Silent Push
@silentpush
Followers
2K
Following
179
Media
637
Statuses
2K
Preemptive cyber defense with Indicators of Future Attackโข. Know First.
Reston, Virginia
Joined April 2020
New white paper on Bulletproof Hosting. ๐ Access here: https://t.co/aYHGOMmJWj Understanding these "digital safe havens" is critical for any team focused on preemptive defense and infrastructure tracking. #cti #SOC #IR #whitepaper #bulletproofhosting #cybersec #infosec
0
9
34
Big news: Silent Push has acquired HYAS ๐ฏ Get the full details here: https://t.co/r5U2AhgdiG
#hyas #silentpush #insight #cti #soc #ir
silentpush.com
Acquisition strengthens Silent Pushโs capabilities to deliver deeper visibility, stronger intelligence, and enhanced defensive outcomes.
0
0
1
Platform workshop on Dec 16: Detecting scam shops and websites Register here: https://t.co/qM51R3fmxH We'll cover infrastructure patterns and identification techniques for some current seasonal campaigns...๐ #cti #fraud #scam
0
1
5
Two potential #SideCopy domains related to this alert ๐ You can discover these in our Community Edition by performing a reverse A (ipv4) lookup on the indicator initially shared by @ThreatBookLabs. updates[.]biossysinternal[.]com sync[.]amsisupport[.]com
Threat Alert: #SideCopy: New Malware Sample Observed Hash: 17b7f9f5c6eaaa19a57890da4585cc25a86c2d007c2ea6c5f903c35bd0e06039 C2: backup[.]intelupates[.]com Analyst Note: Block/monitor the C2 and hashes immediately. ThreatBook Intelligence: https://t.co/QmlV4BQd3B
0
2
8
The @FBI has reported a series of fake websites impersonating the Internet Crime Complaint Center (IC3) for phishing attacks. The sites are near pixel perfect copies of the official IC3 site, and are used to gather personal information from users for later targeting with
0
9
13
STARTING TOMORROW ๐จ Last chance to register for our workshops on strengthening your integrations for preemptive cyber defense. Register for SIEM session: https://t.co/nM4VySIEfF Register for SOAR session: https://t.co/Uj1sOTxroF
0
1
4
Yesterday, a series of #Latrodectus domains appeared on ThreatFox and within the day, a series of Virustotal comments followed. Luckily, our Threat Feeds knew about the domains for weeks, and in one case, even 96 days in advance ๐ฅ
0
3
8
Browsing to the sites suggests that they are likely a crypto drainer or similar operation.
0
0
0
Other domains related to this #scam, which are all recently created and largely linked to the same ipv4 address.
1
0
1
New Community Edition guide: Four advanced threat hunting techniques to detect phishing infrastructure: https://t.co/gDE6J5IYE7 Every reactive investigation is an opportunity to build a proactive hunt. ๐ช #cti #threathunting
silentpush.com
Access four practical, query-based techniques that defenders can use to shift "left of boom" to proactively dismantle phishing campaigns.ย
0
5
16
Interesting blog on UNC3782โs typosquat & crypto phishing ops by Mees van Wickeren using the Silent Push platform. Check it out: https://t.co/xTP0e0KR4f (you can use our Community Edition to search some of the infrastructure: https://t.co/blGqWia4dw)
0
1
6
Phishing cryptocurrency domains #IOCs
https://t.co/1g3jC5twuW
1
10
45
Mees van Wickeren uncovers unreported domains, IPs and emails linked to UNC3782, expanding the open-source indicators on this DPRK cluster. https://t.co/kUg4kppx5u
1
7
17
Heads up โ weโre doing a webinar this Thursday on Domain Search + PADNS early detection, with a few real-world examples from #Kimsuky, #TA2726, and #Mintsloader investigations. Register here ๐
info.silentpush.com
Stay ahead of attacks by turning Silent Push's extensive PADNS and scan data into an early warning system.
1
2
7
Reveal malicious infrastructure being setup by attackers, explore key domain lifecycle signals, and get real-world early detection examples from APT and malware campaigns. ๐ Register for our upcoming webinar on 13 November: https://t.co/9mdHX6kEg1
#webinar #CTI #cybersec
0
0
4
DORA calls for a shift left of boom, to identify and neutralize BEFORE compromise. ๐ At Silent Push, we built our platform to do exactly this. Read more on mastering DORA compliance with preemptive cyber defense: https://t.co/pjEnUbcfkd
0
0
2
Encountered a domain related to #Fakeupdates? Here's a quick trick to identify sites it may have compromised. 1. Find a suspected Fakeupdates domain 2. Search it in our "Web Resources" tab. 3. Set external flag to "true" 4. Enjoy your list of (likely) compromised sites ๐ฅ
0
0
7