milenkowski Profile Banner
Aleksandar Milenkoski Profile
Aleksandar Milenkoski

@milenkowski

Followers
2K
Following
2K
Media
57
Statuses
568

Threat Research | Threat Intelligence | PhD | European Commission Marie Curie Research Fellow 2011-2014 | Personal Profile | 🇩🇪

Joined March 2012
Don't wanna be here? Send us removal request.
@milenkowski
Aleksandar Milenkoski
1 year
Dropping this today: ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware. In collaboration with @JulianVoeg from @RecordedFuture . 🧵A quick summary and a few thoughts on the use of RSW by APTs.
Tweet card summary image
sentinelone.com
Threat actors in the cyberespionage ecosystem are using ransomware for financial gain, disruption, distraction, misattribution, and the removal of evidence.
1
29
68
@milenkowski
Aleksandar Milenkoski
2 months
Presenting at @HagueTIX with @JulianVoeg was an amazing experience! So many insightful talks! Huge thanks to the organizing team (@monica_kello, Corianne Oosterbaan, and the PC) for having me. Already looking forward to next year, wouldn’t miss it!
Tweet media one
0
2
9
@milenkowski
Aleksandar Milenkoski
2 months
RT @JohnLaTwC: Think Deeper. One line of this @SentinelOne blog (🙏 @TomHegel and @milenkowski) stood out to me. 💭"Encrypts and password-p….
0
18
0
@milenkowski
Aleksandar Milenkoski
2 months
RT @780thC: Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets.June 9, 2025, Sentinel Labs..
Tweet card summary image
sentinelone.com
This report uncovers a set of related threat clusters linked to PurpleHaze and ShadowPad operators targeting organizations, including cybersecurity vendors.
0
5
0
@milenkowski
Aleksandar Milenkoski
2 months
We just released our findings on long-term activity clusters attributed to China-nexus actors. We discuss a relatively underreported, yet critical, aspect of the threat landscape: the targeting of cybersecurity vendors. Big shout out to @BlackLotusLabs for their support! [1/2].
1
7
20
@milenkowski
Aleksandar Milenkoski
2 months
Huge thanks to the @SLEUTHCON team for having me and putting on such a great event! It was a pleasure presenting with Sreekar from @ValidinLLC on North Korean activities. Stay tuned, more to come from us soon.
Tweet media one
0
8
22
@milenkowski
Aleksandar Milenkoski
3 months
RT @JohnHultquist: Last week to get your @SLEUTHCON tickets!.
0
10
0
@milenkowski
Aleksandar Milenkoski
4 months
It was a pleasure collaborating with @TomHegel and Jim Walter on this one. Read our blog here:. [2/2].
Tweet card summary image
sentinelone.com
This report highlights a rarely-discussed but crucially important attack surface: security vendors themselves.
0
3
13
@milenkowski
Aleksandar Milenkoski
4 months
🚨New research drop: Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries. 🌐 China-nexus APTs targeting supply chains.🔍 DPRK IT workers infiltrating hiring pipelines.🛠 Ransomware crews probing EDR platforms [1/2].
1
15
37
@milenkowski
Aleksandar Milenkoski
4 months
Excited to be part of the incredible @SLEUTHCON lineup with the @ValidinLLC team!.
@ValidinLLC
Validin
4 months
At @SLEUTHCON, Validin's Sreekar Madabushi presents with @milenkowski of @LabsSentinel on an exclusive view into suspected North Korean threat actor interest in threat intelligence data. You won't want to miss this spicy talk!
Tweet media one
0
7
14
@milenkowski
Aleksandar Milenkoski
4 months
🚨New research drop: Ransomware’s New Masters: How States Are Hijacking Cybercrime. This @VirtualRoutes report offers a comparative analysis of ransomware use by suspected state-aligned clusters from Russia, China, North Korea, and Iran. [1/2]
Tweet media one
1
7
17
@milenkowski
Aleksandar Milenkoski
4 months
RT @VirtualRoutes: 💡The third report of the Pharos Series, Ransomware’s New Masters: How States Are Hijacking Cybercrime by @milenkowski, @….
0
4
0
@milenkowski
Aleksandar Milenkoski
6 months
RT @securityaffairs: A data leak exposes the operations of the Chinese private firm #TopSec, which provides #Censorship-as-a-Service.https:….
Tweet card summary image
securityaffairs.com
A leak suggests China's TopSec provides censorship services, aiding a state-owned firm during a corruption scandal.
0
4
0
@milenkowski
Aleksandar Milenkoski
6 months
RT @780thC: SentinelLABS has analyzed a data leak from TopSec, a Chinese cybersecurity firm offering services such as Endpoint Detection &….
Tweet card summary image
sentinelone.com
Data leak reveals how a top tier cybersecurity vendor helps the PRC enforce content monitoring and manipulation of public opinion in China.
0
26
0
@milenkowski
Aleksandar Milenkoski
6 months
The leak provides insights into how private cybersecurity firms help the state and the CCP monitor and censor online discourse — especially during corruption scandals. [2/2]. 🔍 Read more:
Tweet card summary image
sentinelone.com
Data leak reveals how a top tier cybersecurity vendor helps the PRC enforce content monitoring and manipulation of public opinion in China.
0
1
3
@milenkowski
Aleksandar Milenkoski
6 months
🚨 New Research Drop. 📢 Censorship as a Service | Leak Reveals Public-Private Collaboration to Monitor Chinese Cyberspace. @spiderspiders_ , @DakotaInDC , and I analyzed a leak containing infrastructure details and work logs from employees of a security firm in China. [1/2].
1
8
18
@milenkowski
Aleksandar Milenkoski
7 months
This is going to be an amazing talk. It is great to see in depth research on an increasingly relevant attack vector: the firmware. Make sure you catch it if you are attending @REverseConf.
@REverseConf
RE//verse
7 months
Bootkits: the ultimate stealth threat. Takahiro Haruyama (@cci_forensics) shares cutting-edge techniques to detect UEFI implants with code behavior analysis, YARA/FwHunt rules, and retrohunts. Learn how 6 new bootkits were uncovered! #REverse2025
Tweet media one
1
6
29