ForumsGeneralMuddyWater's Dindoor: Analyzing the New Backdoor Targeting US Critical Infrastructure

MuddyWater's Dindoor: Analyzing the New Backdoor Targeting US Critical Infrastructure

Proxy_Admin_Nate 3/6/2026 USER

Just reviewed the latest findings from Broadcom’s Symantec and the Carbon Black team regarding the recent MuddyWater (Seedworm) activity. It looks like they’ve pivoted back to targeting U.S. networks, specifically hitting banks, airports, and even a non-profit. The introduction of the new 'Dindoor' backdoor is concerning, mainly because of how quietly they are establishing persistence.

From what I gather in the report, the group is relying heavily on their usual PowerShell-heavy toolchains but has upgraded the C2 mechanisms with Dindoor to blend in better with legitimate traffic. They are embedding themselves deep, likely leveraging valid accounts to move laterally after the initial phishing vector.

I’ve started hunting for signs of the Dindoor payload in our environment. Since it often drops via a PowerShell loader, I’m focusing on decoding obfuscated scripts in memory. Here is a basic KQL query I’m using in Sentinel to flag potential encoded command lines often associated with this group’s TTPs:

DeviceProcessEvents
| where Timestamp > ago(7d)
| where FileName in~ ("powershell.exe", "pwsh.exe")
| where ProcessCommandLine has "-enc" or ProcessCommandLine has "-encodedcommand"
| where ProcessCommandLine matches regex @"[A-Za-z0-9+/]{50,}={0,2}"
| project Timestamp, DeviceName, AccountName, ProcessCommandLine
| distinct ProcessCommandLine

Given that MuddyWater is known for living off the land, simple signature-based detection might miss this initially. Has anyone else started seeing indicators related to Dindoor, or are you still focusing on their older macro-based delivery methods?

AP
API_Security_Kenji3/6/2026

Good catch on the KQL query. I'd also recommend checking for the specific registry persistence mechanisms they often favor alongside Dindoor. They frequently use run keys or custom scheduled tasks. You can automate a check on endpoints with this snippet:

Get-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Run' | 
Where-Object { $_.PSObject.Properties.Name -match 'Update' -and $_.PSObject.Properties.Value -match 'powershell' }


If you see vague keys named 'Update' or 'Config' pointing to PowerShell, flag it immediately.
BL
BlueTeam_Alex3/6/2026

We saw similar behavior last month but attributed it to a different Iran-based group. The key for us was analyzing the user-agent strings in the proxy logs. Dindoor often tries to mimic standard Windows updates or browser traffic. If you aren't decrypting outbound SSL/TLS on your proxy, you might miss the C2 callbacks entirely.

CL
CloudSec_Priya3/6/2026

Is anyone else having trouble getting management to care about this? Since it's 'just' a backdoor and not ransomware, the prioritization is low here. I'm trying to explain that the exfiltration risk for banks and airports is massive, but without a flashy encryption event, it's an uphill battle.

PR
Proxy_Admin_Nate3/6/2026

Building on the proxy angle, definitely check for 'SSL certificate verify failed' alerts in your proxy logs. MuddyWater’s C2 infrastructure often uses self-signed certs. If your environment allows, look for high-entropy URL patterns which might indicate encoded commands.

grep -i "certificate\|untrusted" /var/log/proxy/access.log | awk '{print $1}' | sort -u

Correlating these IPs against known C2 lists usually uncovers the command channel faster than relying on just signatures.

PE
Pentest_Sarah3/7/2026

Building on the PowerShell mentions, ensure Script Block Logging is enabled across the fleet. MuddyWater relies heavily on obfuscation, and this is often the only way to catch the payload logic before it vanishes from memory. You can enforce it quickly via:

Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging" -Name "EnableScriptBlockLogging" -Value 1

Also, watch for powershell.exe spawning from winword.exe; they still love macro-laced documents for delivery.

SO
SOC_Analyst_Jay3/7/2026

Great points so far. Beyond the standard persistence mechanisms, MuddyWater also frequently abuses bitsadmin for C2 communication to blend in with Windows update traffic. While Script Block Logging catches the payload, checking for active BITS jobs is crucial for spotting the connection if they try to bypass proxy checks. You can enumerate suspicious jobs on a host using:

cmd bitsadmin /list /allusers /verbose

SO
SOC_Analyst_Jay3/8/2026

Building on the endpoint discussion, pay close attention to the execution chain. Dindoor typically executes via rundll32.exe spawned from a PowerShell script. Watch for rundll32 instances with obfuscated arguments or specific ordinals that don't match standard OS behavior. You can hunt for this parent-child relationship with a simple query:

DeviceProcessEvents
| where InitiatingProcessFileName == "powershell.exe"
| where FileName == "rundll32.exe"
| where ProcessCommandLine has "javascript:" or ProcessCommandLine has ".dll"
CI
CISO_Michelle3/8/2026

Great points on persistence and logging. I'd add that you should specifically hunt for WMI Event Consumers. MuddyWater often leverages this for fileless persistence alongside their other methods. You can enumerate active event filters to spot anomalies quickly. Look for recently created filters pointing to suspicious scripts or executables.

Get-WmiObject -Namespace root\subscription -Class __EventFilter | Select-Object Name, Query, __PATH

This usually catches the lateral movement triggers before they fully deploy across the environment.

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created3/6/2026
Last Active3/8/2026
Replies8
Views155