securechicken Profile Banner
Secure Chicken ๐Ÿฃ Profile
Secure Chicken ๐Ÿฃ

@securechicken

Followers
468
Following
68
Media
2
Statuses
71

Rural cybersecurity practitioner and seasoned brewer. Opinions are my own, I work @HarfangLab (former GREAT, CISO and FR Gov).

France
Joined February 2020
Don't wanna be here? Send us removal request.
@securechicken
Secure Chicken ๐Ÿฃ
16 days
Anyway, we wanted to tell a bit later, but we had to rush it now, as fellows did publish about the same toolset today (as "TOLLBOOTH"). We're fewer guys but we may still have found a bit more. IOCs & Yaras:
Tweet card summary image
harfanglab.io
Identifier: TRR251001. Summary Late August and early September 2025, our security product detected the compromises of IIS servers with a previously undocumented malicious module which we call...
0
5
15
@securechicken
Secure Chicken ๐Ÿฃ
16 days
All tools speak CN, operators leveraged a CN RMM service, domains are registered in CN and some infra is at Alibaba Cloud - it's likely way more CN-language and specifics than an actual CN operator would need...
1
0
2
@securechicken
Secure Chicken ๐Ÿฃ
16 days
But malicious module is updated, exists in different flavours (C++/.NET/PHP) and compromised hundreds of servers in quite short time. Also, it actually exposes an unauthenticated RCE capability to... well, everyone. Very convenient for infra development - this could be an IAB.
1
0
2
@securechicken
Secure Chicken ๐Ÿฃ
16 days
We followed the rabbit ๐Ÿ‡ - or panda, whatever. Driver is a sample of a publicly-available rootkit, operators deploy ready-made toolset, a remote-desktop access, and are noisy ๐Ÿ“ข ... We thought financially motivated SEO abuse.
1
0
3
@securechicken
Secure Chicken ๐Ÿฃ
16 days
Late summer our stuff stopped an infection chain involving a driver, a previously undocumented malicious IIS module, and ASP .NET viewstate abuse.
1
3
9
@securechicken
Secure Chicken ๐Ÿฃ
1 month
Because of simplicity of associated exploitation and tools, several third parties could have hijacked and/or mimicked past or recent BellaCiao/CYCLOPS-related activity and infrastructure... but it starts to quacks quite like a duck ๐Ÿฆ† to me. https://t.co/tnPDgAO1sg
Tweet card summary image
harfanglab.io
Discover Cyclops, a Go-based malware linked to APT 35, targeting the Middle East in 2024. Learn how this HTTP REST-controlled platform poses cyber threats.
0
0
3
@securechicken
Secure Chicken ๐Ÿฃ
1 month
"ea3e059ca58eec16a98691bcae372170d83b97c0_Shell failed[.]txt" contains WebShell filenames which match those dropped by some BellaCiao samples. Several IPs and domains that are listed as "targets" in Episodes 1 and 2 indeed match targets of BellaCiao malware that I know of.
1
0
2
@securechicken
Secure Chicken ๐Ÿฃ
1 month
"Episode 2/Malwares and Logs/zsh_history[.]txt" contains commands to connect to IP addresses that we identified as CYCLOPS C2 servers, login we could find in CYCLOPS configurations, and ref. to exploitation tools or techniques that match guessed infection chain
1
0
2
@securechicken
Secure Chicken ๐Ÿฃ
1 month
There was no communication ๐Ÿ“ต with KittenBusters and we cannot confirm that these documents are genuine, but from a quick look at it ๐Ÿ”Ž:
1
0
1
@securechicken
Secure Chicken ๐Ÿฃ
1 month
Documents ๐Ÿ“ƒ about alleged IRGC ๐Ÿ‡ฎ๐Ÿ‡ทcyber ops are being disclosed since last week (#KittenBusters). 2nd batch of data includes a reference to our work @HarfangLab: "see reports on publicly available tools (such as BellaCiao and CYCLOPS) โ€“ these are malware tools used"
1
5
5
@securechicken
Secure Chicken ๐Ÿฃ
3 months
We found striking similarities with previously reported activity from UNC1151, sometimes referred to as UAC-0057, FrostyNeighbor or Ghostwriter
1
0
2
@securechicken
Secure Chicken ๐Ÿฃ
3 months
These downloaders attempt to retrieve next stage from C2 URLs mimicking existing content and delivering JPEG image files. Some variants use Slack for C2 communication
1
1
6
@securechicken
Secure Chicken ๐Ÿฃ
3 months
We @aridjourney @ArielJT at HarfangLab had a look at archives containing weaponized XLS spreadsheets dropping C# and C++ downloaders, likely intended for targets in Ukraine and Poland
1
6
13
@securechicken
Secure Chicken ๐Ÿฃ
5 months
I have never heard about the "XDSpy" threat actor ๐Ÿ‘พ before, but it turns out I tripped over a Windows shortcut in March and... ๐Ÿคทโ€โ™‚๏ธ we had to "take a look". https://t.co/ADS2FvkcDg
Tweet card summary image
harfanglab.io
Identifier: TRR250601. Summary This report examines recent activities we attribute to the XDSpy threat actor, focusing on an ongoing campaign targeting Eastern European and Russian governmental...
0
1
4
@securechicken
Secure Chicken ๐Ÿฃ
9 months
I like a vulnerability analysis ๐Ÿ”ฌ as I like a scotch ๐Ÿฅƒ: old enough to order its own scotch... Ivanti CVE-2024-8963 vuln analysis + unique report of malicious activities after exploitation:
Tweet card summary image
harfanglab.io
Identifier: TRR250201. Summary Between October 2024 and late January 2025, public reports described the exploitation of Ivanti CSA vulnerabilities which started Q4 2024. We share analysis results...
0
2
3
@securechicken
Secure Chicken ๐Ÿฃ
1 year
Did our bit on #Doppelgรคnger: standalone paper w/ new infra, ongoing activity inc. Paris #Olympics, tech details, content analysis, links to grey SEO... BTW we're a 3-people show @ArielJT @JusticeRage
harfanglab.io
1
1
8
@securechicken
Secure Chicken ๐Ÿฃ
1 year
Turns out it is now explicitly detected as #FrostyGoop by some vendors, so might actually be it https://t.co/ay1gBLDAN6
@Now_on_VT
Is Now on VT!
1 year
A few AV detections are starting to appear for the #FrostyGoop samples found by @securechicken
1
0
1
@securechicken
Secure Chicken ๐Ÿฃ
1 year
Not sure it's any of them though. They all contain the "/CleintTCP" typo string, which does not appear to belong to the modbus library repository, and that I could only find in 7 Golang binaries. 4/4
0
1
5