๐ฅ Fresh from the LABS team and our friends at Beazley Security ๐https://www.sentinelone.com/labs/ghost-in-the-zip-new-pxa-stealer-and-its-telegram-powered-ecosystem/
06.08.2025 13:55 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0@sentinellabs.bsky.social
We are the Threat Intelligence and Malware Analysis team of @SentinelOne https://sentinellabs.com https://labscon.io
๐ฅ Fresh from the LABS team and our friends at Beazley Security ๐https://www.sentinelone.com/labs/ghost-in-the-zip-new-pxa-stealer-and-its-telegram-powered-ecosystem/
06.08.2025 13:55 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0Our team collaborated with our friends at @sentinellabs.bsky.social to identify and disrupt a PXA infostealer campaign that has an intricate and complex delivery chain:
labs.beazley.security/articles/gho...
Thanks for the fantastic collab SentinelLabs team!
Posted this a few days ago. Going to post it again for the folks who didn't read it the first time ๐
www.sentinelone.com/labs/chinas-...
An amazing, insightful report from @dakotaindc.bsky.social and @sentinellabs.bsky.social
Thanks for the extremely kind words on the pod @ryanaraine.bsky.social @jags.bsky.social. My non paid endorsement (feel free to venmo me) is that three buddy is one of my favorite cyber pods, worth a listen every time. securityconversations.com/episode/how-...
02.08.2025 14:17 โ ๐ 19 ๐ 6 ๐ฌ 1 ๐ 0๐๐ฅโฆ the complex relationship btw CN APTs๐ต๏ธโโ๏ธ and CN PSOAs ๐จ๐ณ makes attribution even more challenging than defenders might have supposed. #cti #threatintel #hafnium #silktyphoon @dakotaindc.bsky.social
www.sentinelone.com/labs/chinas-...
This week's show is YouTube ready @craiu.bsky.social @jags.bsky.social
๐ฅ Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days
youtu.be/3GJuVGmpexA
โ ๏ธ #0-DAY #Microsoft
๐พ #CVE-2025-53770
๐ฉ #ToolShell ๐ช
bsky.app/profile/sent...
๐ Apple: โmacOS is secure by design.โ
๐ป Meanwhile, in /Users/Shared:
๐ต๏ธโโ๏ธ Persistent Malware masquerading as Apple โagentโ
>> Khepri beacon in /tmp
๐ฆ Ad-hoc signed payloads
๐ Targeting Chinese diaspora
Deep dive from Dinesh Devadoss and me ๐ s1.ai/zuru
#icymi #macOS #malware #APT #infosec
๐ฅ Fresh from LABS @philofishal.bsky.social and @syrion89.bsky.social
Our guys untangle the knots of #NimDoor: compiled Nim, macOS process injection and signals-based persistence triggers, with AppleScript (โ๏ธ) beacons (whatever will they think up next ๐
) ๐ถ๏ธ๐ถ๏ธ.
#dprk #apt #macOS
s1.ai/nimdoor
This week's show is a three-hour deep dive into Predatory Sparrow and the long-simmering Iran-Israel cyberwar (with @darkcell.bsky.social @craiu.bsky.social @jags.bsky.social youtu.be/MKKzHseTUUQ?...
21.06.2025 17:55 โ ๐ 4 ๐ 3 ๐ฌ 0 ๐ 0"The best netflow comes from asking friends for favors." -- @jags.bsky.social @craiu.bsky.social
14.06.2025 16:16 โ ๐ 8 ๐ 2 ๐ฌ 1 ๐ 1Get the full story here:
www.sentinelone.com/labs/follow-... [2/2]
We just released our findings on long-term activity clusters attributed to China-nexus actors.
We discuss a relatively underreported, yet critical, aspect of the threat landscape: the targeting of cybersecurity vendors.
Big shout out to Lumen's Black Lotus Labs for their support! [1/2]
From PhD work to award-winning cybercrime research, @milenkowski.bsky.social of SentinelLABS is a force in malware analysis.
Catch his talk at #SLEUTHCON 2025!
๐๏ธ Grab your ticket today >>> www.sleuthcon.com
#CyberThreatIntel #InfosecEvents
๐ Read the full research: s1.ai/TopTier
29.04.2025 19:06 โ ๐ 7 ๐ 4 ๐ฌ 0 ๐ 0Love when we can talk about hoy dynamic the threat landscape actually is. The scope and scale of the DPRK IT workers effort alone surprised me as we worked it. Also love @sentinelone.com let us discuss this openly and viewed it as important to do so.
www.sentinelone.com/labs/top-tie...
Appreciate the shoutout @jags.bsky.social (and that you aced my last name)! If you donโt listen to the Three Buddy Podcast yet, it is absolutely amazing and you should!
open.spotify.com/show/6dXbRag...
At @pivotcon.bsky.social, I'm presenting with @hegel.bsky.social and Sreekar Madabushi on the first public look at the full scope of a stealthy, long-running phishing network.
24.04.2025 14:31 โ ๐ 7 ๐ 5 ๐ฌ 0 ๐ 0Very excited to share that Iโll be presenting at @sleuthcon.bsky.social in June!
Jim & I will share the backstory behind AkiraBot that didnโt make it into the blogโand what theyโve been up to since.
Published a new Pharos report today - and learned a lot in the process from @milenkowski.bsky.social Jiro, @julianferdinand.bsky.social @tgrossman.bsky.social. The report takes a closer look at how states are using ransomware.
virtual-routes.org/wp-content/u...
๐ s1.ai/akirabot
#OpenAI abused by spambot to carve out custom messages and beat CAPTCHAs. #security
@alex.leetnoob.com ๐ธ๏ธ
it feels like an useful feature so I have just implemented it under aflmc. thanks for sharing your alias! github.com/radareorg/ra...
11.04.2025 08:53 โ ๐ 3 ๐ 2 ๐ฌ 0 ๐ 0How to pivot of network indicators with Validin.
Learn how to pivot on network iocs you find in blog posts ๐ฅ #validin
www.validin.com/blog/x-phish...
๐ฅโ๏ธ Presenting our Just A Sec livestream. In the first-ever episode on April 10 at 2 p.m. PT, @dakotaindc.bsky.social, Drea London, @jags.bsky.social, and @stonepwn3000.bsky.social discuss the hidden forces shaping our digital world.
03.04.2025 21:23 โ ๐ 5 ๐ 3 ๐ฌ 1 ๐ 2Really great episode this week. The Signal ID management mess, and the lab dookhtegan topics.. simply delicious ๐ค
30.03.2025 21:10 โ ๐ 8 ๐ 2 ๐ฌ 0 ๐ 1Use this r2 alias to sort and count calls in a function: $pifc='pifc | sort | uniq -c | awk '{print $1," x ",$3}' | sort -nr' (escape the pipes and inner quotes when using in .radarerc config file).
Power up your #radare2 pifc command with a $pifc alias that sorts and counts the calls in a function. #macOS #reverseengineering #r2
01.04.2025 13:02 โ ๐ 10 ๐ 5 ๐ฌ 1 ๐ 0s1.ai/LC24-CB
โจ๏ธ ๐ ๐จ๐ณ โฃ๏ธ Exploiting CTFs to
tool-up your #espionage capabilities and build out your #cyberarsenal. โ๏ธ ๐ฃ
@dakotaindc.bsky.social
@sentinelone.com
s1.ai/LC24-JW
๐ฅ๐ฐ leaky opsec reveals how Kryptina made a name for itself ๐ #ransomware #security #cyber
s1.ai/readup
๐ Adware loaders are always the most complex! Props to @syrion89.bsky.social for helping me pull apart all these different bins and figuring out what they had in common and how to attribute and detect them. ๐ฆพ #adware #malware #macOS #security
@sentinelone.com @sentinellabs.bsky.social
s1.ai/LC24-WZ
@kimzetter.bsky.social @dwizzzle.bsky.social