ATLA WIRE

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

24.02.2026
14752
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
MuddyWater's Operation Olalampo targets MENA with GhostFetch, CHAR, HTTP_VIP, and AI-assisted malware since Jan 26, 2026.

MuddyWater's Operation Olalampo: MENA Under Siege

Iranian APT MuddyWater is back with a vengeance — launching Operation Olalampo against Middle East and North Africa (MENA) orgs since Jan 26, 2026. They're deploying a nasty cocktail of GhostFetch, CHAR, and HTTP_VIP malware, plus AI-assisted tools. This isn't your grandpa's cyberattack.
The campaign's been active since late January 2026, hitting MENA targets with surgical precision. MuddyWater's using their signature blend of phishing lures and remote access tools, but now they've added AI to the mix — making detection way harder for defenders.
  • GhostFetch malware — custom backdoor for data exfiltration
  • CHAR malware — command and control tool for persistent access
  • HTTP_VIP malware — network tunneling for stealthy communications
  • AI-assisted tools — automating attack patterns and evasion
This isn't just another cyber skirmish — MuddyWater's been linked to Iran's Ministry of Intelligence and Security (MOIS), making this a state-sponsored operation with serious geopolitical implications. MENA orgs need to lock down their defenses ASAP.

MuddyWater's Operation Olalampo targets MENA with GhostFetch, CHAR, HTTP_VIP, and AI-assisted malware since Jan 26, 2026.

The threat actor's using sophisticated social engineering — think fake job offers, compromised websites, and malicious documents — to get initial access. Once inside, they deploy their malware suite and establish persistent footholds. Security teams should watch for unusual network traffic and suspicious PowerShell activity.
  • Targets: Middle East and North Africa organizations
  • Timeline: Active since January 26, 2026
  • Actor: MuddyWater (Iranian APT, linked to MOIS)
  • Tools: GhostFetch, CHAR, HTTP_VIP, AI-assisted malware
  • Initial access: Phishing, compromised sites, malicious docs
Bottom line: MuddyWater's evolving their playbook with AI and new malware variants. MENA orgs are in the crosshairs — time to update threat intel, patch vulnerabilities, and train staff on spotting sophisticated phishing attempts. This operation shows state-sponsored threats are getting smarter and more automated.
#APT groups#malware#state-sponsored cyber attacks#Artificial Intelligence#phishing
Got a topic? Write to ATLA WIRE on Telegram:t.me/atla_community
Banner | ATLA WIRE
    MuddyWater's Operation Olalampo: MENA Under Siege