BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Iran's MuddyWater Targets US Firms, macOS Stealer Campaign, and HIBP Surge

Iran's MuddyWater Targets US Firms, macOS Stealer Campaign, and HIBP Surge

March 10, 2026Data Breaches & Incidents3 min readhigh

Originally reported by Hackread, Troy Hunt

#muddywater#apt#macos#stealer#clickfix#iran#backdoor#hibp
Share

TL;DR

Iran's MuddyWater hackers deployed new Dindoor backdoor against US companies while cybercriminals used fake CleanMyMac sites to distribute macOS stealer malware. Meanwhile, Have I Been Pwned processed five major breaches in two days, highlighting an acceleration in data compromise incidents.

Why high?

Iran's MuddyWater APT actively targeting US companies with new backdoor malware represents a significant nation-state threat requiring immediate attention from enterprise defenders.

Iranian State Actors Deploy New Backdoor Against US Targets

Researchers have identified a new campaign by Iran's MuddyWater APT group targeting US companies and an Israeli software firm using previously unknown Dindoor backdoor malware. The attacks come amid ongoing regional conflicts and demonstrate the group's continued focus on Western commercial targets.

MuddyWater, tracked as Earth Vetala by Trend Micro and MERCURY by Microsoft, has maintained persistent operations against government and private sector entities. The deployment of the Dindoor backdoor represents an evolution in their toolset, though specific technical details about the malware's capabilities remain limited in current reporting.

The targeting of both US commercial entities and Israeli technology firms aligns with Iran's documented cyber doctrine of conducting espionage and disruptive operations against adversary nations' critical infrastructure and economic assets.

Fake CleanMyMac Campaign Deploys SHub Stealer on macOS

Threat actors are distributing SHub stealer malware through convincing fake websites impersonating CleanMyMac, a legitimate macOS system optimization tool. The campaign employs a "ClickFix" attack technique designed to trick users into executing malicious code.

SHub stealer specifically targets macOS systems to harvest stored passwords, cryptocurrency wallet data, and other sensitive information. The malware represents growing criminal interest in targeting Mac users, who historically faced fewer threats than Windows counterparts.

The ClickFix technique typically involves presenting users with fake error messages or system prompts that require clicking specific elements to "resolve" manufactured issues, ultimately triggering malware installation. Security teams should alert macOS users about downloading software only from official sources and App Store channels.

Have I Been Pwned Processes Major Breach Surge

Troy Hunt reported an unusual spike in data breach processing through Have I Been Pwned, with five new breaches loaded within two days. This represents several weeks' worth of typical activity compressed into 48 hours, given HIBP's historical average of one breach every 4.7 days across 959 total incidents.

The surge suggests either coordinated disclosure of previously unreported incidents or a cluster of recent compromise events reaching public awareness simultaneously. Hunt noted the acceleration without specifying the nature or scope of the individual breaches involved.

Since launching over twelve years ago, HIBP has become the definitive repository for tracking data breach exposures, making sudden activity spikes significant indicators of broader cybersecurity trends.

Enterprise Security Tool Adoption and Research Updates

Yoma Fleet, a Myanmar-based fleet management company, selected AccuKnox SIEM to replace legacy security monitoring tools. The deployment reflects ongoing enterprise migration from traditional security infrastructure to cloud-native platforms, particularly in emerging markets.

Security Risk Advisors released "The Purple Perspective 2026" report, though specific findings and recommendations remain undisclosed in current coverage. Purple team methodologies combining offensive and defensive security practices continue gaining enterprise adoption for comprehensive security validation.

Sources

  • https://hackread.com/iran-muddywater-hackers-us-dindoor-backdoor/
  • https://hackread.com/fake-cleanmymac-site-clickfix-shub-stealer-macos/
  • https://www.troyhunt.com/weekly-update-494/
  • https://hackread.com/leading-myanmar-fleet-management-company-yoma-fleet-selects-accuknox-siem-to-replace-legacy-tools/
  • https://hackread.com/security-risk-advisors-releases-the-purple-perspective-2026-report/

Originally reported by Hackread, Troy Hunt

Tags

#muddywater#apt#macos#stealer#clickfix#iran#backdoor#hibp

Threat Actors

🇮🇷MuddyWater

Related Intelligence

  • Iranian APT Groups Intensify Cyber Operations Against U.S. and Middle East Infrastructure

    highMar 7, 2026
  • Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup

    highFeb 23, 2026
  • Weekly Security Roundup: Banking Trojan Targets Brazil, Iranian Hackers Hit Healthcare Giants, HR Under Attack

    highMar 12, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Malware Threats Weekly: CISA Flags Ivanti EPM Zero-Day, APT28 Leverages Covenant Framework, Meta Ad Network Powers Global Scam Operations

Next Article

Dutch Defense Secretary Proposes Jailbreaking F-35 Jets to Reduce US Software Dependency →