Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.
Static Kitten, also known as MuddyWater, Seedworm, TEMP.Zagros, and Mercury, is a sophisticated Iranian state-sponsored cyberespionage group that has operated since at least 2017. Strongly linked to Iran's Ministry of Intelligence and Security (MOIS), this group employs a variety of advanced tactics and techniques, including spear-phishing campaigns, PowerShell-based backdoors, and Android spyware, to target governments, academia, telecommunications, and NGOs primarily in the Middle East and Central Asia.
Static Kitten’s primary motivation is to conduct espionage, focusing on intelligence gathering for geopolitical and economic advantages. This includes stealing sensitive data and intellectual property from strategic entities.
To achieve its espionage objectives, Static Kitten frequently employs social engineering techniques, such as spear-phishing emails with malicious documents or links. The group also exploits legitimate tools like file-sharing platforms and remote management tools for covert operations.
Static Kitten leverages POWERSTATS and NTSTATS PowerShell backdoors, Android spyware (e.g., DCHSpy), and custom malware like BugSleep and MuddyRot. Additionally, it uses legitimate tools like ScreenConnect and MSI installers in its campaigns to mask malicious activities and evade detection.
Static Kitten’s operations leave behind several IoCs, including malicious domains, spear-phishing email headers, PowerShell malware hashes, and indicators related to Android spyware such as app permissions and sideloaded packages.
Static Kitten primarily targets government agencies, foreign affairs ministries, academic institutions, and telecommunications providers within the Middle East. Other prominent victims include NGOs, media outlets, and expatriate communities.
One significant campaign in 2021 targeted government agencies in Kuwait and the UAE using Israeli-themed lures tied to ministries of foreign affairs. More recently, in 2024, Static Kitten expanded its operations with the development of a new attack framework, DarkBeatC2, and the deployment of BugSleep and MuddyRot implants to target Israel and other strategic regions.
To date, there have been no confirmed arrests or law enforcement actions targeting Static Kitten, reflecting the challenges of addressing state-sponsored cyber threats at an international level.
Implement strong email security, including filtering phishing attempts and blocking malicious attachments.
Monitor for unusual use of remote management tools and PowerShell scripts.
Bolster mobile security by restricting apps from untrusted sources.
Patch known vulnerabilities promptly to limit exposure.
Leverage Huntress tools to detect persistence mechanisms and uncover malicious activities.