SentinelLABS's Avatar

SentinelLABS

@sentinellabs

We are the Threat Intelligence and Malware Analysis team of @sentinelone.com https://sentinellabs.com https://labscon.io

271
Followers
20
Following
26
Posts
14.11.2024
Joined
Posts Following

Latest posts by SentinelLABS @sentinellabs

πŸ”₯ πŸ‘€ New research from @morecoffeeplz.bsky.social
and @silascutler.bsky.social on the "silent" AI network, a massive, unmanaged layer of open-source AI infrastructure operating in the shadows.

29.01.2026 16:42 πŸ‘ 4 πŸ” 1 πŸ’¬ 1 πŸ“Œ 1
Preview
Inside the LLM | Understanding AI & the Mechanics of Modern Attacks Learn how attackers exploit tokenization, embeddings and LLM attention mechanisms to bypass LLM security filters and hijack model behavior.

βœ… #LLM literacy is table stakes for defenders, CTI analysts, and #cybersecurity professionals of all stripes now.
Still looking for a way into this complex field? πŸ€”
LABS has got you covered!
Start here:
s1.ai/inside-llm-1
@sentinelone.com

13.01.2026 16:44 πŸ‘ 4 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
PhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation SentinelLABS uncovers a coordinated spearphishing campaign targeting organizations critical to Ukraine's war relief efforts.

πŸ”₯ New Research from @hegel.bsky.social πŸ”₯

PhantomCaptcha: A short-lived, multi-stage PowerShell and WebSocket RAT operation targeting Ukraine-linked humanitarian and government entities.

Full report: s1.ai/pcapt

22.10.2025 22:46 πŸ‘ 4 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
Prompts as Code & Embedded Keys | The Hunt for LLM-Enabled Malware LLM-enabled malware poses new challenges for detection. SentinelLABS presents groundbreaking research on how to hunt for this new class of threats.

πŸ”₯πŸ”₯ Fresh research drop live from #labscon Arizona. @alex.leetnoob.com and @morecoffeeplz.bsky.social with @vkamluk.bsky.social
The Hunt for LLM-enabled malware #ai #cyber #threatintel
s1.ai/llm-mw

19.09.2025 17:07 πŸ‘ 4 πŸ” 4 πŸ’¬ 0 πŸ“Œ 0

Reddit AMA with our very own @dakotaindc.bsky.socialβ€”ask him anything here: www.reddit.com/r/geopolitic...

13.09.2025 21:42 πŸ‘ 4 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms DPRK-aligned threat actors abuse CTI platforms to detect infrastructure exposure and scout for new assets.

🚨New research drop: Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms

It was a pleasure collaborating with Sreekar Madabushi and @kennethkinion.bsky.social from Validin!

Read our blog post: s1.ai/nk-ops

04.09.2025 10:33 πŸ‘ 10 πŸ” 6 πŸ’¬ 1 πŸ“Œ 0
Preview
Threat Hunting World Championship 2025 | SentinelOne Win from a $100K prize pool in SentinelOne’s 2025 Threat Hunting Championship. Compete in detection challenges. Register today!

πŸ† Bragging rights, a $100K Prize Pool, and an all-expenses-paid trip to SentinelOne’s OneCon conference in Las Vegas. 🎰 Step up, test your skills, and claim your crown πŸ‘‘

Sign up below (includes details on terms and conditions):

26.08.2025 19:16 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
China’s Covert Capabilities | Silk Spun From Hafnium China-linked hackers used patented spyware tech from front companies tied to Hafnium, exposing gaps in cyber threat attribution.

The Cyber Patents China Didn’t Want Us to Find: @dakotaindc.bsky.social and @sentinellabs.bsky.social uncovered 10+ patents for highly intrusive forensics and data collection toolsβ€”filed by companies named in U.S. gov't. indictments for working with the Chinese Hafnium (aka Silk Typhoon) APT group.

25.08.2025 19:29 πŸ‘ 3 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Preview
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem PXA Stealer uses advanced evasion and Telegram C2 to steal global victim data, fueling a thriving cybercrime market.

πŸ”₯ Fresh from the LABS team and our friends at Beazley Security πŸ‘‡https://www.sentinelone.com/labs/ghost-in-the-zip-new-pxa-stealer-and-its-telegram-powered-ecosystem/

06.08.2025 13:55 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
BSL - Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem

Our team collaborated with our friends at @sentinellabs.bsky.social to identify and disrupt a PXA infostealer campaign that has an intricate and complex delivery chain:

labs.beazley.security/articles/gho...

Thanks for the fantastic collab SentinelLabs team!

04.08.2025 17:58 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
China’s Covert Capabilities | Silk Spun From Hafnium China-linked hackers used patented spyware tech from front companies tied to Hafnium, exposing gaps in cyber threat attribution.

πŸŒ€πŸ”₯… the complex relationship btw CN APTsπŸ•΅οΈβ€β™‚οΈ and CN PSOAs πŸ‡¨πŸ‡³ makes attribution even more challenging than defenders might have supposed. #cti #threatintel #hafnium #silktyphoon @dakotaindc.bsky.social

www.sentinelone.com/labs/chinas-...

30.07.2025 14:25 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Microsoft Sharepoint Security Crisis: Faulty Patches, Zero-Day Exploits
Microsoft Sharepoint Security Crisis: Faulty Patches, Zero-Day Exploits YouTube video by Three Buddy Problem

This week's show is YouTube ready @craiu.bsky.social @jags.bsky.social

πŸ”₯ Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days

youtu.be/3GJuVGmpexA

27.07.2025 12:47 πŸ‘ 8 πŸ” 4 πŸ’¬ 0 πŸ“Œ 0

⚠️ #0-DAY #Microsoft
πŸ‘Ύ #CVE-2025-53770
πŸ”© #ToolShell πŸͺ
bsky.app/profile/sent...

27.07.2025 13:05 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App ZuRu malware continues to prey on macOS users seeking legitimate business tools, adapting its loader and C2 techniques to backdoor its targets.

πŸ‘€ Apple: β€œmacOS is secure by design.”
πŸ’» Meanwhile, in /Users/Shared:
πŸ•΅οΈβ€β™‚οΈ Persistent Malware masquerading as Apple β€œagent”
>> Khepri beacon in /tmp
πŸ“¦ Ad-hoc signed payloads
🌍 Targeting Chinese diaspora
Deep dive from Dinesh Devadoss and me πŸ‘‰ s1.ai/zuru
#icymi #macOS #malware #APT #infosec

27.07.2025 12:16 πŸ‘ 8 πŸ” 6 πŸ’¬ 1 πŸ“Œ 0
Preview
macOS NimDoor | DPRK Threat Actors Target Web3 and Crypto Platforms with Nim-Based Malware NimDoor reflects a leap in DPRK’s offensive toolkit, mixing compile-time trickery with native scripting to complicate and deter analysis.

πŸ’₯ Fresh from LABS @philofishal.bsky.social and @syrion89.bsky.social
Our guys untangle the knots of #NimDoor: compiled Nim, macOS process injection and signals-based persistence triggers, with AppleScript (⁉️) beacons (whatever will they think up next πŸ˜…) 🌢️🌢️.
#dprk #apt #macOS
s1.ai/nimdoor

02.07.2025 12:03 πŸ‘ 3 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks
Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks YouTube video by Three Buddy Problem

This week's show is a three-hour deep dive into Predatory Sparrow and the long-simmering Iran-Israel cyberwar (with @darkcell.bsky.social @craiu.bsky.social @jags.bsky.social youtu.be/MKKzHseTUUQ?...

21.06.2025 17:55 πŸ‘ 4 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

"The best netflow comes from asking friends for favors." -- @jags.bsky.social @craiu.bsky.social

14.06.2025 16:16 πŸ‘ 9 πŸ” 2 πŸ’¬ 1 πŸ“Œ 1
Preview
Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets This report uncovers a set of related threat clusters linked to PurpleHaze and ShadowPad operators targeting organizations, including cybersecurity vendors.

Get the full story here:

www.sentinelone.com/labs/follow-... [2/2]

09.06.2025 11:42 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

We just released our findings on long-term activity clusters attributed to China-nexus actors.

We discuss a relatively underreported, yet critical, aspect of the threat landscape: the targeting of cybersecurity vendors.

Big shout out to Lumen's Black Lotus Labs for their support! [1/2]

09.06.2025 11:42 πŸ‘ 6 πŸ” 4 πŸ’¬ 1 πŸ“Œ 0
Post image

From PhD work to award-winning cybercrime research, @milenkowski.bsky.social of SentinelLABS is a force in malware analysis.

Catch his talk at #SLEUTHCON 2025!

🎟️ Grab your ticket today >>> www.sleuthcon.com

#CyberThreatIntel #InfosecEvents

01.05.2025 17:50 πŸ‘ 4 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today's Adversaries This report highlights a rarely-discussed but crucially important attack surface: security vendors themselves.

πŸ“„ Read the full research: s1.ai/TopTier

29.04.2025 19:06 πŸ‘ 7 πŸ” 4 πŸ’¬ 0 πŸ“Œ 0
Preview
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today's Adversaries This report highlights a rarely-discussed but crucially important attack surface: security vendors themselves.

Love when we can talk about hoy dynamic the threat landscape actually is. The scope and scale of the DPRK IT workers effort alone surprised me as we worked it. Also love @sentinelone.com let us discuss this openly and viewed it as important to do so.

www.sentinelone.com/labs/top-tie...

28.04.2025 20:57 πŸ‘ 5 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
Tom Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security

Appreciate the shoutout @jags.bsky.social (and that you aced my last name)! If you don’t listen to the Three Buddy Podcast yet, it is absolutely amazing and you should!

open.spotify.com/show/6dXbRag...

25.04.2025 20:28 πŸ‘ 11 πŸ” 4 πŸ’¬ 1 πŸ“Œ 0
Post image

At @pivotcon.bsky.social, I'm presenting with @hegel.bsky.social and Sreekar Madabushi on the first public look at the full scope of a stealthy, long-running phishing network.

24.04.2025 14:31 πŸ‘ 7 πŸ” 5 πŸ’¬ 0 πŸ“Œ 0
Post image

Very excited to share that I’ll be presenting at @sleuthcon.bsky.social in June!

Jim & I will share the backstory behind AkiraBot that didn’t make it into the blogβ€”and what they’ve been up to since.

25.04.2025 19:12 πŸ‘ 12 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Post image

Published a new Pharos report today - and learned a lot in the process from @milenkowski.bsky.social Jiro, @julianferdinand.bsky.social @tgrossman.bsky.social. The report takes a closer look at how states are using ransomware.

virtual-routes.org/wp-content/u...

23.04.2025 20:19 πŸ‘ 14 πŸ” 9 πŸ’¬ 1 πŸ“Œ 1
Preview
AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale AkiraBot uses OpenAI to generate custom outreach messages to spam chat widgets and website contact forms at scale.

πŸ‘‰ s1.ai/akirabot
#OpenAI abused by spambot to carve out custom messages and beat CAPTCHAs. #security
@alex.leetnoob.com πŸ•ΈοΈ

12.04.2025 20:04 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

it feels like an useful feature so I have just implemented it under aflmc. thanks for sharing your alias! github.com/radareorg/ra...

11.04.2025 08:53 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0