%0 Journal Article %T MuddyWater APT Group and A Methodology Proposal for Macro Malware Analysis %A Baris CEL£¿KTAS %A Mevlut Serkan TOK %J - %D 2019 %X Macros are consisted of instructions and commands mainly used to automate tasks, embed functionality and provide customization of Microsoft Office documents. However, they have been exploited by malicious hackers by creating malware since they were introduced. Recently, Advanced Persistent Threat (APT) Groups have generally used macros as attack vectors as well. Since 2017, Middle Eastern countries¡¯ governmental institutions, and strategically important oil, telecommunication and energy companies have been targeted by the APT Group probably affiliated with Iran, and the group is named as MuddyWater by analysts due to the techniques they utilized to cover their tracks. The group has generally conducted attacks via macro malware. In this work, we aimed to raise awareness regarding MuddyWater APT Group and provide a detailed methodology for analyzing macro malware. The attributions, strategy, attack vectors, and the infection chain of MuddyWater APT Group have been explained. In addition, a malicious document, targeting Turkey and Qatar, detected first on 27 November 2018 have been analyzed, findings and proposals have been presented for cybersecurity professionals %K Makro Zararl£¿ Yaz£¿l£¿m£¿ %K MuddyWater %K £¿leri D¨¹zey Kal£¿c£¿ Tehdit %K Zararl£¿ Yaz£¿l£¿m Analizi %K Adli Bili£¿im %U http://dergipark.org.tr/gazibtd/issue/47484/512800