Silent Push are tracking a Russia-linked threat actor who is deploying crypto scam domains targeting the US election, and US tech brands.| Silent Push
Silent Push Threat Analysts have used content similarity scans to reveal 2,500+ unique IOFA domains and IPs hosting illegal pharmacy content.| Silent Push
Silent Push tracks 2,000+ domains and IPs affected by ClickFix fake browser update malware, using proprietary JavaScript scans.| Silent Push
Explore the Silent Push blog for in-depth perspectives and innovative insights on threat intelligence security. Search by post type and category today.| Silent Push
Silent Push threat analysts are currently tracking a campaign that uses fake websites and social engineering to serve a copy of the AnyDesk remote access software to Windows and macOS users, that is then being used to steal data and money once installed on a victim's machine. Brands targeted include UK banks HSBC, Natwest, Lloyds,| Silent Push - We Know First
Silent Push Analysts have used content scans to reverse-engineer FIN7 TTPs, and uncover phishing and browser extension malware infrastructure targeting the following organizations: Louvre Museum, Meta, Reuters, Microsoft 365, Wall Street Journal, Midjourney, CNN, Quickbooks, Alliant, Grammarly, Airtable, Webex, Lexis Nexis, Bloomberg, and Quicken.| Silent Push - Know First
Silent Push Threat Analysts have uncovered 24 control panels administering MaaS services for a range of DukeEugene variants - including ERMAC, Hook, Loot, and Pegasus - targeting users of popular mobile banking software and crypto currency exchanges.| Silent Push - We Know First