SentinelLabs Logo RGB WhitePurp
ABOUT
CVE DATABASE
CONTACT
VISIT SENTINELONE.COM

Aleksandar Milenkoski

Aleksandar Milenkoski is a Senior Threat Researcher at SentinelLabs. With expertise in malware research and focus on targeted attacks, he brings a blend of practical and deep insights to the forefront of cyber threat intelligence. Aleksandar has a PhD in system security and is the author of numerous reports on cyberespionage and high-impact cybercriminal operations, conference talks, and peer-reviewed research papers. From 2011 to 2014, he was a European Commission Marie Skłodowska-Curie Research Fellow. His research has won awards from SPEC, the Bavarian Foundation for Science, and the University of Würzburg.
Transparent Tribe 6
labs
Advanced Persistent Threat

Transparent Tribe (APT36) | Pakistan-Aligned Threat Actor Expands Interest in Indian Education Sector

Aleksandar Milenkoski / April 13, 2023

SentinelLABS has been tracking a cluster of malicious documents that stage the Crimson RAT malware distributed by APT36 (Transparent Tribe).

Read More
Operation Tainted Love Chinese APTs Target Telcos In New Attacks 4
labs
Advanced Persistent Threat

Operation Tainted Love | Chinese APTs Target Telcos in New Attacks

Aleksandar Milenkoski / March 23, 2023

Cyber espionage actor deploys custom credential theft malware in new campaign targeting the telecoms sector.

Read More
sentinelone

DBatLoader and Remcos RAT Sweep Eastern Europe

From the Front Lines | 7 minute read
Read More >
WIP26 Espionage Threat Actors Abuse Cloud Infrastructure In Targeted Telco 4
labs
Adversary

WIP26 Espionage | Threat Actors Abuse Cloud Infrastructure in Targeted Telco Attacks

Aleksandar Milenkoski / February 16, 2023

A new threat cluster has been targeting telecommunication providers in the Middle East and abusing Microsoft, Google and Dropbox cloud services.

Read More
MalVirt .NET Virtualization Thrives In New Malvertising Attacks 3
labs
Crimeware

MalVirt | .NET Virtualization Thrives in Malvertising Attacks

Aleksandar Milenkoski / February 2, 2023

.NET malware loaders distributed through malvertising are using obfuscated virtualization for anti-analysis and evasion in an ongoing campaign.

Read More
DragonSpark Attacks Evade Detection With SparkRAT And Golang Source Code Interpretation 1
labs
Adversary

DragonSpark | Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation

Aleksandar Milenkoski / January 24, 2023

A cluster of attacks SentinelLABS tracks as DragonSpark uses a novel technique, Golang source code interpretation, to avoid detection while also deploying a little-known tool called SparkRAT.

Read More
11 Problems ChatGPT Can Solve For Reverse Engineers And Malware Analysts 1
labs
Security Research

11 Problems ChatGPT Can Solve For Reverse Engineers and Malware Analysts

Aleksandar Milenkoski / December 21, 2022

ChatGPT has captured the imagination of many across infosec. Here's how it can superpower the efforts of reversers and malware analysts.

Read More
The Mystery Of Metador An Unattributed Threat Hiding In Telcos ISPs And Universities 3
labs
Advanced Persistent Threat

The Mystery of Metador | Unpicking Mafalda’s Anti-Analysis Techniques

Aleksandar Milenkoski / December 1, 2022

Discover the anti-analysis techniques of the Mafalda implant, a unique, feature-rich backdoor used by the Metador threat actor.

Read More
SocGholish Diversifies And Expands Its Malware Staging Infrastructure To Counter Defenders 2
labs
Crimeware

SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders

Aleksandar Milenkoski / November 7, 2022

SocGholish operators continue to infect websites at a massive scale, and the threat actor is ramping up its infrastructure to match.

Read More
sentinelone

Ransoms Without Ransomware, Data Corruption and Other New Tactics in Cyber Extortion

From the Front Lines | 8 minute read
Read More >
Previous
1 2 3
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    FreeDrain Unmasked | Uncovering an Industrial-Scale Crypto Theft Network
    May 8, 2025
  • Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
    Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
    April 28, 2025
  • AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale
    AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale
    April 9, 2025

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2025 SentinelOne, All Rights Reserved.