![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihcBUM8AYIxXMTF524TJcMOgEdG-1yd4w8cxc1nuYvIRrALE3NnoCp2X1WfciBwiHi84Dr-x02L0SDkTq1Z_1KzFjOvOjp4MXXddjawSf6MliehwLcxeo3QfxE_o06g9Ecx-ZNHDB_jEeLZiXqxiRN0K4piG-frPl5fu0_qLhC53nPLUIs1w8-d2wwwSqS/s1600/iran-hackers.png)
The Iranian threat actor known as MuddyWater has been attributed to a new command-and-control (C2) infrastructure called DarkBeatC2, becoming the latest such tool in its arsenal after SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go.
“While occasionally switching to a new remote administration tool or changing their C2 framework, MuddyWater’s methods remain constant,” Deep
Source:: The Hackers News