Attribution to Dragonfly instead of Sandworm was quite a plot twist! cert.pl/en/posts/202...
30.01.2026 10:55 β π 12 π 6 π¬ 1 π 0@aridjourney.bsky.social
Threat research at HarfangLab. Opinions are my own.
Attribution to Dragonfly instead of Sandworm was quite a plot twist! cert.pl/en/posts/202...
30.01.2026 10:55 β π 12 π 6 π¬ 1 π 0#BREAKING #ESETresearch provides technical details on #DynoWiper, a dataβwiping malware used in a dataβdestruction incident on December 29, 2025, affecting a company in Polandβs energy sector. www.welivesecurity.com/en/eset-rese... 1/5
30.01.2026 10:29 β π 11 π 9 π¬ 1 π 1Attribution is tricky, especially with limited visibility. However, TTPs were previously associated to IMPERIAL KITTEN/TA456. We could catch slip-ups that clearly point to a Farsi-speaking actor: (AI-generated) comments in Farsi β// Ψ―ΫΪ―Ω ΪΫΨ²Ϋ Ψ¨Ψ±Ψ§Ϋ Ω
Ψ΅Ψ±Ω ΩΫΨ³Ψͺ π© //β.
5/
harfanglab.io/insidethelab...
We monitored the C2 Telegram bots and could catch what we believe are operator hands on commands. We also timelined the malware developer's git commits, which pointed to a different timezone than the one reported (Pacific Time). Nice 9-5, with a bit of late evening fixes. 4/
29.01.2026 12:16 β π 0 π 0 π¬ 1 π 0SloppyMIO is a (mostly) vibecoded .NET implant compiled on the target's host. It fetches a configuration blob stenographically implanted in an AI generated kitten image, from which it extract the Telegram C2 and addresses for further modules 3/
29.01.2026 12:16 β π 0 π 0 π¬ 1 π 0The lure is a fake list of casualties from the Iranian protests ("Tehran Forensic Medical Files"), listing gruesome details, including the "referring organization" (Basij, MOIS, IRGC) 2/
29.01.2026 12:16 β π 0 π 0 π¬ 1 π 0New research uncovering a new Iranian activity cluster - "RedKitten". Spreading with a lure revolving around the Iranian protests, we found a sample of a newly developed malware we dubbed "SloppyMIO", relying on Github, Google Drive and Telegram. Very heavy on the AI 1/
29.01.2026 12:16 β π 0 π 0 π¬ 1 π 0#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malwareβs design clearly indicates destructive intent. 1/5
23.01.2026 16:30 β π 35 π 30 π¬ 1 π 5As usual, you will find IOCs and YARA rules on our blog post and on our GitHub repository.
harfanglab.io/insidethelab...
We found striking similarities with previously reported activity from UNC1151, sometimes referred to as UAC-0057, FrostyNeighbor or Ghostwriter.
20.08.2025 12:38 β π 2 π 0 π¬ 1 π 0These downloaders attempt to retrieve next-stage malware from C2 URLs mimicking existing content and delivering JPEG image files.
An exception: some samples use a well-known cloud-hosted collaboration service for C2 communication.
Recently, our team at HarfangLab had a look at samples of archives containing weaponized XLS spreadsheets which drop C# and C++ downloaders, and likely intended to be delivered to targets in Ukraine and in Poland.
20.08.2025 12:38 β π 2 π 0 π¬ 1 π 0New tunneling services timeline:
ποΈ 2025-04-24: lhr[.]life
ποΈ 2025-05-06: serveo[.]net, workers[.]dev
ποΈ 2025-06-11: euw.devtunnels[.]ms
Updated Yara rule alongside IoCs: github.com/HarfangLab/i...
For more information about PteroLNK, please refer to:
harfanglab.io/insidethelab...
New Infrastructure scripts:
:URLS β Scrapes Telegraph/Telegram for tunnel URLs β Appends .trycloudflare.com β stores in :URL ADS & registry
:IPS β Fetches IPs via Telegram, check-host[.]net, or ping to hardcoded C2 β stores in :IP ADS & registry
The updated downloader now features an improved multi-tier fallback: Registry keys β ADS β Telegraph/Teletype DDRs β hardcoded C2
The LNK dropper maintains core functionality with tweaked execution command.
The new modular malware structure: 4 VBS payloads written to ADS:
:SRV - Updated downloader
:LNK - LNK dropper
:URLS - DDR C2 URL retrieval
:IPS - DDR C2 IP retrieval/resolution
:GTR - Main orchestrator (self)
Following our recent #Gamaredon publication, the actor upgraded their PteroLNK malware and expanded infrastructure. Key changes:
- NTFS Alternative Data Streams (ADS) storage
- Randomized HTTP headers breaking network sigs
- Expanded tunneling services
- More robust DDR approach
Full technical report with IoCs and Yara rules below:
t.co/ycRyLK34H5
Our analysis covers the LNK parsing vulnerabilities, detailed XDigo malware analysis, comprehensive infrastructure overview, and attribution linking current activity to historical XDSpy activities including a previously unattributed 2023 operation
16.06.2025 12:51 β π 0 π 0 π¬ 1 π 0Through hunting and pivoting, we identified the likely payload: XDigo, XDSpy's Go based malware deployed against a governmental target in Belarus. We also mapped additional infrastructure showing multiple connections and ties across past campaigns
16.06.2025 12:51 β π 0 π 0 π¬ 1 π 0Dropping new research - this time on recent #XDSpy operations. Out of hundreds of LNK files leveraging ZDI-CAN-25373, we isolated a tiny cluster using an additional LNK parsing trick, leading us to uncover a multi-stage infection chain actively targeting government entities
16.06.2025 12:51 β π 1 π 1 π¬ 1 π 0