News

SentinelOne Foils China-Linked Breach, Traces Hackers to 70 Plus Global Victims

Endpoint-security vendor SentinelOne says a failed break-in at its own systems has led investigators to a sprawling espionage campaign that quietly penetrated dozens of government and critical-infrastructure networks across five continents.


How the Plot Unravelled

  • October 2024, Recon on SentinelOne: Attackers mapped one of the company’s internet-facing servers in a “stage-one” probe, which SentinelOne attributes to PurpleHaze, a China-nexus threat cluster linked to long-running espionage crew APT15.

  • Early 2025, Supply-Chain Intrusion: Weeks later the same operatives slipped into an IT-services provider that manages SentinelOne hardware, this time deploying the modular ShadowPad backdoor. The firm says no customer environments were compromised.

  • Victimology: Forensic pivoting from the two incidents exposed more than 70 organisations, ranging from a South Asian government ministry to a European media conglomerate, targeted between July 2024 and March 2025. Affected sectors include energy, manufacturing, finance, telecoms and research.


Playbook and Toolset

Tool or Technique Purpose Notable Use
GoReShell backdoor Reverse-SSH tunnelling written in Go Used in the South Asian government attack
ShadowPad malware Modular post-exploitation platform Deployed in the supply-chain vendor hack, overlapping with APT15 tradecraft
THC open-source utilities Lateral movement and privilege gain First recorded nation-state use of tools from The Hacker’s Choice collective
Ivanti CSA zero-days (CVE-2024-8963 and 8190) Pre-auth code execution for initial access Chained during the media-company breach, indicating UNC5174 involvement

Why Security Vendors Are Prime Targets

Breaching a security firm offers attackers outsized returns. Access to product roadmaps, detection logic and customer deployments can help adversaries craft stealthier exploits against downstream victims. SentinelOne’s researchers note that cybersecurity companies sit at the crossroads of visibility and trust, making them irresistible to nation-state operators.


What Comes Next

  • Patching Urgency: CISA urges organisations to apply Ivanti CSA fixes and hunt for GoReShell and ShadowPad artefacts in their networks.

  • Supply-Chain Scrutiny: The incident underscores growing attacker focus on third-party IT providers as gateways to better-defended targets.

  • Threat-Intel Collaboration: SentinelOne is sharing indicators of compromise with CERTs worldwide to contain further spread.

SentinelOne’s quick detection averted damage to its customers, yet the episode is a fresh reminder that even companies dedicated to stopping breaches must constantly defend against them.

Photo Credit: DepositPhotos.com

Leave a Reply

Your email address will not be published. Required fields are marked *