Researchers say a massive phishing campaign targeting Asia and Middle East regions is linked to an Iranian-based threat actor TEMP.Zagros, also known as MuddyWater. This latest attack illustrates an evolution by the threat actor, which has now adopted new tactics, techniques and procedures. The group has also adopted new tools such as POWERSTATS for backdoors and techniques such an as AppLocker bypass, researchers said. Trend Micro reported similarities between the campaign and these new attacks Monday.
Source: https://threatpost.com/iran-linked-group-temp-zagros-updates-tactics-techniques-in-latest-campaign/130447/

