
Ariel Jungheit
@ArielJT
Followers
1K
Following
972
Media
69
Statuses
291
Life under the sea was so much easier | Threat Research @harfanglab | Maker | Tweets are my own
G28 X0 Y0 Z0
Joined March 2009
New tunneling services timeline:.ποΈ 2025-04-24: lhr[.]life.ποΈ 2025-05-06: serveo[.]net, workers[.]dev.ποΈ 2025-06-11: euw.devtunnels[.]ms. Updated Yara rule alongside IoCs: For more information about PteroLNK, please refer to:
harfanglab.io
Identifier: TRR250401. Proactively hunting for Russian-nexus threats, we identified samples from the Pterodo malware family, commonly associated with Gamaredon, uploaded to a public malware analysis...
0
1
9
Following our recent #Gamaredon publication, the actor upgraded their PteroLNK malware and expanded infrastructure. Key changes:.- NTFS Alternative Data Streams (ADS) storage.- Randomized HTTP headers breaking network sigs.- Expanded tunneling services.- More robust DDR approach
2
18
60
Full technical report with IoCs and Yara rules below:.
harfanglab.io
Identifier: TRR250601. Summary This report examines recent activities we attribute to the XDSpy threat actor, focusing on an ongoing campaign targeting Eastern European and Russian governmental...
1
1
10
Dropping new research - this time on recent #XDSpy operations. Out of hundreds of LNK files leveraging ZDI-CAN-25373, we isolated a tiny cluster using an additional LNK parsing trick, leading us to uncover a multi-stage infection chain actively targeting government entities
2
20
70
Full report includes actionable detection rules, hashes, and infrastructure indicators:.
harfanglab.io
Identifier: TRR250401. Proactively hunting for Russian-nexus threats, we identified samples from the Pterodo malware family, commonly associated with Gamaredon, uploaded to a public malware analysis...
0
7
15
We published a new report, covering #Gamaredon's #PteroLNK malware, used in a recent campaign. The Russian APT group continues active operations against Ukrainian targets through April 2025 1/4.
1
15
26
Check out our latest report covering Ivanti CSA vulnerability with complete root cause analysis, detailed breakdown of ITW exploitation, overview of worldwide targets alongside comprehensive IoCs & detection rules ππ».
harfanglab.io
Identifier: TRR250201. Summary Between October 2024 and late January 2025, public reports described the exploitation of Ivanti CSA vulnerabilities which started Q4 2024. We share analysis results...
0
13
29
RT @ryanaraine: π This week's show is the full keynote day remarks from Juan Andres Guerrero-Saade at #LABScon24. In this talk, Juanito aβ¦.
0
33
0