Secure Chicken ๐Ÿฃ

80 posts

Secure Chicken ๐Ÿฃ banner
Secure Chicken ๐Ÿฃ

Secure Chicken ๐Ÿฃ

@securechicken

Rural cybersecurity practitioner and seasoned brewer. Opinions are my own, I work @HarfangLab (former GREAT, CISO and FR Gov).

France ๊ฐ€์ž…์ผ ลžubat 2020
85 ํŒ”๋กœ์ž‰474 ํŒ”๋กœ์›Œ
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
Yet they do. In 2026 we expect a new lot of unwanted - sometimes avoidable - developments in cyberspace. After a full review of last year's predictions, our HarfangLab 2026 Threatscape report anticipates 9 trends and threats ๐Ÿ”ฆ. harfanglab.io/insidethelab/2โ€ฆ
English
0
0
1
88
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
2026 starts with abduction๐Ÿฅท, massive protestsโœŠ and intentions to dispose๐ŸงŠ, on top of tensions + wars๐Ÿช– we got out of 2025 with - cyber ppl are humbly reminded of the quite minor role cyber threats๐Ÿ’พplay in global risks and changes.
English
1
0
2
83
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
Mails can contain invitation to online meeting (ie MS Teams), but link is replaced to trick the user into signing-in (using MS device code flow which requires a manually entered and TA-generated code). Similar campaigns and TTPS previously documentd by Volexity and Elastic.
English
0
0
2
196
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
Up to now we identified tgts in NGOs and think-tanks. In december, threat actor notably leveraged an online profile using "Janis Cerny" name, who pretends to be a diplomat working with the EU. Mail is janiscerny[@]seznam[.]cz, and WhatsApp profile/number is [+42]0 735 596 5[65]
English
1
0
2
182
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
Likely state-sponsored TA still targeting orgs with WhatsApp๐Ÿคณ + mail ๐Ÿ“ฉ phishing in ๐Ÿ‡ช๐Ÿ‡บ in December. Goal is to get access to the MS account of high value targets. TA is particularly interested in people or organisations that run activities in ๐Ÿ‡บ๐Ÿ‡ฆ
English
1
1
2
503
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
@bluish_red_ @_CPResearch_ @harfanglab Finding hints of access dev wave A in several cases of org B exploitation is then likely. 4th parties can always join, but for me it's more likely A+B somehow cooperate, or in a large ecosystem, just that 2 streams going the same direction ended up in the same place.
English
1
0
1
99
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
@bluish_red_ @_CPResearch_ @harfanglab Looking in a single ecosystem: accesses can be opportunistically developed. Those can then be used separetely based on ops need: turned into infra, sold, used for exploitation, or combination of such. By same or cooperating party. Several streams of such can flow simultaneously.
English
1
0
1
86
Seth
Seth@bluish_red_ยท
Cool write-up! REF7707 (another new alias #InkDragon) is again expanding operations. With this report we are now up to Southeast Asia, Africa, Europe, Russia, South America. I believe this is the first time i've seen the ShadowPad link as well.
Check Point Research@_CPResearch_

China-linked #InkDragon expands into Europe, building a distributed relay network by weaponizing compromised servers with a custom #ShadowPad IIS listener alongside new TTPs and an evolved FinalDraft.research.checkpoint.com/2025/ink-dragoโ€ฆ

English
1
4
10
2.3K
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
Anyway, we wanted to tell a bit later, but we had to rush it now, as fellows did publish about the same toolset today (as "TOLLBOOTH"). We're fewer guys but we may still have found a bit more. IOCs & Yaras: harfanglab.io/insidethelab/rโ€ฆ
English
0
5
16
3.1K
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
All tools speak CN, operators leveraged a CN RMM service, domains are registered in CN and some infra is at Alibaba Cloud - it's likely way more CN-language and specifics than an actual CN operator would need...
English
1
0
2
353
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
Late summer our stuff stopped an infection chain involving a driver, a previously undocumented malicious IIS module, and ASP .NET viewstate abuse.
English
1
3
9
4.4K
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
Because of simplicity of associated exploitation and tools, several third parties could have hijacked and/or mimicked past or recent BellaCiao/CYCLOPS-related activity and infrastructure... but it starts to quacks quite like a duck ๐Ÿฆ† to me. harfanglab.io/insidethelab/cโ€ฆ
English
0
0
3
196
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
"ea3e059ca58eec16a98691bcae372170d83b97c0_Shell failed[.]txt" contains WebShell filenames which match those dropped by some BellaCiao samples. Several IPs and domains that are listed as "targets" in Episodes 1 and 2 indeed match targets of BellaCiao malware that I know of.
English
1
0
2
187
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
Documents ๐Ÿ“ƒ about alleged IRGC ๐Ÿ‡ฎ๐Ÿ‡ทcyber ops are being disclosed since last week (#KittenBusters). 2nd batch of data includes a reference to our work @HarfangLab: "see reports on publicly available tools (such as BellaCiao and CYCLOPS) โ€“ these are malware tools used"
English
1
5
5
2.4K
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
We found striking similarities with previously reported activity from UNC1151, sometimes referred to as UAC-0057, FrostyNeighbor or Ghostwriter
English
1
0
2
608
Secure Chicken ๐Ÿฃ
Secure Chicken ๐Ÿฃ@securechickenยท
We @aridjourney @ArielJT at HarfangLab had a look at archives containing weaponized XLS spreadsheets dropping C# and C++ downloaders, likely intended for targets in Ukraine and Poland
English
1
6
12
4.6K