Ariel Jungheit
@ArielJT
Followers
1K
Following
1K
Media
69
Statuses
294
Life under the sea was so much easier | Threat Research @harfanglab | Maker | Tweets are my own
G28 X0 Y0 Z0
Joined March 2009
Anyway, we wanted to tell a bit later, but we had to rush it now, as fellows did publish about the same toolset today (as "TOLLBOOTH"). We're fewer guys but we may still have found a bit more. IOCs & Yaras:
harfanglab.io
Identifier: TRR251001. Summary Late August and early September 2025, our security product detected the compromises of IIS servers with a previously undocumented malicious module which we call...
0
5
15
Documents ๐ about alleged IRGC ๐ฎ๐ทcyber ops are being disclosed since last week (#KittenBusters). 2nd batch of data includes a reference to our work @HarfangLab: "see reports on publicly available tools (such as BellaCiao and CYCLOPS) โ these are malware tools used"
1
5
5
New threat report is live! Get it while itโs hot ๐ฅ
We @aridjourney @ArielJT at HarfangLab had a look at archives containing weaponized XLS spreadsheets dropping C# and C++ downloaders, likely intended for targets in Ukraine and Poland
0
0
4
New tunneling services timeline: ๐๏ธ 2025-04-24: lhr[.]life ๐๏ธ 2025-05-06: serveo[.]net, workers[.]dev ๐๏ธ 2025-06-11: euw.devtunnels[.]ms Updated Yara rule alongside IoCs: https://t.co/gSDLHphCTy For more information about PteroLNK, please refer to:
harfanglab.io
Identifier: TRR250401. Proactively hunting for Russian-nexus threats, we identified samples from the Pterodo malware family, commonly associated with Gamaredon, uploaded to a public malware analysis...
0
1
9
New Infrastructure scripts: :URLS โ Scrapes Telegraph/Telegram for tunnel URLs โ Appends .trycloudflare.com โ stores in :URL ADS & registry :IPS โ Fetches IPs via Telegram, check-host[.]net, or ping to hardcoded C2 โ stores in :IP ADS & registry
1
1
6
The updated downloader now features an improved multi-tier fallback: Registry keys โ ADS โ Telegraph/Teletype DDRs โ hardcoded C2 The LNK dropper maintains core functionality with tweaked execution command.
1
1
3
The new modular malware structure: 4 VBS payloads written to ADS: :SRV - Updated downloader :LNK - LNK dropper :URLS - DDR C2 URL retrieval :IPS - DDR C2 IP retrieval/resolution :GTR - Main orchestrator (self)
1
1
4
Following our recent #Gamaredon publication, the actor upgraded their PteroLNK malware and expanded infrastructure. Key changes: - NTFS Alternative Data Streams (ADS) storage - Randomized HTTP headers breaking network sigs - Expanded tunneling services - More robust DDR approach
2
18
60
Full technical report with IoCs and Yara rules below: https://t.co/ycRyLK34H5
harfanglab.io
Identifier: TRR250601. Summary This report examines recent activities we attribute to the XDSpy threat actor, focusing on an ongoing campaign targeting Eastern European and Russian governmental...
1
1
10
Our analysis covers the LNK parsing vulnerabilities, detailed XDigo malware analysis, comprehensive infrastructure overview, and attribution linking current activity to historical XDSpy activities including a previously unattributed 2023 operation
1
1
2
Through hunting and pivoting, we identified the likely payload: XDigo, XDSpy's Go based malware deployed against a governmental target in Belarus. We also mapped additional infrastructure showing multiple connections and ties across past campaigns
1
1
3
Dropping new research - this time on recent #XDSpy operations. Out of hundreds of LNK files leveraging ZDI-CAN-25373, we isolated a tiny cluster using an additional LNK parsing trick, leading us to uncover a multi-stage infection chain actively targeting government entities
2
20
70
Full report includes actionable detection rules, hashes, and infrastructure indicators: https://t.co/BrOpeshI6d
harfanglab.io
Identifier: TRR250401. Proactively hunting for Russian-nexus threats, we identified samples from the Pterodo malware family, commonly associated with Gamaredon, uploaded to a public malware analysis...
0
7
15
The new PteroLNK samples date back to December 2024, using DDRs that are still updated daily, pointing to new Cloudflare quick tunnels 2/4
2
1
4
We published a new report, covering #Gamaredon's #PteroLNK malware, used in a recent campaign. The Russian APT group continues active operations against Ukrainian targets through April 2025 1/4
1
15
26
Check out our latest report covering Ivanti CSA vulnerability with complete root cause analysis, detailed breakdown of ITW exploitation, overview of worldwide targets alongside comprehensive IoCs & detection rules ๐๐ป https://t.co/Ng41t7inNK
harfanglab.io
Identifier: TRR250201. Summary Between October 2024 and late January 2025, public reports described the exploitation of Ivanti CSA vulnerabilities which started Q4 2024. We share analysis results...
0
13
29
We gave it a good shake, and our Magic 8 Ball revealed 2025's threats: ๐ฑ Internet fracturing & digital borders rising ๐ฑ Agentic AI going rogue ๐ฑ Truth drowning in AI bias ๐ฑ "meh" malware used strategically ๐ฑ Civil/Private cyber proxies taking center stage ...and more ๐๐ป
1
2
9