SentinelLabs Logo RGB WhitePurp
ABOUT
CONTACT
VISIT SENTINELONE.COM

Alex Delamotte

Alex's passion for cybersecurity is humbly rooted in the early aughts, when she declared a vendetta against a computer worm. Over the past decade, Alex has worked with blue, purple, and red teams serving companies in the technology, financial, pharmaceuticals, and telecom sectors and she has shared research with several ISACs. Alex enjoys researching the intersection of cybercrime and state-sponsored activity. She relentlessly questions why actors pivot to a new technique or attack surface. In her spare time, she can be found DJing or servicing her music arcade games.
Threat Actors Actively Exploiting Progress WS FTP Via Multiple Attack Chains 1
labs

Dark Angels | ESXi Ransomware Borrows Code & Victimology From RagnarLocker

Alex Delamotte & Jim Walter / October 12, 2023

Learn how the Dark Angels ransomware targeting Johnson Controls' ESXi servers shares significant overlap with the notorious RagnarLocker.

Read More
Threat Actors Actively Exploiting Progress WS FTP Via Multiple Attack Chains 3
labs

Threat Actors Actively Exploiting Progress WS_FTP via Multiple Attack Chains

Alex Delamotte & Christian Vrescak / October 9, 2023

Vulnerable instances of Progess WS_FTP are being targeted by opportunistic attackers leveraging LOLBins to deliver Metasploit and remote access payloads.

Read More
CapraTube Transparent Tribes CapraRAT Mimics YouTube To Hijack Android Phones 3
labs
Advanced Persistent Threat

CapraTube | Transparent Tribe’s CapraRAT Mimics YouTube to Hijack Android Phones

Alex Delamotte / September 18, 2023

Pakistan-aligned threat actor weaponizes fake YouTube apps on the Android platform to deliver mobile remote access trojan spyware.

Read More
Cloudy With A Chance Of Credentials AWS Targeting Cred Stealer Expands To Azure GCP 9
labs
Crimeware

Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP

Alex Delamotte / July 13, 2023

Cloud credentials stealing campaign expands to target Azure and Google Cloud via unpatched web app vulnerabilities.

Read More
Rhysida Ransomware RaaS Crawls Out Of Crimeware Undergrowth To Attack Chilean Army 3
labs

Rhysida Ransomware | RaaS Crawls Out of Crimeware Undergrowth to Attack Chilean Army 

Alex Delamotte & Jim Walter / June 29, 2023

Read this technical breakdown of Rhysida ransomware and learn about its recent attacks on government institutions. Hunting rules and indicators included.

Read More
Hypervisor Ransomware Multiple Threat Actor Groups Hop On Leaked Babuk Code To Build ESXi Lockers
labs
Crimeware

Hypervisor Ransomware | Multiple Threat Actor Groups Hop on Leaked Babuk Code to Build ESXi Lockers

Alex Delamotte / May 11, 2023

Availability of leaked Babuk source code is fuelling a proliferation of file lockers targeting VMware ESXi.

Read More
Dissecting AlienFox The Cloud Spammers Swiss Army Knife 13
labs
Adversary

Dissecting AlienFox | The Cloud Spammer’s Swiss Army Knife

Alex Delamotte / March 30, 2023

A sophisticated new toolset is being used to harvest credentials from multiple cloud service providers, including AWS SES and Microsoft Office 365.

Read More
IceFire Ransomware Returns Now Targeting Linux Enterprise Networks 8
labs
Crimeware

IceFire Ransomware Returns | Now Targeting Linux Enterprise Networks

Alex Delamotte / March 9, 2023

New Linux version of the IceFire ransomware have been observed in recent network intrusions of media and entertainment enterprises.

Read More
Previous
1 2
Next

SentinelLabs

In the era of interconnectivity, when markets, geographies, and jurisdictions merge in the melting pot of the digital domain, the perils of the threat ecosystem become unparalleled. Crimeware families achieve an unparalleled level of technical sophistication, APT groups are competing in fully-fledged cyber warfare, while once decentralized and scattered threat actors are forming adamant alliances of operating as elite corporate espionage teams.

Recent Posts

  • Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
    March 19, 2026
  • LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
    March 17, 2026
  • From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
    March 9, 2026

Sign Up

Get notified when we post new content.

Thanks! Keep an eye out for new content!

  • Twitter
  • LinkedIn
©2026 SentinelOne, All Rights Reserved.