silentpush Profile Banner
Silent Push Profile
Silent Push

@silentpush

Followers
2K
Following
179
Media
637
Statuses
2K

Preemptive cyber defense with Indicators of Future Attackโ„ข. Know First.

Reston, Virginia
Joined April 2020
Don't wanna be here? Send us removal request.
@silentpush
Silent Push
2 days
New white paper on Bulletproof Hosting. ๐Ÿ‘‡ Access here: https://t.co/aYHGOMmJWj Understanding these "digital safe havens" is critical for any team focused on preemptive defense and infrastructure tracking. #cti #SOC #IR #whitepaper #bulletproofhosting #cybersec #infosec
0
9
34
@silentpush
Silent Push
16 days
Platform workshop on Dec 16: Detecting scam shops and websites Register here: https://t.co/qM51R3fmxH We'll cover infrastructure patterns and identification techniques for some current seasonal campaigns...๐ŸŽ #cti #fraud #scam
0
1
5
@silentpush
Silent Push
16 days
Two potential #SideCopy domains related to this alert ๐Ÿ‘€ You can discover these in our Community Edition by performing a reverse A (ipv4) lookup on the indicator initially shared by @ThreatBookLabs. updates[.]biossysinternal[.]com sync[.]amsisupport[.]com
@ThreatBookLabs
ThreatBook
3 months
Threat Alert: #SideCopy: New Malware Sample Observed Hash: 17b7f9f5c6eaaa19a57890da4585cc25a86c2d007c2ea6c5f903c35bd0e06039 C2: backup[.]intelupates[.]com Analyst Note: Block/monitor the C2 and hashes immediately. ThreatBook Intelligence: https://t.co/QmlV4BQd3B
0
2
8
@silentpush
Silent Push
23 days
The @FBI has reported a series of fake websites impersonating the Internet Crime Complaint Center (IC3) for phishing attacks. The sites are near pixel perfect copies of the official IC3 site, and are used to gather personal information from users for later targeting with
0
9
13
@silentpush
Silent Push
25 days
STARTING TOMORROW ๐Ÿšจ Last chance to register for our workshops on strengthening your integrations for preemptive cyber defense. Register for SIEM session: https://t.co/nM4VySIEfF Register for SOAR session: https://t.co/Uj1sOTxroF
0
1
4
@silentpush
Silent Push
1 month
Yesterday, a series of #Latrodectus domains appeared on ThreatFox and within the day, a series of Virustotal comments followed. Luckily, our Threat Feeds knew about the domains for weeks, and in one case, even 96 days in advance ๐Ÿ”ฅ
0
3
8
@silentpush
Silent Push
1 month
Browsing to the sites suggests that they are likely a crypto drainer or similar operation.
0
0
0
@silentpush
Silent Push
1 month
Other domains related to this #scam, which are all recently created and largely linked to the same ipv4 address.
1
0
1
@silentpush
Silent Push
1 month
X users are reporting a stream of #phishing emails that are impersonating Pepsi and @Opensea . Here are some domains related to the scam, which initially appears to be a #crypto drainer seapepsi[.com pepsicopensea[.com pepsicollections[.com micdrop-market[.io (More Below ๐Ÿ‘‡)
1
3
2
@silentpush
Silent Push
1 month
New Community Edition guide: Four advanced threat hunting techniques to detect phishing infrastructure: https://t.co/gDE6J5IYE7 Every reactive investigation is an opportunity to build a proactive hunt. ๐Ÿ’ช #cti #threathunting
Tweet card summary image
silentpush.com
Access four practical, query-based techniques that defenders can use to shift "left of boom" to proactively dismantle phishing campaigns.ย 
0
5
16
@silentpush
Silent Push
1 month
Interesting blog on UNC3782โ€™s typosquat & crypto phishing ops by Mees van Wickeren using the Silent Push platform. Check it out: https://t.co/xTP0e0KR4f (you can use our Community Edition to search some of the infrastructure: https://t.co/blGqWia4dw)
0
1
6
@blackorbird
blackorbird
1 month
Phishing cryptocurrency domains #IOCs https://t.co/1g3jC5twuW
@blackorbird
blackorbird
3 years
APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations https://t.co/poVU3eVnlT
1
10
45
@virusbtn
Virus Bulletin
1 month
Mees van Wickeren uncovers unreported domains, IPs and emails linked to UNC3782, expanding the open-source indicators on this DPRK cluster. https://t.co/kUg4kppx5u
1
7
17
@silentpush
Silent Push
1 month
Heads up โ€“ weโ€™re doing a webinar this Thursday on Domain Search + PADNS early detection, with a few real-world examples from #Kimsuky, #TA2726, and #Mintsloader investigations. Register here ๐Ÿ‘‰
Tweet card summary image
info.silentpush.com
Stay ahead of attacks by turning Silent Push's extensive PADNS and scan data into an early warning system.
1
2
7
@silentpush
Silent Push
1 month
SOC analysts: validate alerts faster, reduce noise, and act weeks before attacks hit. Silent Push Threat Check + SIEM/SOAR = smarter, faster, preemptive defense. ๐Ÿ”— https://t.co/VxSwVonAjr #SOC #SOAR #API #CTI #cybersec
0
0
6
@silentpush
Silent Push
1 month
Reveal malicious infrastructure being setup by attackers, explore key domain lifecycle signals, and get real-world early detection examples from APT and malware campaigns. ๐Ÿ”— Register for our upcoming webinar on 13 November: https://t.co/9mdHX6kEg1 #webinar #CTI #cybersec
0
0
4
@silentpush
Silent Push
1 month
Interesting movement of a #Lumma domain ๐Ÿ‘€ Initially registered with Dynadot and parked on #Amazon (16509), before being rotated between 6 separate C2 IP's across 5 other ASN's. Currently the #C2 domain resolves to an IP on DigitalOcean.
0
1
5
@silentpush
Silent Push
1 month
DORA calls for a shift left of boom, to identify and neutralize BEFORE compromise. ๐Ÿ”’ At Silent Push, we built our platform to do exactly this. Read more on mastering DORA compliance with preemptive cyber defense: https://t.co/pjEnUbcfkd
0
0
2
@silentpush
Silent Push
1 month
Encountered a domain related to #Fakeupdates? Here's a quick trick to identify sites it may have compromised. 1. Find a suspected Fakeupdates domain 2. Search it in our "Web Resources" tab. 3. Set external flag to "true" 4. Enjoy your list of (likely) compromised sites ๐Ÿ”ฅ
0
0
7