Ariel Jungheit

304 posts

Ariel Jungheit banner
Ariel Jungheit

Ariel Jungheit

@ArielJT

Life under the sea was so much easier | Threat Research @harfanglab | Maker | Tweets are my own

G28 X0 Y0 Z0 Katılım Mart 2009
205 Takip Edilen1.4K Takipçiler
Boris Larin
Boris Larin@oct0xor·
Heartbroken to hear about the passing of @Skvern0. He was one of the best threat hunters in the industry - even APTs were afraid of him. I’m grateful for the time we worked together and for everything I learned from him. Rest in peace.
Boris Larin tweet media
English
27
50
555
77.1K
Ariel Jungheit
Ariel Jungheit@ArielJT·
Attribution is tricky, especially with limited visibility. However, TTPs were previously associated to IMPERIAL KITTEN/TA456. We could catch slip-ups that clearly point to a Farsi-speaking actor: Telegram, (AI-generated) comments in Farsi “// دیگه چیزی برای مصرف نیست 🚩 //“. 5/
English
1
1
6
344
Ariel Jungheit
Ariel Jungheit@ArielJT·
We monitored the C2 Telegram bots and could catch what we believe are operator hands on commands. We also timelined the malware developer's git commits, which pointed to a different timezone than the one reported (Pacific Time). Nice 9-5, with a bit of late evening fixes. 4/
Ariel Jungheit tweet media
English
1
1
4
279
Ariel Jungheit
Ariel Jungheit@ArielJT·
New research uncovering a new Iranian activity cluster - "RedKitten". Spreading with a lure revolving around the Iranian protests, we found a sample of a newly developed malware we dubbed "SloppyMIO", relying on Github, Google Drive and Telegram. Very heavy on the AI 1/
English
1
8
18
2.5K
Ariel Jungheit
Ariel Jungheit@ArielJT·
SloppyMIO is a (mostly) vibecoded .NET implant compiled on the target's host. It fetches a configuration blob stenographically implanted in an AI generated kitten image, from which it extract the Telegram C2 and addresses for further modules 3/
Ariel Jungheit tweet media
English
1
1
4
291
Ariel Jungheit
Ariel Jungheit@ArielJT·
The lure is a fake list of casualties from the Iranian protests ("Tehran Forensic Medical Files"), listing gruesome details, including the "referring organization" (Basij, MOIS, IRGC) 2/
Ariel Jungheit tweet media
English
1
1
4
330
Ariel Jungheit
Ariel Jungheit@ArielJT·
Our 2026 prediction report is out!🔮 We discuss the erosion of democratic oversight in favor of business oligarchy, states taking more direct action after cyberattacks. But also on brighter note: anamorphic cryptography could be used to counter ever growing breaches and leaks 👀
English
1
0
4
337
Ariel Jungheit retweetledi
Secure Chicken 🐣
Secure Chicken 🐣@securechicken·
Anyway, we wanted to tell a bit later, but we had to rush it now, as fellows did publish about the same toolset today (as "TOLLBOOTH"). We're fewer guys but we may still have found a bit more. IOCs & Yaras: harfanglab.io/insidethelab/r…
English
0
5
16
3.1K
Ariel Jungheit retweetledi
Secure Chicken 🐣
Secure Chicken 🐣@securechicken·
Documents 📃 about alleged IRGC 🇮🇷cyber ops are being disclosed since last week (#KittenBusters). 2nd batch of data includes a reference to our work @HarfangLab: "see reports on publicly available tools (such as BellaCiao and CYCLOPS) – these are malware tools used"
English
1
5
5
2.4K
Ariel Jungheit
Ariel Jungheit@ArielJT·
New Infrastructure scripts: :URLS → Scrapes Telegraph/Telegram for tunnel URLs → Appends .trycloudflare.com → stores in :URL ADS & registry :IPS → Fetches IPs via Telegram, check-host[.]net, or ping to hardcoded C2 → stores in :IP ADS & registry
English
1
1
6
546
Ariel Jungheit
Ariel Jungheit@ArielJT·
Following our recent #Gamaredon publication, the actor upgraded their PteroLNK malware and expanded infrastructure. Key changes: - NTFS Alternative Data Streams (ADS) storage - Randomized HTTP headers breaking network sigs - Expanded tunneling services - More robust DDR approach
Ariel Jungheit tweet media
English
2
17
60
6.7K
Ariel Jungheit
Ariel Jungheit@ArielJT·
@mgreen27 We did report the issue to Yara-X and they quickly fixed it, version >v1.2.1 should be good :)
English
1
0
2
111
Matthew Green 🌻
Matthew Green 🌻@mgreen27·
This was an interesting read. I will need to update my parser it seems! 😳 I also guess fancy yarax rules targeting specific arguments will fail too :)
Ariel Jungheit@ArielJT

Dropping new research - this time on recent #XDSpy operations. Out of hundreds of LNK files leveraging ZDI-CAN-25373, we isolated a tiny cluster using an additional LNK parsing trick, leading us to uncover a multi-stage infection chain actively targeting government entities

English
1
0
5
552
Ariel Jungheit
Ariel Jungheit@ArielJT·
Our analysis covers the LNK parsing vulnerabilities, detailed XDigo malware analysis, comprehensive infrastructure overview, and attribution linking current activity to historical XDSpy activities including a previously unattributed 2023 operation
Ariel Jungheit tweet media
English
1
1
2
639
Ariel Jungheit
Ariel Jungheit@ArielJT·
Dropping new research - this time on recent #XDSpy operations. Out of hundreds of LNK files leveraging ZDI-CAN-25373, we isolated a tiny cluster using an additional LNK parsing trick, leading us to uncover a multi-stage infection chain actively targeting government entities
Ariel Jungheit tweet media
English
2
19
70
9K