Profile avatar
silentpush.bsky.social
Preemptive cyber intelligence that exposes threat actor infrastructure as it’s being set up. Indicators of Future Attack (IOFA) enable the proactive blocking of hidden threatsΒ to prevent attacks and avoid loss. Join today: explore.silentpush.com/register
12 posts 34 followers 91 following
Regular Contributor

Amazing report from the team at @silentpush.bsky.social identifying Lazarus infrastructure used in the ByBit cryptocurrency heist. Check it out here - www.silentpush.com/blog/lazarus...

🚨 Silent Push has pivoted into new Lazarus APT infrastructure, acquiring sensitive intel related to $1.4B ByBit hack and past attacks. πŸ‘‰ Read the full investigation: www.silentpush.com/blog/lazarus... #LazarusAPT #NorthKorea #cyberattack #ByBit #cybersecurity #threatintelligence

With just 2% of global threat infrastructure tracked at any time, organizations are blind to 98% of the threat landscape – leaving them stuck in a reactive battle against unseen cyberattacks. πŸ₯Š Read: www.silentpush.com/blog/why-tak... #cybersecurity #cyberresilience #threatdetection #cyberattack

🚨 THREAT ALERT 🚨 We've uncovered unique patterns in threat actor Lumma Stealer's domain clusters Read: hubs.ly/Q037XfBp0 Let us know your thoughts in the comments πŸ’­ #lummastealer #C2 #malware #cyberincident #threatintelligence #cybersecurity #infostealer

10 DAYS until our webinar: 'Infrastructure Laundering', hosted by Kasey Best. πŸ“ Register: hubs.ly/Q037WXfB0 Threat actors are renting IPs from mainstream cloud providers to enable persistent cybercrime while staying ahead of takedown efforts. #cybersecurity #infosec #cybercrime

As adversaries evolve their strategies to evade detection, a preemptive approach ensures you don’t just react – you prevent. πŸ”— Read blog: www.silentpush.com/blog/outsmar... #threatintelligence #preemptive #CTI #cybersecurity #IOFA

Quick Tip for Hunting #Lumma Domains By Checking WHOIS Records 🏹 Lumma actors often create #C2 domains in (likely automated) batches, leading to clusters of domains sharing extremely similar registration times that can be queried with a Silent Push #WHOIS search πŸ‘€

WHOIS data helps track threats but scaling analysis is tough. Silent Push simplifies this with our free WHOIS Scanner: βœ… Retrieve WHOIS infrastructure πŸ”„ Pivot to related DNS, IPs & more 🎯 Use filters for precise results Try our free Community Edition: πŸ‘‡ explore.silentpush.com/register #CTI

Traverse hidden adversary infrastructure with Silent Push WHOIS scanning. Start with just a domain owner’s email address, and pivot to uncover attacker TTPs quickly and accurately. πŸ” Learn how: hubs.ly/Q035yVVR0 #threatintelligence #WHOIS #cybersecurity #threatanalyst

🚨 NEW BLOG 🚨 Threat actors still leveraging legit RMM tool ScreenConnect for persistence in cyberattacks... Read: www.silentpush.com/blog/screenc... We've detected increased ScreenConnect abuse on BPHs, revealing a campaign targeting Social Security recipients. #cyber #threatintelligence #CTI

We uncovered a sophisticated technique we’re calling 'Infrastructure Laundering', used by FUNNULL CDN (aka Triad Nexus) to keep malicious domains online. 🌐 The security community must move beyond reactive takedowns and address this issue proactively: www.silentpush.com/blog/infrast... #CTI #cyber

app.silentpush.com/shared/594ed.... There is a current campaign against twitter users. You can find more on our community app www.silentpush.com/community-ed... #cybersecurity #phishing #threatintelligence