ArielJT Profile Banner
Ariel Jungheit Profile
Ariel Jungheit

@ArielJT

Followers
1K
Following
972
Media
69
Statuses
291

Life under the sea was so much easier | Threat Research @harfanglab | Maker | Tweets are my own

G28 X0 Y0 Z0
Joined March 2009
Don't wanna be here? Send us removal request.
@ArielJT
Ariel Jungheit
1 month
New tunneling services timeline:.πŸ—“οΈ 2025-04-24: lhr[.]life.πŸ—“οΈ 2025-05-06: serveo[.]net, workers[.]dev.πŸ—“οΈ 2025-06-11: euw.devtunnels[.]ms. Updated Yara rule alongside IoCs: For more information about PteroLNK, please refer to:
Tweet card summary image
harfanglab.io
Identifier: TRR250401. Proactively hunting for Russian-nexus threats, we identified samples from the Pterodo malware family, commonly associated with Gamaredon, uploaded to a public malware analysis...
0
1
9
@ArielJT
Ariel Jungheit
1 month
New Infrastructure scripts:.:URLS β†’ Scrapes Telegraph/Telegram for tunnel URLs β†’ Appends .trycloudflare.com β†’ stores in :URL ADS & registry.:IPS β†’ Fetches IPs via Telegram, check-host[.]net, or ping to hardcoded C2 β†’ stores in :IP ADS & registry.
1
1
6
@ArielJT
Ariel Jungheit
1 month
The updated downloader now features an improved multi-tier fallback: Registry keys β†’ ADS β†’ Telegraph/Teletype DDRs β†’ hardcoded C2.The LNK dropper maintains core functionality with tweaked execution command.
Tweet media one
1
1
3
@ArielJT
Ariel Jungheit
1 month
The new modular malware structure: 4 VBS payloads written to ADS:.:SRV - Updated downloader.:LNK - LNK dropper.:URLS - DDR C2 URL retrieval.:IPS - DDR C2 IP retrieval/resolution.:GTR - Main orchestrator (self)
Tweet media one
1
1
4
@ArielJT
Ariel Jungheit
1 month
Following our recent #Gamaredon publication, the actor upgraded their PteroLNK malware and expanded infrastructure. Key changes:.- NTFS Alternative Data Streams (ADS) storage.- Randomized HTTP headers breaking network sigs.- Expanded tunneling services.- More robust DDR approach
Tweet media one
2
18
60
@ArielJT
Ariel Jungheit
2 months
Our analysis covers the LNK parsing vulnerabilities, detailed XDigo malware analysis, comprehensive infrastructure overview, and attribution linking current activity to historical XDSpy activities including a previously unattributed 2023 operation
Tweet media one
1
1
2
@ArielJT
Ariel Jungheit
2 months
Through hunting and pivoting, we identified the likely payload: XDigo, XDSpy's Go based malware deployed against a governmental target in Belarus. We also mapped additional infrastructure showing multiple connections and ties across past campaigns
Tweet media one
1
1
3
@ArielJT
Ariel Jungheit
2 months
Dropping new research - this time on recent #XDSpy operations. Out of hundreds of LNK files leveraging ZDI-CAN-25373, we isolated a tiny cluster using an additional LNK parsing trick, leading us to uncover a multi-stage infection chain actively targeting government entities
Tweet media one
2
20
70
@ArielJT
Ariel Jungheit
4 months
#PteroLNK is a heavily obfuscated VBScript that dynamically constructs two additional payloads during execution: a downloader and an LNK dropper that propagates through connected drives 3/4
1
1
5
@ArielJT
Ariel Jungheit
4 months
The new PteroLNK samples date back to December 2024, using DDRs that are still updated daily, pointing to new Cloudflare quick tunnels 2/4
Tweet media one
2
1
4
@ArielJT
Ariel Jungheit
4 months
We published a new report, covering #Gamaredon's #PteroLNK malware, used in a recent campaign. The Russian APT group continues active operations against Ukrainian targets through April 2025 1/4.
1
15
26
@ArielJT
Ariel Jungheit
5 months
We made a full circle from dial-up.
@ggerganov
Georgi Gerganov
5 months
Today I was sent the following cool demo:. Two AI agents on a phone call realize they’re both AI and switch to a superior audio signal ggwave
0
0
2
@ArielJT
Ariel Jungheit
6 months
Check out our latest report covering Ivanti CSA vulnerability with complete root cause analysis, detailed breakdown of ITW exploitation, overview of worldwide targets alongside comprehensive IoCs & detection rules πŸ‘‡πŸ».
Tweet card summary image
harfanglab.io
Identifier: TRR250201. Summary Between October 2024 and late January 2025, public reports described the exploitation of Ivanti CSA vulnerabilities which started Q4 2024. We share analysis results...
0
13
29
@ArielJT
Ariel Jungheit
8 months
We gave it a good shake, and our Magic 8 Ball revealed 2025's threats: .🎱 Internet fracturing & digital borders rising.🎱 Agentic AI going rogue.🎱 Truth drowning in AI bias.🎱 "meh" malware used strategically.🎱 Civil/Private cyber proxies taking center stage. and more πŸ‘‡πŸ».
1
2
9
@ArielJT
Ariel Jungheit
10 months
thisisfine.bmp.
@deedydas
Deedy
10 months
Claude just shipped β€œComputer Use” which allows an LLM to control your computer and do arbitrary things like browse websites, download and run files, and more. A slew of startups doing browser agents feel obsolete overnight. Seriously cool stuff.
0
0
1
@ArielJT
Ariel Jungheit
10 months
RT @unpacker: According to German media, North Korean-linked #Kimsuky hackers targeted Diehl Defense, a German arms company, to steal sensi….
0
51
0
@ArielJT
Ariel Jungheit
11 months
RT @ryanaraine: πŸ’” This week's show is the full keynote day remarks from Juan Andres Guerrero-Saade at #LABScon24. In this talk, Juanito a….
0
33
0