Videos - SentinelOne https://www.sentinelone.com/resources/category/video/ Next Generation Endpoint Security Fri, 28 Jun 2024 20:34:50 +0000 en-US hourly 1 Brain Cipher Ransomware VS SentinelOne Singularity XDR Platform: Protection https://www.sentinelone.com/resources/brain-cipher-ransomware-vs-sentinelone-singularity-xdr-platform-protection/ Fri, 28 Jun 2024 20:34:50 +0000 https://www.sentinelone.com/resources/brain-cipher-ransomware-vs-sentinelone-singularity-xdr-platform-protection/ In this video, we show how the SentinelOne Singularity XDR Platform detects and mitigates Brain Cipher ransomware, a cyber threat that emerged in early June 2024. That month, threat actors leveraged Brain Cipher to launch an attack against Indonesia’s National Data Center.

Brain Cipher is constructed from a leaked version of another popular ransomware builder, LockBit 3.0, representing an escalation in cybercriminal tactics. Leveraging insights from SentinelOne’s comprehensive analysis of LockBit 3.0, we draw parallels and distinctions between these threats to provide a clearer understanding of the evolving ransomware landscape.

Key Highlights:
-Brain Cipher Ransomware’s impact on Indonesia’s National Data Center.
-The threat actors’ use of cyberfear[.]com email aliases and TOR-based communication channels for victim interaction and payment negotiations.
-Its reliance on Initial Access Brokers (IABs) for infiltrating target environments, highlighting the use of phishing and RDP-focused exploits.
-Comparative analysis with LockBit 3.0 (LockBit Black), shedding light on the shared tactics and unique strategies employed by cybercriminals.1
-Protective measures and recommendations for organizations to safeguard against such ransomware attacks, emphasizing the role of advanced cybersecurity solutions like SentinelOne Singularity.

Watch the video to learn technical details, operational tactics, and mitigation strategies surrounding Brain Cipher Ransomware. Whether you’re a cybersecurity professional, a business leader, or simply keen on understanding the dynamics of modern cyber threats, this video offers valuable insights into protecting your digital assets in an increasingly hostile cyber environment.

~Subscribe to our channels:~
Website: https://www.sentinelone.com/
LinkedIn: https://www.linkedin.com/company/sentinelone/
Twitter: https://twitter.com/SentinelOne
Facebook: https://www.facebook.com/SentinelOne
Instagram: https://www.instagram.com/sentinelsec/
Threads: https://www.threads.net/@sentinelsec

]]>
Brain Cipher Ransomware VS SentinelOne Singularity XDR Platform: Detection and Mitigation https://www.sentinelone.com/resources/brain-cipher-ransomware-vs-sentinelone-singularity-xdr-platform-detection-and-mitigation/ Fri, 28 Jun 2024 20:29:19 +0000 https://www.sentinelone.com/resources/brain-cipher-ransomware-vs-sentinelone-singularity-xdr-platform-detection-and-mitigation/ In this video, we show how the SentinelOne Singularity XDR Platform detects and mitigates Brain Cipher ransomware, a cyber threat that emerged in early June 2024. That month, threat actors leveraged Brain Cipher to launch an attack against Indonesia’s National Data Center.

Brain Cipher is constructed from a leaked version of another popular ransomware builder, LockBit 3.0, representing an escalation in cybercriminal tactics. Leveraging insights from SentinelOne’s comprehensive analysis of LockBit 3.0, we draw parallels and distinctions between these threats to provide a clearer understanding of the evolving ransomware landscape.

Key Highlights:
-Brain Cipher Ransomware’s impact on Indonesia’s National Data Center.
-The threat actors’ use of cyberfear[.]com email aliases and TOR-based communication channels for victim interaction and payment negotiations.
-Its reliance on Initial Access Brokers (IABs) for infiltrating target environments, highlighting the use of phishing and RDP-focused exploits.
-Comparative analysis with LockBit 3.0 (LockBit Black), shedding light on the shared tactics and unique strategies employed by cybercriminals.1
-Protective measures and recommendations for organizations to safeguard against such ransomware attacks, emphasizing the role of advanced cybersecurity solutions like SentinelOne Singularity.

Watch the video to learn technical details, operational tactics, and mitigation strategies surrounding Brain Cipher Ransomware. Whether you’re a cybersecurity professional, a business leader, or simply keen on understanding the dynamics of modern cyber threats, this video offers valuable insights into protecting your digital assets in an increasingly hostile cyber environment.

~Subscribe to our channels:~
Website: https://www.sentinelone.com/
LinkedIn: https://www.linkedin.com/company/sentinelone/
Twitter: https://twitter.com/SentinelOne
Facebook: https://www.facebook.com/SentinelOne
Instagram: https://www.instagram.com/sentinelsec/
Threads: https://www.threads.net/@sentinelsec

]]>
Aston Martin Aramco F1 and SentinelOne: Jessica Hawkins and Tina Hausmann at RSAC 2024 https://www.sentinelone.com/resources/aston-martin-aramco-f1-and-sentinelone-jessica-hawkins-and-tina-hausmann-at-rsac-2024/ Wed, 15 May 2024 20:10:33 +0000 https://www.sentinelone.com/resources/aston-martin-aramco-f1-and-sentinelone-jessica-hawkins-and-tina-hausmann-at-rsac-2024/ @astonmartinf1team team members Jessica Hawkins and Tina Hausmann talk with @Sentinelone-inc at #rsac2024 about the F1 Academy, @Formula1 racing, and breaking barriers. Watch the full video to learn more.

~Subscribe to our channels:~
Website: https://www.sentinelone.com/
LinkedIn: https://www.linkedin.com/company/sentinelone/
Twitter: https://twitter.com/SentinelOne
Facebook: https://www.facebook.com/SentinelOne
Instagram: https://www.instagram.com/sentinelsec/
Threads: https://www.threads.net/@sentinelsec

]]>
Aston Martin Aramco F1 and SentinelOne: Female Pioneers on the Track and in Cybersecurity https://www.sentinelone.com/resources/aston-martin-aramco-f1-and-sentinelone-female-pioneers-on-the-track-and-in-cybersecurity/ Wed, 15 May 2024 20:01:26 +0000 https://www.sentinelone.com/resources/aston-martin-aramco-f1-and-sentinelone-female-pioneers-on-the-track-and-in-cybersecurity/ What do @astonmartinf1team members Jessica Hawkins and Tina Hausmann, its CIO Clare Lansley, and @Sentinelone-inc Chief Marketing Officer Sally Jenkins have in common? They are all pioneering new roads for women in their industries. In this panel discussion with @FemaleQuotient at the 2024 #RSAC cybersecurity conference, they discuss the technology, their roles, and what drives them to succeed. Watch the full video to learn more.

~Subscribe to our channels:~
Website: https://www.sentinelone.com/
LinkedIn: https://www.linkedin.com/company/sentinelone/
Twitter: https://twitter.com/SentinelOne
Facebook: https://www.facebook.com/SentinelOne
Instagram: https://www.instagram.com/sentinelsec/
Threads: https://www.threads.net/@sentinelsec

]]>
RSAC 2024: SentinelOne at the RSAC Conference https://www.sentinelone.com/resources/rsac-2024-sentinelone-at-the-rsac-conference/ Sat, 11 May 2024 06:37:58 +0000 https://www.sentinelone.com/resources/rsac-2024-sentinelone-at-the-rsac-conference/ At the 2024 RSAC Conference in San Francisco, SentinelOne displayed how it is at forefront of cutting-edge cybersecurity solutions, announcing new autonomous security capabilities within its Singularity Platform that combine the power of it Purple AI and Singularity™ Data Lake and its revolutionary CNAPP with unique Offensive Security Engine™ that thinks like a hacker to move beyond the theoretical and deliver Verified Exploit Paths™.

The company also hosted the @astonmartinf1team’s Jessica Hawkins and Tina Hausmann and its CIO, Clare Lansley, as well Chris Mullins who played for the @warriors.

We also took part in an RSAC Keynote with Chris Krebs, his successor at CISA, Jen Easterly.

~Subscribe to our channels:~
Website: https://www.sentinelone.com/
LinkedIn: https://www.linkedin.com/company/sentinelone/
Twitter: https://twitter.com/SentinelOne
Facebook: https://www.facebook.com/SentinelOne
Instagram: https://www.instagram.com/sentinelsec/
Threads: https://www.threads.net/@sentinelsec

]]>
macOS Cuckoo Stealer Malware VS SentinelOne: Protection https://www.sentinelone.com/resources/macos-cuckoo-stealer-malware-vs-sentinelone-protection/ Fri, 10 May 2024 02:33:10 +0000 https://www.sentinelone.com/resources/macos-cuckoo-stealer-malware-vs-sentinelone-protection/ Cuckoo Stealer is a novel infostealer trojan with unique spyware properties. The malware is written in C++ and was created using a legacy build of Xcode. Cuckoo Stealer has been observed masquerading within trojanized applications including:
-App Uninstaller.app
-DumpMedia Amazon Music Converter.app
-FoneDog Toolkit for Android on Mac.app
-iMyMac PDF Compressor.app
-PowerUninstall.app
-TuneSolo Apple Music Converter.app

Cuckoo Stealer relies heavily on user interaction for full execution. False authentication prompts (via AppleScript) are used to acquire a victim’s credentials.

The actors behind the Cuckoo Stealer campaign have clearly invested some resources into developing a novel infostealer rather than buying any of the ready-made offerings currently circulating in various Telegram channels and darknet forums. This, along with the rising numbers of samples we have observed since initial reporting of this threat, suggests that we will likely see further variants of this malware in the future.

Enterprises are advised to use a third party security solution such as SentinelOne Singularity to ensure that devices are protected against this and other threats targeting macOS devices in the fleet. At the time of writing the latest version of XProtect, version 2194, does not block execution of Cuckoo Stealer malware. SentinelOne customers are protected from macOS Cuckoo Stealer.

~Subscribe to our channels:~
Website: https://www.sentinelone.com/
LinkedIn: https://www.linkedin.com/company/sentinelone/
Twitter: https://twitter.com/SentinelOne
Facebook: https://www.facebook.com/SentinelOne
Instagram: https://www.instagram.com/sentinelsec/
Threads: https://www.threads.net/@sentinelsec

]]>
macOS Cuckoo Stealer Malware VS SentinelOne: Detection https://www.sentinelone.com/resources/macos-cuckoo-stealer-malware-vs-sentinelone-detection/ Fri, 10 May 2024 02:31:45 +0000 https://www.sentinelone.com/resources/macos-cuckoo-stealer-malware-vs-sentinelone-detection/ Cuckoo Stealer is a novel infostealer trojan with unique spyware properties. The malware is written in C++ and was created using a legacy build of Xcode. Cuckoo Stealer has been observed masquerading within trojanized applications including:
-App Uninstaller.app
-DumpMedia Amazon Music Converter.app
-FoneDog Toolkit for Android on Mac.app
-iMyMac PDF Compressor.app
-PowerUninstall.app
-TuneSolo Apple Music Converter.app

Cuckoo Stealer relies heavily on user interaction for full execution. False authentication prompts (via AppleScript) are used to acquire a victim’s credentials.

The actors behind the Cuckoo Stealer campaign have clearly invested some resources into developing a novel infostealer rather than buying any of the ready-made offerings currently circulating in various Telegram channels and darknet forums. This, along with the rising numbers of samples we have observed since initial reporting of this threat, suggests that we will likely see further variants of this malware in the future.

Enterprises are advised to use a third party security solution such as SentinelOne Singularity to ensure that devices are protected against this and other threats targeting macOS devices in the fleet. At the time of writing the latest version of XProtect, version 2194, does not block execution of Cuckoo Stealer malware. SentinelOne customers are protected from macOS Cuckoo Stealer.

~Subscribe to our channels:~
Website: https://www.sentinelone.com/
LinkedIn: https://www.linkedin.com/company/sentinelone/
Twitter: https://twitter.com/SentinelOne
Facebook: https://www.facebook.com/SentinelOne
Instagram: https://www.instagram.com/sentinelsec/
Threads: https://www.threads.net/@sentinelsec

]]>
LABScon23 Replay | macOS Components Used in North Korean Crypto-Heists | Greg Lesnewich https://www.sentinelone.com/resources/labscon23-replay-macos-components-used-in-north-korean-crypto-heists-greg-lesnewich/ Wed, 08 May 2024 02:38:38 +0000 https://www.sentinelone.com/resources/labscon23-replay-macos-components-used-in-north-korean-crypto-heists-greg-lesnewich/ While many state-aligned threats have dipped their toes into macOS malware, North Korea has invested serious time and effort into compromising that operating system. Its operations in macOS environments include both espionage and financial gain. macOS malware analysis is an exciting space, but most blogs on the subject deal with functionality and capability, rather than how to find more similar samples. Analysts are forced to rely on string searching, based on disassembler output or a strings dump. Comparatively, executables for Windows have “easy” pivots such as import hashing or rich headers, to find additional samples without much effort.

This talk introduces some of those easy pivots for Mach-O files, using North Korean samples as an initial case study. Along the way, Greg Lesnewich takes us on a tour of the North Korean clusters using Mach-O samples, how those clusters intersect, how their families relate to one another, and shows how some simple pivots can link a group’s families together.

]]>
LABScon 23: From Vulkan to Ryazan | Investigative Reporting from the Frontlines of InfoSec https://www.sentinelone.com/resources/labscon-23-from-vulkan-to-ryazan-investigative-reporting-from-the-frontlines-of-infosec/ Tue, 30 Apr 2024 16:07:15 +0000 https://www.sentinelone.com/resources/labscon-23-from-vulkan-to-ryazan-investigative-reporting-from-the-frontlines-of-infosec/ During the last couple of years, Hakan Tanriverdi of Paper Trail Media has reported on several large-scale digital espionage and sabotage campaigns, from hacking groups that were later called out by the U.S. Department of Justice to companies targeting critical infrastructure in Germany and across Western Europe. In both cases, mistakes in how the attackers set up their infrastructure enabled Tanriverdi’s team to follow their tracks, in some cases right back to their employers. The resulting stories revealed the intersection where covert cyber operations and overt organizational structures meet.

This talk lays out the types of information this team works with, how they follow and fact-check opaque leads, and turn them into portraits of the previously unknown actors pulling the strings in cyberspace.

]]>
SentinelOne’s Purple AI: Natural Language Queries, QuickStarts and Notebooks https://www.sentinelone.com/resources/sentinelones-purple-ai-natural-language-queries-quickstarts-and-notebooks/ Tue, 23 Apr 2024 16:45:33 +0000 https://www.sentinelone.com/resources/sentinelones-purple-ai-natural-language-queries-quickstarts-and-notebooks/ 🔥 🟣 Purple AI is the cybersecurity industry’s leading AI security analyst.
👉 Why Purple AI? Because it’s unlike anything available on the market:
💪 Early adopters report that Purple AI makes threat hunting and investigations 80% faster.
🧠 Translates natural language into sophisticated PowerQueries.
💨 Speed and visibility with lightning fast-queries with one console, one platform, and the industry’s most-performant data lake.
🔎 One-click threat hunting quickstarts, suggested next queries for deeper investigations, and intelligent summaries and shareable investigation notebooks.

👉 Ready to transform your security operations? Get a demo: https://s1.ai/Purple-AI

~Subscribe to our channels:~
Website: https://www.sentinelone.com/
LinkedIn: https://www.linkedin.com/company/sentinelone/
Twitter: https://twitter.com/SentinelOne
Facebook: https://www.facebook.com/SentinelOne
Instagram: https://www.instagram.com/sentinelsec/
Threads: https://www.threads.net/@sentinelsec

]]>