SentinelOne
-
Active Node.js Malware Campaign Targeting Manual Reader Applications
Read MoreWe’re seeing a significant uptick in a malware campaign that’s affecting multiple customers. This one’s worth knowing about if you’re in a SOC or working with EDR platforms.
The Campaign
Attackers are distributing malicious Node.js payloads disguised as manual reader and document utility applications. The names are designed to look legitimate: AllManualsReader, OpenMyManual, ManualFinder, AppSuitePDF, and OneStart.
Initial distribution appears to be through SEO poisoning. Users search for manuals or document tools, find these applications in search results, and download what they think is a legitimate utility.
-
SentinelOne Power Query UI
A user interface for SentinelOne query operations to streamline common investigations and hunting workflows.
Features
- Quick query templates
- Saved searches
- Export and sharing
Installation
- Clone the repository
- Follow setup instructions in the README
Usage
EDR Query (s1) ProcessName = "powershell.exe" and Tactic = "Execution"Security Considerations
- No credentials are stored in the client
- Follow principle of least privilege for any API tokens (if used by backend components)
Links
Read MoreSentinelOne Power Query UI
EDRUser interface for SentinelOne query operations
No posts found
Try different search terms.