Iranian Hackers MuddyWater Use Fake VPN and Banking Apps to Distribute DCHSpy to Governments

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

The DCHSpy Android surveillanceware has been linked to the Iranian cyber espionage group MuddyWater. This sophisticated tool has been deployed to gather sensitive data from targeted devices worldwide, posing as legitimate apps in the backdrop of the Iran-Israel tensions.  

Capabilities of DCHSpy  

New DCHSpy samples exhibit advanced capabilities, as per cybersecurity firm Lookout. It collects a wide range of sensitive data, including:

DCHSpy VPN samples are also being spread with Starlink lures
DCHSpy VPN samples are also being spread with Starlink lures | Source: Lookout

Key Targets  

MuddyWater, believed to operate under Iran's Ministry of Intelligence and Security (MOIS), deploys DCHSpy surveillanceware against a spectrum of government and private institutions. 

Sectors such as telecommunications, defense, local governments, and oil and gas industries are primary targets across regions, including Asia, the Middle East, Europe, and North America. 

The significant Android spyware threat demonstrates precise targeting, often exploiting geopolitical conflicts like the recent Israel-Iran tension to amplify its reach and effectiveness.  

Distribution Methods  

Appearing as legitimate applications like VPN or banking apps, DCHSpy employs political lures to trick victims into installing it. The gang leverages anti-Iran themes to attract English and Farsi speakers in VPN advertisements distributed through deceptive links via messaging platforms such as Telegram. 

The malicious VPN distribution page from June 2025, which is notably targeted at activists and journalists globally
The malicious VPN distribution page from June 2025, which is notably targeted at activists and journalists globally | Source: Lookout

In previous reports, the threat actor advertised HideVPN, and now it is advertising EarthVPN and ComodoVPN, with the former claiming to be located in Romania and the latter in Canada. The listed contacts for these fake apps actually belong to random businesses in those respective countries.

A recent campaign disguised DCHSpy samples with filenames referencing StarLink, after recent reports of Elon Musk’s company offering support to Iranian citizens during internet outages imposed by the Iranian government following hostilities between Israel and Iran.

According to Sekoia, the group generally utilizes public exploits to compromise Internet-exposed servers, including Exchange and SharePoint servers.

Broader Implications  

Businesses and individuals are advised to avoid installing apps from unknown sources and utilize trusted security solutions to mitigate exposure to emerging threats, such as DCHSpy.  

In July 2024, Iran's MuddyWater new backdoor targeted Israeli organizations, with over 50 phishing emails sent to representatives.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: