Security Chat (@phishsecurity) 's Twitter Profile
Security Chat

@phishsecurity

Keeping an eye on the cyber security sector. How much is marketing nonsense?

ID: 3727316441

calendar_today21-09-2015 10:34:28

8,8K Tweet

1,1K Takipçi

807 Takip Edilen

Security Chat (@phishsecurity) 's Twitter Profile Photo

Incredible what security teams can access for free these days. silentpush.com/blog/silent-pu… #informationsecurity #threatintelligence #freecybertools

Security Chat (@phishsecurity) 's Twitter Profile Photo

404media.co/a-network-of-a… Very interesting watering hole attack by Fin7- going for the AI nude audience #ThreatIntelligence #cybersecuritytips initial investigation by Silent Push

Matthew (@embee_research) 's Twitter Profile Photo

Nice and Simple Scattered Spider Pivots - Thanks to Initial Intel and previous posts from Chris Duggan 1⃣ Regex Pattern And Server Header 2⃣ Regex, Server Header and ASN 3⃣ Regex, Dates, ASN and Name Server Utilising Domain Search and Web Scanner from Silent Push

Nice and Simple Scattered Spider Pivots - Thanks to Initial Intel and previous posts from <a href="/TLP_R3D/">Chris Duggan</a> 

1⃣ Regex Pattern And Server Header 
2⃣ Regex, Server Header and ASN 
3⃣ Regex, Dates, ASN and Name Server 

Utilising Domain Search and Web Scanner from <a href="/silentpush/">Silent Push</a>
MalwareHunterTeam (@malwrhunterteam) 's Twitter Profile Photo

Fake Google Chrome download site: https://google.[tw].cn/ The SSL cert for this domain has been given by "Google Trust Services". Not think I have to say anything about it... 🤷‍♂️

Fake Google Chrome download site: https://google.[tw].cn/
The SSL cert for this domain has been given by "Google Trust Services". Not think I have to say anything about it...
🤷‍♂️
Fox_threatintel (@banthisguy9349) 's Twitter Profile Photo

In this type of field its important to never rely on one tooling. Nothing is the holy grail in my opinion. So combine the bunch to that overview going. I just learned that you can use several datasources Silent Push Lets see what I can find with open-dir datasource.

In this type of field its important to never rely on one tooling. Nothing is the holy grail in my opinion. So combine the bunch to that overview going. 
I just learned that you can use several datasources <a href="/silentpush/">Silent Push</a> 

Lets see what I can find with open-dir datasource.
Fox_threatintel (@banthisguy9349) 's Twitter Profile Photo

Silent Push searching on keywords that are often used by threatactors can bring you to juicy open directories! hxxp://84.247.147.214:8080/ uhoh, the worst ransomware I have seen.

<a href="/silentpush/">Silent Push</a> searching on keywords that are often used by threatactors can bring you to juicy open directories!

hxxp://84.247.147.214:8080/

uhoh, the worst ransomware I have seen.
Silent Push (@silentpush) 's Twitter Profile Photo

We're seeing lots of similar #phishing domains to those reported by John Hammond 🚨 The actors are using consistent naming schemes and web hosting software that we can capture with a search query. The actors have also made two other woopsies that we'll show down below👇

We're seeing lots of similar #phishing domains to those reported by <a href="/_JohnHammond/">John Hammond</a> 🚨

The actors are using consistent naming schemes and web hosting software that we can capture with a search query. 

The actors have also made two other woopsies that we'll show down below👇
Zach Edwards (@thezedwards) 's Twitter Profile Photo

Our team Silent Push just dropped a definitive look at SocGholish (operated by TA569) and the initial access broker ecosystem they are facilitating. Big thanks to past researchers who have worked on SocGholish! We've got details about our visibility @ silentpush.com/blog/socgholis… 🖖🏻

Our team <a href="/silentpush/">Silent Push</a> just dropped a definitive look at SocGholish (operated by TA569) and the initial access broker ecosystem they are facilitating. Big thanks to past researchers who have worked on SocGholish! We've got details about our visibility @ silentpush.com/blog/socgholis… 🖖🏻
Silent Push (@silentpush) 's Twitter Profile Photo

NEW THREAT REPORT 🚨 We're tracking the spread of a new malware loader we have named “CountLoader,” that is strongly associated with Russian ransomware gangs. 🇷🇺 Read: hubs.ly/Q03JNJMJ0 #countloader #threat #russia #ukraine #cybersecurity #ransomware

NEW THREAT REPORT 🚨 We're tracking the spread of a new malware loader we have named “CountLoader,” that is strongly associated with Russian ransomware gangs. 🇷🇺

Read: hubs.ly/Q03JNJMJ0

#countloader #threat #russia #ukraine #cybersecurity #ransomware
Lontz (@lontze7) 's Twitter Profile Photo

Expanding Google Careers phishing indicators with Validin Lookalike Domains & Silent Push WHOIS Scanner 807 total indicators - This campaign is massive. sample regex: /^(apply|hire|start)\.g(recruit|talent|team|app|hiring|hire|career)[a-z]+\.com$/ pastebin.com/UxmPwpQJ

Expanding Google Careers phishing indicators with <a href="/ValidinLLC/">Validin</a> Lookalike Domains &amp; <a href="/silentpush/">Silent Push</a> WHOIS Scanner

807 total indicators - This campaign is massive.

sample regex: /^(apply|hire|start)\.g(recruit|talent|team|app|hiring|hire|career)[a-z]+\.com$/

pastebin.com/UxmPwpQJ
MalasadaTech (@malasadatech808) 's Twitter Profile Photo

Some more PoisonSeed domains! The ones at the top were created just 30 minutes ago! They don't appear to be up yet. Block it proactively! ytcareersstaffing[.]com ytcareersprospect[.]com ytcareersdesk[.]com ytcareersjob[.]com ytcareersgroup[.]com ytcareersopportunity[.]com

Some more PoisonSeed domains! The ones at the top were created just 30 minutes ago! They don't appear to be up yet. Block it proactively!

ytcareersstaffing[.]com
ytcareersprospect[.]com
ytcareersdesk[.]com
ytcareersjob[.]com
ytcareersgroup[.]com
ytcareersopportunity[.]com
Gi7w0rm (@gi7w0rm) 's Twitter Profile Photo

Rumors are spreading about a mayor #LawEnforcement operation against #Rhadamanthys #Stealer. Who said what? and me have been monitoring the situation closely. -Rhada domains under active law enforcement control - Customers are adviced to delete all servers Image via club1337

Rumors are spreading about a mayor #LawEnforcement operation against #Rhadamanthys #Stealer.
<a href="/g0njxa/">Who said what?</a> and me have been monitoring the situation closely.
-Rhada domains under active law enforcement control
- Customers are adviced to delete all servers

Image via club1337
VMblog (@vmblog) 's Twitter Profile Photo

As we prepare for 2026, we can look back on what happened in 2025 to forecast the types of threats the global community will encounter in the new year. Kasey Best of @SilentPush offers #predictions and #trends to watch out for. vmblog.com/archive/2025/1… #AI #ransomware #security

As we prepare for 2026, we can look back on what happened in 2025 to forecast the types of threats the global community will encounter in the new year. Kasey Best of @SilentPush offers #predictions and #trends to watch out for. vmblog.com/archive/2025/1…

#AI #ransomware #security
Silent Push (@silentpush) 's Twitter Profile Photo

The FBI has reported a series of fake websites impersonating the Internet Crime Complaint Center (IC3) for phishing attacks. The sites are near pixel perfect copies of the official IC3 site, and are used to gather personal information from users for later targeting with

The <a href="/FBI/">FBI</a> has reported a series of fake websites impersonating the Internet Crime Complaint Center (IC3) for phishing attacks. 

The sites are near pixel perfect copies of the official IC3 site, and are used to gather personal information from users for later targeting with