logo_itb_purple

Inside The Lab HarfangLab's tech Blog

Loading...
Banner for
CYBER THREAT INTELLIGENCE

HijackLoader evolution: abusing genuine signing certificates

Summary Since mid-September 2024, our telemetry has revealed a significant increase in “Lumma Stealer”1 malware deployments via the “HijackLoader”2 malicious loader. On October 2, 2024, HarfangLab EDR detected and blocked yet another HijackLoader deployment attempt – except this time, the…

16 min
Header image for PackXor
CYBER THREAT INTELLIGENCE

Unpacking the unpleasant FIN7 gift: PackXOR

Summary In early July 2024, the Sentinel Labs researchers released an extensive article1 about “FIN7 reboot” tooling, notably introducing “AvNeutralizer”, an anti-EDR tool. This tool has been found in the wild as a packed payload. In this article, we offer…

14 min
Banner for Cyclops: a likely replacement for BellaCiao
CYBER THREAT INTELLIGENCE

Cyclops: a likely replacement for BellaCiao

Identifier: TRR240801. Summary This report introduces Cyclops, a newly discovered and previously undocumented malware platform written in Go which dates back to December 2023, and that we believe has been deployed against targets in the Middle-East in 2024. Cyclops allows…

19 min
Doppelgänger HarfangLab Article Banner
CYBER THREAT INTELLIGENCE

Mid-year Doppelgänger information operations in Europe and the US

Identifier: TRR240701. Summary This report delves into Doppelgänger information operations conducted by Russian actors, focusing on their activities from early June to late-July 2024. Our investigation was motivated by the unexpected snap general election in France, prompting a closer look…

54 min
suspected_grasshopper_header
CYBER THREAT INTELLIGENCE

Supposed Grasshopper: operators impersonate Israeli government and private companies to deploy open-source malware

Identifier: TRR240601. Summary Hunting for malicious infrastructure possibly targeting the Israeli government, we identified a previously unreported, long-standing and suspicious domain. The latter is still active at the time of this report, and is leveraged as a command and control…

14 min
image
CYBER THREAT INTELLIGENCE

AllaSenha: AllaKore variant leverages Azure cloud C2 to steal banking details in Latin America

Identifier: TRR240501. Summary Earlier in May, our security product spotted a malicious payload, which was tentatively delivered to a computer in Brazil, via an intricate infection chain involving Python scripts and a Delphi-developed loader. The final malicious payload, that we…

29 min
MuddyWater_Ongoing_RMM_Campaign
CYBER THREAT INTELLIGENCE

MuddyWater campaign abusing Atera Agents

Identifier: TRR240402. Summary We have been closely monitoring the activities of the Iranian state-sponsored threat actor MuddyWater since the beginning of 2024. Our investigations reveal an active campaign that has been ramping up since October 2023, aligning with the Hamas…

18 min
APR31 indictment heading
CYBER THREAT INTELLIGENCE

Analysis of the APT31 indictment

Identifier: TRR240401  On March 25, 2024, the U.S. Department of Justice (DoJ) released an indictment of seven hackers associated with APT31, a “hacking group in support of China’s Ministry of State Security” (MSS) which has been active for 14 years.…

14 min
featured_raspberry_robin_emulator
CYBER THREAT INTELLIGENCE

Raspberry Robin and its new anti-emulation trick

Reported for the first time by Red Canary in 2021, Raspberry Robin was the 9th most prevalent threat in 2023 according to their “2024 Threat Detection Report”. Starting as a worm, it evolved to become an initial access broker for…

9 min
A comprehensive analysis of I-Soon's commercial offering
CYBER THREAT INTELLIGENCE

A comprehensive analysis of I-Soon’s commercial offering

Identifier: TRR240301. Key Findings I-Soon’s commercial offering reveals that their main issue is processing collected data, not breaching their targets in the first place. Their products leverage deep learning to help them sort and classify stolen documents. The company appears…

38 min
samecoin-header
CYBER THREAT INTELLIGENCE

Hamas-linked SameCoin campaign malware analysis

Identifier: TRR240201. Summary Following an X post by IntezerLab about an attack campaign that they dubbed “SameCoin”, we analyzed the samples they discovered and found a few identical variants. The infection vector appears to be an email impersonating the Israeli…

17 min
banner
CYBER THREAT INTELLIGENCE

Compromised routers are still leveraged as malicious infrastructure to target government organizations in Europe and Caucasus

Identifier: TRR240101. On 2023-12-28, the Ukrainian government computer emergency and incident response team (CERT-UA) described a malicious espionage campaign that targeted government organizations in Ukraine. CERT-UA attributed the campaign to the APT28 threat-actor (aka Sofacy, Fancy Bear, etc.). The malicious…

20 min