technical Summary
Operation Olalampo represents the latest campaign by the MuddyWater advanced persistent threat (APT) group, focusing on entities within the Middle East and North Africa (MENA) region. This campaign is notable for deploying multiple new malware variants, including a Rust-based backdoor named CHAR, which is uncommon and suggests an emphasis on stealth and cross-platform capabilities. The campaign also uses downloaders GhostFetch and HTTP_VIP to deliver payloads, and an advanced backdoor called GhostBackDoor, which likely provides persistent access and extensive control over compromised systems. Command-and-control (C2) infrastructure is implemented via Telegram bots, a tactic that leverages a legitimate messaging platform to evade detection and complicate network defense efforts. The campaign was first observed in late January 2026, with infrastructure reuse traced back to October 2025, indicating a sustained and evolving operation. Technical overlaps with previous MuddyWater campaigns suggest continuity in tactics, techniques, and procedures (TTPs), but with enhancements such as potential AI-assisted malware development, which could improve malware evasion and adaptability. The campaign employs a broad range of MITRE ATT&CK techniques, including credential access, process injection, command execution, and data exfiltration, reflecting a comprehensive post-exploitation toolkit. Although no public exploits are currently reported, the sophistication and targeted nature of the operation underscore a significant espionage threat to organizations in the MENA region, particularly those involved in government, energy, telecommunications, and critical infrastructure sectors.
Potential Impact
The primary impact of Operation Olalampo is espionage and unauthorized data access, potentially compromising sensitive governmental, industrial, and strategic information within the MENA region. The use of advanced malware and stealthy C2 channels like Telegram bots enables prolonged undetected access, increasing the risk of extensive data exfiltration and intellectual property theft. Organizations may experience operational disruptions if malware components interfere with system stability or if incident response activities require system quarantines. The campaign’s AI-assisted malware development hints at rapidly evolving threats that could bypass traditional detection mechanisms, raising the difficulty and cost of defense. While the campaign currently appears regionally focused, the reuse of infrastructure and modular malware design could allow expansion or collateral impact beyond initial targets. The geopolitical context suggests that affected organizations may face targeted attacks aligned with regional conflicts or intelligence gathering efforts, amplifying the strategic consequences of successful intrusions.
Mitigation Recommendations
Organizations should implement targeted detection rules for the specific malware variants CHAR, GhostFetch, HTTP_VIP, and GhostBackDoor, including behavioral analytics to identify unusual process execution and network traffic patterns associated with Telegram bot communications. Network defenders should monitor and restrict unauthorized use of Telegram and similar messaging platforms for C2 traffic, employing deep packet inspection and anomaly detection. Endpoint detection and response (EDR) solutions should be tuned to detect Rust-based malware signatures and suspicious downloader activities. Incident response teams must investigate any signs of infrastructure reuse or overlapping indicators with previous MuddyWater campaigns. Employing threat hunting focused on MITRE ATT&CK techniques observed in this campaign (e.g., credential dumping, process injection, scheduled task abuse) can uncover latent infections. Organizations should also enforce strict access controls, multi-factor authentication, and network segmentation to limit lateral movement. Sharing threat intelligence with regional CERTs and industry groups will enhance collective defense. Given the potential AI-assisted malware, investing in advanced machine learning-based detection tools and continuous monitoring is advisable. Finally, regular security awareness training should include information on social engineering tactics that may facilitate initial access.
Affected Countries
United Arab Emirates, Saudi Arabia, Qatar, Kuwait, Oman, Jordan, Lebanon, Iraq, Egypt, Morocco
Indicators of Compromise
- hash: 0f839cafa6565f74303e5e5f414f9d8c
- hash: 2533307ec1ef8b0611c8896e1460b076
- hash: 64af4e6216026ed8fcfbf8b07ee20707
- hash: bb3587d3da3fbe4ab8c36721d9435327
- hash: c6160e69af601077892cbc669bc00926
- hash: dc706b45a9e6770ae327adff4ccd1a7e
- hash: f5ef5f40922113c2dfb32c202ae2b3f5
- hash: f96e2225af8dbf7555f3f4669d685d41
- hash: 0365daf83e37d2c6daaae6c28b4c8343288ef2f9
- hash: 0588cf26b6e9210f86a266ac0366af1fd29f135c
- hash: 06f3b55f0d66913cd53d2f0e76a5e2d67ff8ed04
- hash: 270dbaedfbeef9333e0780f3c4e74c01392ce381
- hash: 2993b0ab9786ddc29eb9cf1ace4a28c6e34ea4fb
- hash: 2eea39dbe11889e5713cbca020f7ede653bc48ec
- hash: 2f5166086da5a57d7e59a767a54ed6fe9a6db444
- hash: 324918c73b985875d5f974da3471f2a0a4874687
- hash: 3441306816018d08dd03a97ac306fac0200e9152
- hash: 392a36717fa948f7e00d35711e8598108fbe2f72
- hash: 3c47eab6ebe5b48097c0099ff18f2a8bc13c12f7
- hash: 56380a652471962387693f4bcc893fd21f0fc324
- hash: 5c1500296857ed0b0bb7230a1cb17993d25ab69b
- hash: 62ed16701a14ce26314f2436d9532fe606c15407
- hash: 777040bed9d26f5da97e8977c6efc0586beae064
- hash: 7bd04218276fc8f375c0ce3be43a710f6a2b4d09
- hash: 7d3757d5165e2e95b0b89e33316025a4b9301e2d
- hash: 80cea18e19665c5a57e7b9ca0bf36aad06096e93
- hash: 8632b62fa14fd679fa97cfe50e6c25696b846129
- hash: 88cb6169fd7dd21e6d6aa3a8df0a78938e698028
- hash: 8c592d9ab58264e68dfe029ea90f80862c526670
- hash: 92e2f826804d762679b13283102f3560078eb4cb
- hash: 975c763e050d0a9a46f0aafdde66d3e7f0626c5b
- hash: 9ca11fcbd75420bd7a578e8bf6ef855e7bd0fb8e
- hash: 9defffba933fc44f8e3b6e25b31508bc17d29077
- hash: ac982b7b46e085e0bb51cba2edb61bff5910b6a8
- hash: b55e063607e8f56c9b398b289ba04ddca11398fe
- hash: ceb9b7dfb8a36ee8fe223063a6e3f730f2dcefd1
- hash: d0d7d0c816753639b5c577aacf14fd2e994b64b0
- hash: d3fa50a9eba93a7fbc79e7ad0c4889d762718a5f
- hash: d97d21536c061e7a7151a453242d36f3ab196a14
- hash: dc785be0c4430bfc5b507255f892bf30134a02b6
- hash: e21564fd0fc3103c1d18b1e1525a0b40e9077d40
- hash: e3cc95ca6e271ddf04cd88c85051b2cc9ce04e8e
- hash: e79ccc3f6517c911d6c1df79c94e88896f574e64
- hash: ea80deaed00c8b71aa0033b00fe0ef5b63840b99
- hash: efb18cf7cf227037e034c0b525f502e642815f94
- hash: f449b95830c584cef72dfb60fb78ee3d6c69ecb4
- hash: f4e0f4449dc50e33e912403082e093dd8e4bc55d
- hash: f5a129ba4141361ca266950dc4adcb2c548aa949
- hash: f77499a8fc6e615e21bf111a88c658ba3d5f0f81
- hash: f779a3b1dcc0c3aacacf7ebfa4ed57d53af7e26c
- hash: feb4318a90057d92ea5ab6420ed6164dd9605013
- hash: 3a19c19d9f3bac6628a968110477ee01e5867b2534e914e1be5c4485947bd819
- hash: 3fa148e2d3fb86cecc15c276c5329496beba9aba14a6024b561efabf2e4e68af
- hash: 556e86667fcaee82976e83a653acb73a3e953f3560a5ba5aa7fc75a6d1a2c399
- hash: 81a6e6416eb7ab6ce6367c6102c031e2ae2730c3c50ab9ce0b8668fec3487848
- hash: 9b4cd87d338d2fcf30d75f9e5c7abb8be085dc8c4f573df19597b872d8ae8c2d
- hash: aee523056d602571ff006565b432148715a6a13d098d518ba8131ccbe719c043
- hash: c91413ad7c94c0e2694862b9d671d1204873bf65576ba2cb91fbd562a4ccf79b
- hash: cb08fd349397af4528cb8cd94cc69434388747f93424da44c31169ccddc876ac
- hash: e25892603c42e34bd7ba0d8ea73be600d898cadc290e3417a82c04d6281b743b
- hash: ef22f16d56334c01032bba80144e98a5dfb2eb87ce839411ea82d1e3ee4d0cef
- ip: 143.198.5.41
- ip: 162.0.230.185
- ip: 209.74.87.100
- ip: 209.74.87.67
- domain: codefusiontech.org
- domain: jerusalemsolutions.com
- domain: miniquest.org
- domain: promoverse.org
Operation Olalampo: Inside MuddyWater's Latest Campaign
Description
MuddyWater APT has launched Operation Olalampo, targeting organizations in the MENA region. The campaign involves new malware variants, including a Rust backdoor called CHAR, downloaders GhostFetch and HTTP_VIP, and an advanced backdoor GhostBackDoor. Notably, the group is using Telegram bots for command-and-control, revealing insights into their post-exploitation tactics. The operation, first observed on January 26, 2026, shows tactical and technical overlaps with previous MuddyWater activities. Key discoveries include potential AI-assisted malware development and infrastructure reuse dating back to October 2025. The campaign aligns with ongoing geopolitical tensions and provides valuable information on the threat actor's evolving techniques.
AI-Powered Analysis
Technical Analysis
Operation Olalampo represents the latest campaign by the MuddyWater advanced persistent threat (APT) group, focusing on entities within the Middle East and North Africa (MENA) region. This campaign is notable for deploying multiple new malware variants, including a Rust-based backdoor named CHAR, which is uncommon and suggests an emphasis on stealth and cross-platform capabilities. The campaign also uses downloaders GhostFetch and HTTP_VIP to deliver payloads, and an advanced backdoor called GhostBackDoor, which likely provides persistent access and extensive control over compromised systems. Command-and-control (C2) infrastructure is implemented via Telegram bots, a tactic that leverages a legitimate messaging platform to evade detection and complicate network defense efforts. The campaign was first observed in late January 2026, with infrastructure reuse traced back to October 2025, indicating a sustained and evolving operation. Technical overlaps with previous MuddyWater campaigns suggest continuity in tactics, techniques, and procedures (TTPs), but with enhancements such as potential AI-assisted malware development, which could improve malware evasion and adaptability. The campaign employs a broad range of MITRE ATT&CK techniques, including credential access, process injection, command execution, and data exfiltration, reflecting a comprehensive post-exploitation toolkit. Although no public exploits are currently reported, the sophistication and targeted nature of the operation underscore a significant espionage threat to organizations in the MENA region, particularly those involved in government, energy, telecommunications, and critical infrastructure sectors.
Potential Impact
The primary impact of Operation Olalampo is espionage and unauthorized data access, potentially compromising sensitive governmental, industrial, and strategic information within the MENA region. The use of advanced malware and stealthy C2 channels like Telegram bots enables prolonged undetected access, increasing the risk of extensive data exfiltration and intellectual property theft. Organizations may experience operational disruptions if malware components interfere with system stability or if incident response activities require system quarantines. The campaign’s AI-assisted malware development hints at rapidly evolving threats that could bypass traditional detection mechanisms, raising the difficulty and cost of defense. While the campaign currently appears regionally focused, the reuse of infrastructure and modular malware design could allow expansion or collateral impact beyond initial targets. The geopolitical context suggests that affected organizations may face targeted attacks aligned with regional conflicts or intelligence gathering efforts, amplifying the strategic consequences of successful intrusions.
Mitigation Recommendations
Organizations should implement targeted detection rules for the specific malware variants CHAR, GhostFetch, HTTP_VIP, and GhostBackDoor, including behavioral analytics to identify unusual process execution and network traffic patterns associated with Telegram bot communications. Network defenders should monitor and restrict unauthorized use of Telegram and similar messaging platforms for C2 traffic, employing deep packet inspection and anomaly detection. Endpoint detection and response (EDR) solutions should be tuned to detect Rust-based malware signatures and suspicious downloader activities. Incident response teams must investigate any signs of infrastructure reuse or overlapping indicators with previous MuddyWater campaigns. Employing threat hunting focused on MITRE ATT&CK techniques observed in this campaign (e.g., credential dumping, process injection, scheduled task abuse) can uncover latent infections. Organizations should also enforce strict access controls, multi-factor authentication, and network segmentation to limit lateral movement. Sharing threat intelligence with regional CERTs and industry groups will enhance collective defense. Given the potential AI-assisted malware, investing in advanced machine learning-based detection tools and continuous monitoring is advisable. Finally, regular security awareness training should include information on social engineering tactics that may facilitate initial access.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.group-ib.com/blog/muddywater-operation-olalampo/"]
- Adversary
- MuddyWater
- Pulse Id
- 699c2852f2e41e1678d750b5
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash0f839cafa6565f74303e5e5f414f9d8c | — | |
hash2533307ec1ef8b0611c8896e1460b076 | — | |
hash64af4e6216026ed8fcfbf8b07ee20707 | — | |
hashbb3587d3da3fbe4ab8c36721d9435327 | — | |
hashc6160e69af601077892cbc669bc00926 | — | |
hashdc706b45a9e6770ae327adff4ccd1a7e | — | |
hashf5ef5f40922113c2dfb32c202ae2b3f5 | — | |
hashf96e2225af8dbf7555f3f4669d685d41 | — | |
hash0365daf83e37d2c6daaae6c28b4c8343288ef2f9 | — | |
hash0588cf26b6e9210f86a266ac0366af1fd29f135c | — | |
hash06f3b55f0d66913cd53d2f0e76a5e2d67ff8ed04 | — | |
hash270dbaedfbeef9333e0780f3c4e74c01392ce381 | — | |
hash2993b0ab9786ddc29eb9cf1ace4a28c6e34ea4fb | — | |
hash2eea39dbe11889e5713cbca020f7ede653bc48ec | — | |
hash2f5166086da5a57d7e59a767a54ed6fe9a6db444 | — | |
hash324918c73b985875d5f974da3471f2a0a4874687 | — | |
hash3441306816018d08dd03a97ac306fac0200e9152 | — | |
hash392a36717fa948f7e00d35711e8598108fbe2f72 | — | |
hash3c47eab6ebe5b48097c0099ff18f2a8bc13c12f7 | — | |
hash56380a652471962387693f4bcc893fd21f0fc324 | — | |
hash5c1500296857ed0b0bb7230a1cb17993d25ab69b | — | |
hash62ed16701a14ce26314f2436d9532fe606c15407 | — | |
hash777040bed9d26f5da97e8977c6efc0586beae064 | — | |
hash7bd04218276fc8f375c0ce3be43a710f6a2b4d09 | — | |
hash7d3757d5165e2e95b0b89e33316025a4b9301e2d | — | |
hash80cea18e19665c5a57e7b9ca0bf36aad06096e93 | — | |
hash8632b62fa14fd679fa97cfe50e6c25696b846129 | — | |
hash88cb6169fd7dd21e6d6aa3a8df0a78938e698028 | — | |
hash8c592d9ab58264e68dfe029ea90f80862c526670 | — | |
hash92e2f826804d762679b13283102f3560078eb4cb | — | |
hash975c763e050d0a9a46f0aafdde66d3e7f0626c5b | — | |
hash9ca11fcbd75420bd7a578e8bf6ef855e7bd0fb8e | — | |
hash9defffba933fc44f8e3b6e25b31508bc17d29077 | — | |
hashac982b7b46e085e0bb51cba2edb61bff5910b6a8 | — | |
hashb55e063607e8f56c9b398b289ba04ddca11398fe | — | |
hashceb9b7dfb8a36ee8fe223063a6e3f730f2dcefd1 | — | |
hashd0d7d0c816753639b5c577aacf14fd2e994b64b0 | — | |
hashd3fa50a9eba93a7fbc79e7ad0c4889d762718a5f | — | |
hashd97d21536c061e7a7151a453242d36f3ab196a14 | — | |
hashdc785be0c4430bfc5b507255f892bf30134a02b6 | — | |
hashe21564fd0fc3103c1d18b1e1525a0b40e9077d40 | — | |
hashe3cc95ca6e271ddf04cd88c85051b2cc9ce04e8e | — | |
hashe79ccc3f6517c911d6c1df79c94e88896f574e64 | — | |
hashea80deaed00c8b71aa0033b00fe0ef5b63840b99 | — | |
hashefb18cf7cf227037e034c0b525f502e642815f94 | — | |
hashf449b95830c584cef72dfb60fb78ee3d6c69ecb4 | — | |
hashf4e0f4449dc50e33e912403082e093dd8e4bc55d | — | |
hashf5a129ba4141361ca266950dc4adcb2c548aa949 | — | |
hashf77499a8fc6e615e21bf111a88c658ba3d5f0f81 | — | |
hashf779a3b1dcc0c3aacacf7ebfa4ed57d53af7e26c | — | |
hashfeb4318a90057d92ea5ab6420ed6164dd9605013 | — | |
hash3a19c19d9f3bac6628a968110477ee01e5867b2534e914e1be5c4485947bd819 | — | |
hash3fa148e2d3fb86cecc15c276c5329496beba9aba14a6024b561efabf2e4e68af | — | |
hash556e86667fcaee82976e83a653acb73a3e953f3560a5ba5aa7fc75a6d1a2c399 | — | |
hash81a6e6416eb7ab6ce6367c6102c031e2ae2730c3c50ab9ce0b8668fec3487848 | — | |
hash9b4cd87d338d2fcf30d75f9e5c7abb8be085dc8c4f573df19597b872d8ae8c2d | — | |
hashaee523056d602571ff006565b432148715a6a13d098d518ba8131ccbe719c043 | — | |
hashc91413ad7c94c0e2694862b9d671d1204873bf65576ba2cb91fbd562a4ccf79b | — | |
hashcb08fd349397af4528cb8cd94cc69434388747f93424da44c31169ccddc876ac | — | |
hashe25892603c42e34bd7ba0d8ea73be600d898cadc290e3417a82c04d6281b743b | — | |
hashef22f16d56334c01032bba80144e98a5dfb2eb87ce839411ea82d1e3ee4d0cef | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip143.198.5.41 | — | |
ip162.0.230.185 | — | |
ip209.74.87.100 | — | |
ip209.74.87.67 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincodefusiontech.org | — | |
domainjerusalemsolutions.com | — | |
domainminiquest.org | — | |
domainpromoverse.org | — |
Threat ID: 699c28f3be58cf853b724307
Added to database: 2/23/2026, 10:16:19 AM
Last enriched: 2/23/2026, 10:33:10 AM
Last updated: 2/24/2026, 1:08:50 AM
Views: 109
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-23
MediumMaltrail IOC for 2026-02-22
MediumFake Huorong security site infects users with ValleyRAT
MediumMaltrail IOC for 2026-02-23
MediumAnother day, another malicious JPEG, (Mon, Feb 23rd)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.