TRJ CYBERSECURITY INTEL REPORT | July 21, 2025
Category: Nation-State Surveillanceware Campaign
Features: WhatsApp Data Exfiltration, Remote Camera/Mic Access, SMS Harvesting, VPN Abuse
Delivery Method: Malicious Android Apps, Fake Starlink Lures, Telegram Distribution
Threat Actor: MuddyWater (Iranian MOIS-Affiliated APT)
State-Controlled Espionage Masquerading as Mobile Utility
A newly enhanced version of the DCHSpy surveillanceware is being deployed by suspected Iranian intelligence operatives to infiltrate the devices of activists, journalists, dissidents, and foreign observers — especially those critical of the Islamic Republic. The malware is now capable of exfiltrating WhatsApp content, device files, and full communications metadata, and is being spread via malicious websites disguised as Starlink apps, VPN tools, and banking utilities.
This is not a low-level operation. TRJ assessment confirms that this variant of DCHSpy — first detected in 2024 — is being run through infrastructure controlled by the MuddyWater APT, a group long linked to Iran’s Ministry of Intelligence and Security (MOIS). Their goal: neutralize digital resistance by converting mobile phones into live surveillance nodes.
TIMING & MOTIVE — TACTICAL DEPLOYMENT POST-ISRAEL STRIKE
The most recent version of DCHSpy was detected just one week after Israel’s June 2025 bombing campaign against key Iranian nuclear sites. TRJ believes this is no coincidence.
“This malware is an extension of battlefield tactics,” said a TRJ-aligned analyst. “They’re not just retaliating with rockets or cyber disruption — they’re going after information flows, communication channels, and emotional intelligence from inside enemy-aligned civilian populations.”
The campaign reflects a hybrid warfare strategy, where information control and domestic surveillance are weaponized just as aggressively as conventional military force.
CAPABILITIES — FULL-SPECTRUM MOBILE INTRUSION
The newly modified DCHSpy variant has expanded its mobile exploitation suite to include:
- WhatsApp message scraping (texts, audio, images)
- File system access — documents, downloads, media folders
- Live microphone activation and remote audio recording
- Camera access — discreet photo capture without user prompt
- Contact list and call log extraction
- SMS harvesting (including OTPs and personal conversations)
- GPS tracking — real-time and historical movement
- Clipboard hijacking — exfiltration of copied credentials and links
The malware operates silently in the background, often with root-level access disguised under fake system processes, minimizing detection on Android devices.
TARGETING — Farsi-Language Lures, Global Reach
The threat campaign is multi-lingual (English and Farsi) and tailored to individuals perceived as ideological enemies of the Iranian regime. Among the primary targets:
- Iranian political dissidents living abroad
- Domestic activists using encrypted communications
- Independent journalists covering Iranian human rights abuses
- Diaspora influencers supporting free internet access inside Iran
Malicious payloads are hosted on fake app portals mimicking Starlink, VPN providers, or local banking apps — all of which are politically symbolic vectors.
One high-profile lure impersonates Starlink, which became a symbol of resistance after it was used to bypass government-imposed internet blackouts during periods of civil unrest.
DELIVERY MECHANISM — TELEGRAM & DARK SOCIAL CHANNELS
Telegram channels, private messaging groups, and rogue chat forums are the primary distribution hubs for DCHSpy. Users are often sent fake Starlink support messages or “secure VPN” links that redirect to cloned websites. These sites install the trojanized apps which carry the malware directly onto the target device.
Once installed, DCHSpy communicates with C2 servers hosted via bulletproof domains outside of traditional detection grids. The malware then begins staged exfiltration to avoid triggering traffic-based security alarms.
“It’s built to blend in — to look like routine traffic while bleeding the soul of the phone,” says TRJ’s Orion Systems intelligence unit.
DEEPER CONNECTIONS — MUDDYWATER’S INTELLIGENCE TACTICS
MuddyWater (also known as Static Kitten) has evolved from a crude surveillance toolset into a full-fledged state-backed offensive cyber unit, and this DCHSpy campaign confirms their shift toward psychographic targeting — surveillance focused not just on behavior, but on belief systems.
This mirrors tactics seen in North Korea’s Operation Dream Job and China’s targeting of diaspora WeChat groups, where emotional trust vectors and political identity become the delivery system for malware.
TRJ WARNING: IF YOU RECEIVED A STARLINK, VPN, OR BANKING APP LINK — ASSUME COMPROMISE
This malware has likely reached devices in Europe, the U.S., Turkey, Iraq, and across the Iranian diaspora. Even if the app was uninstalled, traces of the infection may remain.
TRJ RECOMMENDATIONS
If you’ve been in contact with anti-regime communities, received suspicious app links, or installed any VPN/banking utilities recently — especially related to Starlink or censorship work — take the following action:
- Perform a full factory reset of your Android device.
- Change all account passwords using a secure device.
- Avoid reinstalling apps from any link or third-party store.
- Run a forensic scan with reputable mobile threat detection tools (e.g., Lookout Mobile Endpoint, Zimperium).
- Avoid Telegram groups known to circulate pirated or “uncensored” tools unless fully verified.
- Use a burner device for future comms if contact with compromised channels is unavoidable.
TRJ BLACK FILE: SIGNALS BEHIND THE CODE
DCHSpy’s codebase bears cryptographic resemblance to surveillance modules previously used by Rana Group, a known contractor of Iran’s MOIS. The app certificate metadata and staging URLs reveal a shared lineage with previous campaigns targeting Kurdish activists and Gulf-based journalists.
Sources within the cybersecurity community indicate this variant of DCHSpy was likely developed in Qom or Esfahan, where several state-sponsored cyber divisions operate under university research cover. Early command signatures traced to “sinaNet.ir” IP pools, long suspected to house MOIS backend relays.
TRJ has identified one staging server in active rotation with beacon logs as recent as July 19th, 2025 — suggesting this campaign is still live and expanding.
FINAL VERDICT
This isn’t phishing — it’s psychowarfare wrapped in code.
The Iranian regime is using mobile malware to weaponize communication and hunt its enemies across borders and platforms.
Anyone aligned with anti-regime movements — whether activist or analyst, journalist or developer — must now consider every app and message as a potential surveillance device.
In a world where truth is hunted, malware becomes the muzzle. But not on our watch.
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 2 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed just like the first one.
🔥 Kindle Edition 👉 https://a.co/d/1xlx7J2
🔥 Paperback 👉 https://a.co/d/a7vFHN6
🔥 Hardcover Edition 👉 https://a.co/d/efhu1ON
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a

