ArielJT Profile Banner
Ariel Jungheit Profile
Ariel Jungheit

@ArielJT

Followers
1K
Following
1K
Media
69
Statuses
294

Life under the sea was so much easier | Threat Research @harfanglab | Maker | Tweets are my own

G28 X0 Y0 Z0
Joined March 2009
Don't wanna be here? Send us removal request.
@securechicken
Secure Chicken ๐Ÿฃ
7 days
Anyway, we wanted to tell a bit later, but we had to rush it now, as fellows did publish about the same toolset today (as "TOLLBOOTH"). We're fewer guys but we may still have found a bit more. IOCs & Yaras:
Tweet card summary image
harfanglab.io
Identifier: TRR251001. Summary Late August and early September 2025, our security product detected the compromises of IIS servers with a previously undocumented malicious module which we call...
0
5
15
@securechicken
Secure Chicken ๐Ÿฃ
21 days
Documents ๐Ÿ“ƒ about alleged IRGC ๐Ÿ‡ฎ๐Ÿ‡ทcyber ops are being disclosed since last week (#KittenBusters). 2nd batch of data includes a reference to our work @HarfangLab: "see reports on publicly available tools (such as BellaCiao and CYCLOPS) โ€“ these are malware tools used"
1
5
5
@ArielJT
Ariel Jungheit
2 months
New threat report is live! Get it while itโ€™s hot ๐Ÿ”ฅ
@securechicken
Secure Chicken ๐Ÿฃ
2 months
We @aridjourney @ArielJT at HarfangLab had a look at archives containing weaponized XLS spreadsheets dropping C# and C++ downloaders, likely intended for targets in Ukraine and Poland
0
0
4
@ArielJT
Ariel Jungheit
4 months
New tunneling services timeline: ๐Ÿ—“๏ธ 2025-04-24: lhr[.]life ๐Ÿ—“๏ธ 2025-05-06: serveo[.]net, workers[.]dev ๐Ÿ—“๏ธ 2025-06-11: euw.devtunnels[.]ms Updated Yara rule alongside IoCs: https://t.co/gSDLHphCTy For more information about PteroLNK, please refer to:
Tweet card summary image
harfanglab.io
Identifier: TRR250401. Proactively hunting for Russian-nexus threats, we identified samples from the Pterodo malware family, commonly associated with Gamaredon, uploaded to a public malware analysis...
0
1
9
@ArielJT
Ariel Jungheit
4 months
New Infrastructure scripts: :URLS โ†’ Scrapes Telegraph/Telegram for tunnel URLs โ†’ Appends .trycloudflare.com โ†’ stores in :URL ADS & registry :IPS โ†’ Fetches IPs via Telegram, check-host[.]net, or ping to hardcoded C2 โ†’ stores in :IP ADS & registry
1
1
6
@ArielJT
Ariel Jungheit
4 months
The updated downloader now features an improved multi-tier fallback: Registry keys โ†’ ADS โ†’ Telegraph/Teletype DDRs โ†’ hardcoded C2 The LNK dropper maintains core functionality with tweaked execution command.
1
1
3
@ArielJT
Ariel Jungheit
4 months
The new modular malware structure: 4 VBS payloads written to ADS: :SRV - Updated downloader :LNK - LNK dropper :URLS - DDR C2 URL retrieval :IPS - DDR C2 IP retrieval/resolution :GTR - Main orchestrator (self)
1
1
4
@ArielJT
Ariel Jungheit
4 months
Following our recent #Gamaredon publication, the actor upgraded their PteroLNK malware and expanded infrastructure. Key changes: - NTFS Alternative Data Streams (ADS) storage - Randomized HTTP headers breaking network sigs - Expanded tunneling services - More robust DDR approach
2
18
60
@ArielJT
Ariel Jungheit
4 months
Our analysis covers the LNK parsing vulnerabilities, detailed XDigo malware analysis, comprehensive infrastructure overview, and attribution linking current activity to historical XDSpy activities including a previously unattributed 2023 operation
1
1
2
@ArielJT
Ariel Jungheit
4 months
Through hunting and pivoting, we identified the likely payload: XDigo, XDSpy's Go based malware deployed against a governmental target in Belarus. We also mapped additional infrastructure showing multiple connections and ties across past campaigns
1
1
3
@ArielJT
Ariel Jungheit
4 months
Dropping new research - this time on recent #XDSpy operations. Out of hundreds of LNK files leveraging ZDI-CAN-25373, we isolated a tiny cluster using an additional LNK parsing trick, leading us to uncover a multi-stage infection chain actively targeting government entities
2
20
70
@ArielJT
Ariel Jungheit
7 months
#PteroLNK is a heavily obfuscated VBScript that dynamically constructs two additional payloads during execution: a downloader and an LNK dropper that propagates through connected drives 3/4
1
1
5
@ArielJT
Ariel Jungheit
7 months
The new PteroLNK samples date back to December 2024, using DDRs that are still updated daily, pointing to new Cloudflare quick tunnels 2/4
2
1
4
@ArielJT
Ariel Jungheit
7 months
We published a new report, covering #Gamaredon's #PteroLNK malware, used in a recent campaign. The Russian APT group continues active operations against Ukrainian targets through April 2025 1/4
1
15
26
@ArielJT
Ariel Jungheit
8 months
We made a full circle from dial-up
@ggerganov
Georgi Gerganov
8 months
Today I was sent the following cool demo: Two AI agents on a phone call realize theyโ€™re both AI and switch to a superior audio signal ggwave
0
0
2
@ArielJT
Ariel Jungheit
9 months
Check out our latest report covering Ivanti CSA vulnerability with complete root cause analysis, detailed breakdown of ITW exploitation, overview of worldwide targets alongside comprehensive IoCs & detection rules ๐Ÿ‘‡๐Ÿป https://t.co/Ng41t7inNK
harfanglab.io
Identifier: TRR250201. Summary Between October 2024 and late January 2025, public reports described the exploitation of Ivanti CSA vulnerabilities which started Q4 2024. We share analysis results...
0
13
29
@ArielJT
Ariel Jungheit
11 months
We gave it a good shake, and our Magic 8 Ball revealed 2025's threats: ๐ŸŽฑ Internet fracturing & digital borders rising ๐ŸŽฑ Agentic AI going rogue ๐ŸŽฑ Truth drowning in AI bias ๐ŸŽฑ "meh" malware used strategically ๐ŸŽฑ Civil/Private cyber proxies taking center stage ...and more ๐Ÿ‘‡๐Ÿป
1
2
9