Inside The Lab HarfangLab's tech Blog

Loading...
Header image for PackXor

Unpacking the unpleasant FIN7 gift: PackXOR

Summary In early July 2024, the Sentinel Labs researchers released an extensive article1 about “FIN7 reboot” tooling, notably introducing “AvNeutralizer”, an anti-EDR tool. This tool has been found in the wild as a packed payload. In this article, we offer…

Read more
14min
CYBER THREAT INTELLIGENCE
Banner for Cyclops: a likely replacement for BellaCiao

Cyclops: a likely replacement for BellaCiao

Identifier: TRR240801. Summary This report introduces Cyclops, a newly discovered and previously undocumented malware platform written in Go which dates back to December 2023, and that we believe has been deployed against targets in the Middle-East in 2024. Cyclops allows…

Read more
19min
CYBER THREAT INTELLIGENCE
Doppelgänger HarfangLab Article Banner

Mid-year Doppelgänger information operations in Europe and the US

Identifier: TRR240701. Summary This report delves into Doppelgänger information operations conducted by Russian actors, focusing on their activities from early June to late-July 2024. Our investigation was motivated by the unexpected snap general election in France, prompting a closer look…

Read more
54min
CYBER THREAT INTELLIGENCE
suspected_grasshopper_header

Supposed Grasshopper: operators impersonate Israeli government and private companies to deploy open-source malware

Identifier: TRR240601. Summary Hunting for malicious infrastructure possibly targeting the Israeli government, we identified a previously unreported, long-standing and suspicious domain. The latter is still active at the time of this report, and is leveraged as a command and control…

Read more
14min
CYBER THREAT INTELLIGENCE
image

AllaSenha: AllaKore variant leverages Azure cloud C2 to steal banking details in Latin America

Identifier: TRR240501. Summary Earlier in May, our security product spotted a malicious payload, which was tentatively delivered to a computer in Brazil, via an intricate infection chain involving Python scripts and a Delphi-developed loader. The final malicious payload, that we…

Read more
29min
CYBER THREAT INTELLIGENCE
MuddyWater_Ongoing_RMM_Campaign

MuddyWater campaign abusing Atera Agents

Identifier: TRR240402. Summary We have been closely monitoring the activities of the Iranian state-sponsored threat actor MuddyWater since the beginning of 2024. Our investigations reveal an active campaign that has been ramping up since October 2023, aligning with the Hamas…

Read more
18min
CYBER THREAT INTELLIGENCE
APR31 indictment heading

Analysis of the APT31 indictment

Identifier: TRR240401  On March 25, 2024, the U.S. Department of Justice (DoJ) released an indictment of seven hackers associated with APT31, a “hacking group in support of China’s Ministry of State Security” (MSS) which has been active for 14 years.…

Read more
14min
CYBER THREAT INTELLIGENCE
featured_raspberry_robin_emulator

Raspberry Robin and its new anti-emulation trick

Reported for the first time by Red Canary in 2021, Raspberry Robin was the 9th most prevalent threat in 2023 according to their “2024 Threat Detection Report”. Starting as a worm, it evolved to become an initial access broker for…

Read more
9min
CYBER THREAT INTELLIGENCE
A comprehensive analysis of I-Soon's commercial offering

A comprehensive analysis of I-Soon’s commercial offering

Identifier: TRR240301. Key Findings I-Soon’s commercial offering reveals that their main issue is processing collected data, not breaching their targets in the first place. Their products leverage deep learning to help them sort and classify stolen documents. The company appears…

Read more
38min
CYBER THREAT INTELLIGENCE
samecoin-header

Hamas-linked SameCoin campaign malware analysis

Identifier: TRR240201. Summary Following an X post by IntezerLab about an attack campaign that they dubbed “SameCoin”, we analyzed the samples they discovered and found a few identical variants. The infection vector appears to be an email impersonating the Israeli…

Read more
17min
CYBER THREAT INTELLIGENCE
banner

Compromised routers are still leveraged as malicious infrastructure to target government organizations in Europe and Caucasus

Identifier: TRR240101. On 2023-12-28, the Ukrainian government computer emergency and incident response team (CERT-UA) described a malicious espionage campaign that targeted government organizations in Ukraine. CERT-UA attributed the campaign to the APT28 threat-actor (aka Sofacy, Fancy Bear, etc.). The malicious…

Read more
20min
CYBER THREAT INTELLIGENCE