
Secure Chicken 🐣
@securechicken
Followers
435
Following
66
Media
2
Statuses
57
Rural cybersecurity practitioner and seasoned brewer. Opinions are my own, I work @HarfangLab (former GREAT, CISO and FR Gov).
France
Joined February 2020
I have never heard about the "XDSpy" threat actor 👾 before, but it turns out I tripped over a Windows shortcut in March and. 🤷♂️ we had to "take a look".
harfanglab.io
Identifier: TRR250601. Summary This report examines recent activities we attribute to the XDSpy threat actor, focusing on an ongoing campaign targeting Eastern European and Russian governmental...
0
1
4
I like a vulnerability analysis 🔬 as I like a scotch 🥃: old enough to order its own scotch. Ivanti CVE-2024-8963 vuln analysis + unique report of malicious activities after exploitation:
harfanglab.io
Identifier: TRR250201. Summary Between October 2024 and late January 2025, public reports described the exploitation of Ivanti CSA vulnerabilities which started Q4 2024. We share analysis results...
0
2
3
Everyone be looking for #CharmingKitten these days. Here, previously undocumented #Cyclops Golang implant, likely replacement for #BellaCiao. With @JusticeRage @ArielJT
harfanglab.io
Discover Cyclops, a Go-based malware linked to APT 35, targeting the Middle East in 2024. Learn how this HTTP REST-controlled platform poses cyber threats.
0
1
6
Did our bit on #Doppelgänger: standalone paper w/ new infra, ongoing activity inc. Paris #Olympics, tech details, content analysis, links to grey SEO. BTW we're a 3-people show @ArielJT @JusticeRage
harfanglab.io
1
1
8
Turns out it is now explicitly detected as #FrostyGoop by some vendors, so might actually be it.
1
0
1
Searching for those strings in public files repositories, maybe using #Yara , you would find 5d2e4fd08f81e3b2eb2f3eaae16eb32ae02e760afc36fa17f4649322f6da53fb and a63ba88ad869085f1625729708ba65e87f5b37d7be9153b3db1a1b0e3fed309c 3/4.
4
3
13
You went through marketing form to read about #FrostyGoop ( from @DragosInc, then are disappointed to find ZERO IOC, like @craiu and me? 1/4.
1
3
10
6 suspicious domains impersonating 🇺🇲, 🇩🇪, 🇵🇱 and 🇫🇷 websites, found while hunting for #Doppelgänger activities, registered in July. I believe they are made ready for ongoing (but not retrieved) or future fabricated content publication - 1/2.
1
4
6
RT @JusticeRage: .@securechicken and I just released a major update on Tomiris, with some important implications for attribution. https://t….
securelist.com
In this blog post, we’re excited to share what we now know of Tomiris with the broader community, and discuss further evidence of a possible connection to Turla.
0
18
0
RT @jeffespo: A look at how #SOC analysts can use the IOC that are commonly shared in #infosec Twitter and also TI reports from @securechic….
0
1
0
RT @Kaspersky_Gov: JOIN us virtually to discuss the cross-border cooperation to protect critical infrastructure at @igf_2021 ➡️ https://t.….
0
2
0
RT @vkamluk: @TheSAScon sets new standards every year. This time it’s a new standard of remote participation in a conference: bring your co….
0
3
0
RT @e_kaspersky: Planning for #TheSAS2021. ☑️ Agenda.🛫 nope. next year.☑️APT research.☑️ Sign up. I feel like something is missing. ….
0
8
0
Pff, I don’t need no SIEM, I have checklogs :D Humble effort at making Pi-hole logs grep a bit easier, to search for IOCs. #Pihole #IOC #DNS
github.com
An helper script to check Pi-hole logs for given network IOCs (domains/FQDNs, or IPs) - securechicken/pihole-checklogs
0
6
13