DinDoor and ChainShell tie MuddyWater to Russian malware-as-a-service infrastructure


MuddyWater appears to be using commercial malware-as-a-service infrastructure rather than relying only on its own tooling. New research from JUMPSEC says the Iranian espionage group used a shared TAG-150 platform tied to DinDoor, ChainShell, and CastleRAT-related infrastructure, while Broadcom previously linked the DinDoor MSI delivery chain to Seedworm, also known as MuddyWater.

The key point is attribution. JUMPSEC argues that MuddyWater did not build the Deno-based malware family itself. Instead, it likely operated as a customer of a Russian-speaking malware service, using shared infrastructure and campaign-specific credentials to run its own operations. That distinction matters because the same platform appears to support more than one threat actor.

Broadcom’s March 5 report already tied the “Amy Cherne” and “Donald Gay” code-signing certificates to Seedworm activity and said those certificates signed DinDoor-related MSI installers. JUMPSEC extends that chain by linking the same certificate and JWT campaign data to wider TAG-150 infrastructure and to a previously undocumented malware component it named ChainShell.

JUMPSEC says one of its strongest findings came from a PowerShell script named reset.ps1 discovered on infrastructure it attributes to MuddyWater. According to the report, that script installs Node.js, decrypts an embedded payload, and deploys ChainShell, which the researchers describe as a JavaScript-based malware agent that uses blockchain-resolved command-and-control.

The researchers also say the same exposed server contained Farsi-language artifacts and Israeli targeting data. In their view, that supports Iranian operational use, while Russian-language developer strings and CIS exclusions inside the malware point to a Russian-speaking developer or malware service provider.

That split is central to the report’s argument. JUMPSEC says MuddyWater operated the malware but did not author the entire platform. The group appears to have bought access to it, then deployed its own campaigns through the service with its own JWT credentials and targeting logic.

Where DinDoor fits in

Broadcom described DinDoor as a JavaScript-based backdoor delivered through signed MSI installers and linked the activity to Seedworm after U.S. and Israeli strikes on Iran. That report focused on the installer chain, the certificate overlap, and post-execution behavior.

Execution process flow for migcredit.pdf.msi (Source – Hunt.io)

JUMPSEC adds that DinDoor should not be treated as a purely MuddyWater-built tool. It says the Deno-based JavaScript malware sits inside a broader multi-tenant platform that other actors also use. In that model, MuddyWater becomes one operator among several, not the owner of the whole backend.

The report specifically points to serialmenot.com as shared infrastructure. JUMPSEC says the domain is not exclusive to MuddyWater and notes that other threat activity, including cybercriminal operations, used the same codebase with different campaign settings and credentials. That weakens any simple one-domain, one-actor attribution model.

What ChainShell changes

JUMPSEC says ChainShell is a separate malware component from the Deno-based DinDoor variants. It describes ChainShell as a thinner Node.js execution shell that receives JavaScript from the server, runs it with new Function(), and returns results back to the operator. The functionality lives mostly on the server side, which makes the agent itself less feature-heavy but still operationally useful.

That design changes how defenders should think about capability. A small agent on disk does not mean limited functionality. If the backend can push fresh logic on demand, operators can adapt tasks without replacing the implant every time.

Execution workflow for Installer_v1.21.66.msi (Source – Hunt.io)

JUMPSEC also says the malware excludes CIS locales and contains Russian-language strings such as “вернул” and “провайдер.” The report treats those as evidence of developer origin rather than operator identity, while the Farsi artifacts and Israeli targeting data support MuddyWater’s role as the end user.

Key findings at a glance

ItemWhat the reporting says
Threat actor using the platformMuddyWater / Seedworm
Malware families discussedDinDoor, ChainShell, CastleRAT-related builds
Core claimMuddyWater used TAG-150 malware-as-a-service infrastructure rather than building all tooling itself
Attribution trailAmy Cherne certificate, StageComp overlap, JWT campaign data, exposed C2 artifacts
Shared infrastructureserialmenot.com appears multi-tenant, not exclusive to one actor
Main implicationState actors may increasingly buy criminal tooling instead of developing everything in-house

This summary reflects the attached text and the vendor reporting it references.

Why this matters for defenders

The report suggests attribution will get harder, not easier. If a victim network shows CastleRAT or ChainShell artifacts, the first impression may point to Russian cybercrime. JUMPSEC argues that deeper analysis can reveal a different operator sitting behind the same service infrastructure.

That creates a practical problem for incident response teams. If analysts separate “APT” and “cybercrime” too rigidly, they may miss hybrid operations where a state actor rents criminal tooling and runs espionage through a commercial malware platform.

Organizations in defense, aerospace, government, and energy should pay particular attention. Those sectors already sit inside MuddyWater’s historical targeting set, and JUMPSEC says the use of off-the-shelf criminal tooling gives the group faster access to newer capabilities without needing to build them internally.

FAQ

What is the main claim in this report?

The main claim is that MuddyWater used a shared Russian-speaking malware-as-a-service platform tied to DinDoor, ChainShell, and CastleRAT-related infrastructure, rather than developing all of the tooling itself.

Did Broadcom officially attribute DinDoor to Seedworm?

Yes. Broadcom linked the signed MSI installer chain and related activity to Seedworm, which it also tracks as MuddyWater.

Is serialmenot.com exclusive to MuddyWater?

No. JUMPSEC says it is multi-tenant infrastructure and should not be treated as exclusive proof of MuddyWater by itself.

What is ChainShell?

JUMPSEC describes ChainShell as a previously undocumented Node.js-based malware component that resolves command-and-control through blockchain-related mechanisms and executes server-supplied JavaScript.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages