Secure Chicken ๐ฃ
@securechicken
Followers
468
Following
68
Media
2
Statuses
71
Rural cybersecurity practitioner and seasoned brewer. Opinions are my own, I work @HarfangLab (former GREAT, CISO and FR Gov).
France
Joined February 2020
Anyway, we wanted to tell a bit later, but we had to rush it now, as fellows did publish about the same toolset today (as "TOLLBOOTH"). We're fewer guys but we may still have found a bit more. IOCs & Yaras:
harfanglab.io
Identifier: TRR251001. Summary Late August and early September 2025, our security product detected the compromises of IIS servers with a previously undocumented malicious module which we call...
0
5
15
All tools speak CN, operators leveraged a CN RMM service, domains are registered in CN and some infra is at Alibaba Cloud - it's likely way more CN-language and specifics than an actual CN operator would need...
1
0
2
But malicious module is updated, exists in different flavours (C++/.NET/PHP) and compromised hundreds of servers in quite short time. Also, it actually exposes an unauthenticated RCE capability to... well, everyone. Very convenient for infra development - this could be an IAB.
1
0
2
We followed the rabbit ๐ - or panda, whatever. Driver is a sample of a publicly-available rootkit, operators deploy ready-made toolset, a remote-desktop access, and are noisy ๐ข ... We thought financially motivated SEO abuse.
1
0
3
Late summer our stuff stopped an infection chain involving a driver, a previously undocumented malicious IIS module, and ASP .NET viewstate abuse.
1
3
9
Because of simplicity of associated exploitation and tools, several third parties could have hijacked and/or mimicked past or recent BellaCiao/CYCLOPS-related activity and infrastructure... but it starts to quacks quite like a duck ๐ฆ to me. https://t.co/tnPDgAO1sg
harfanglab.io
Discover Cyclops, a Go-based malware linked to APT 35, targeting the Middle East in 2024. Learn how this HTTP REST-controlled platform poses cyber threats.
0
0
3
"ea3e059ca58eec16a98691bcae372170d83b97c0_Shell failed[.]txt" contains WebShell filenames which match those dropped by some BellaCiao samples. Several IPs and domains that are listed as "targets" in Episodes 1 and 2 indeed match targets of BellaCiao malware that I know of.
1
0
2
"Episode 2/Malwares and Logs/zsh_history[.]txt" contains commands to connect to IP addresses that we identified as CYCLOPS C2 servers, login we could find in CYCLOPS configurations, and ref. to exploitation tools or techniques that match guessed infection chain
1
0
2
There was no communication ๐ต with KittenBusters and we cannot confirm that these documents are genuine, but from a quick look at it ๐:
1
0
1
Documents ๐ about alleged IRGC ๐ฎ๐ทcyber ops are being disclosed since last week (#KittenBusters). 2nd batch of data includes a reference to our work @HarfangLab: "see reports on publicly available tools (such as BellaCiao and CYCLOPS) โ these are malware tools used"
1
5
5
As usual, you'll will find IOCs and YARA rules on our blog post and on our GitHub repository https://t.co/gAZqQVk8oQ
harfanglab.io
Identifier: TRR250801. Summary In late July, we identified two clusters of malicious archives that were leveraged to target Ukraine and Poland since April 2025, and that we could link together from...
0
6
11
We found striking similarities with previously reported activity from UNC1151, sometimes referred to as UAC-0057, FrostyNeighbor or Ghostwriter
1
0
2
These downloaders attempt to retrieve next stage from C2 URLs mimicking existing content and delivering JPEG image files. Some variants use Slack for C2 communication
1
1
6
We @aridjourney @ArielJT at HarfangLab had a look at archives containing weaponized XLS spreadsheets dropping C# and C++ downloaders, likely intended for targets in Ukraine and Poland
1
6
13
I have never heard about the "XDSpy" threat actor ๐พ before, but it turns out I tripped over a Windows shortcut in March and... ๐คทโโ๏ธ we had to "take a look". https://t.co/ADS2FvkcDg
harfanglab.io
Identifier: TRR250601. Summary This report examines recent activities we attribute to the XDSpy threat actor, focusing on an ongoing campaign targeting Eastern European and Russian governmental...
0
1
4
I like a vulnerability analysis ๐ฌ as I like a scotch ๐ฅ: old enough to order its own scotch... Ivanti CVE-2024-8963 vuln analysis + unique report of malicious activities after exploitation:
harfanglab.io
Identifier: TRR250201. Summary Between October 2024 and late January 2025, public reports described the exploitation of Ivanti CSA vulnerabilities which started Q4 2024. We share analysis results...
0
2
3
Everyone be looking for #CharmingKitten these days. Here, previously undocumented #Cyclops Golang implant, likely replacement for #BellaCiao. With @JusticeRage @ArielJT
harfanglab.io
Discover Cyclops, a Go-based malware linked to APT 35, targeting the Middle East in 2024. Learn how this HTTP REST-controlled platform poses cyber threats.
0
1
6
Did our bit on #Doppelgรคnger: standalone paper w/ new infra, ongoing activity inc. Paris #Olympics, tech details, content analysis, links to grey SEO... BTW we're a 3-people show @ArielJT @JusticeRage
harfanglab.io
1
1
8
Turns out it is now explicitly detected as #FrostyGoop by some vendors, so might actually be it https://t.co/ay1gBLDAN6
1
0
1
Not sure it's any of them though. They all contain the "/CleintTCP" typo string, which does not appear to belong to the modbus library repository, and that I could only find in 7 Golang binaries. 4/4
0
1
5