- Company
Silent Push Inc. ©2025
Funding will fuel global expansion of the company’s unrivaled ability to identify pre-weaponized attacker infrastructure through its Indicators of Future Attacks (IOFA) data.
Reston, VA., December 11, 2024 – Silent Push, the leading preemptive cybersecurity intelligence company, announced today its $10 million financing round co-led by Ten Eleven Ventures and Stepstone Group LP. This combined with its early seed round brings its total funding to $22 million. The latest round of funding will accelerate Silent Push’s global expansion in EMEA and APJ regions and strengthen its go-to-market efforts to meet growing demand.
Silent Push has also recently been deemed awardable on the Tradewinds Solutions Marketplace, where the company was recognized among a competitive field of applicants whose solutions demonstrated innovation, scalability, and potential impact on DoD missions. Government customers interested in viewing the video solution can create a Tradewinds Solutions Marketplace account at tradewindAI.com.“We’ve met a big milestone with our acceptance into the Tradewinds Solutions Markeplace to streamline the procurement process. This provides faster access to our platform and services to enable the DoD to better track threats and it removes barriers for innovative startups like Silent Push,” said Ken Bagnall, CEO of Silent Push.
Silent Push provides a complete view of emerging threat infrastructure in real-time, exposing cyber-attackers and revealing malicious intent all within a single platform and enabling customers to avoid financial and brand reputational loss. This early warning system approach delivers preemptive cyber defense (PCD) through actionable threat intelligence from its Indicators of Future Attacks (IOFA) data at a speed unrivaled in the industry.
As cybercrimes rise and the attack surface grows, Silent Push is leading the global threat detection transformation, trusted by Fortune 500 companies, government agencies, and over 3,000 users. Some of the world’s largest companies are regular users including 50% of the Fortune 30.
“Silent Push continues to build on its one-of-a-kind approach to threat intelligence, continuously mapping out Internet-facing infrastructure to identify attackers setting up campaigns before they launch attacks,” noted Dave Palmer, General Partner of Ten Eleven Ventures. “The company continues to grow rapidly, both elevating the product and attracting many new customers who have been thrilled with the impact of this type of preemptive intelligence on their security programs. We are excited to continue to support the team’s success and look forward to the next chapter ahead.”
Established cybersecurity veterans and Silent Push co-founders, Ken Bagnall (CEO) and John Jensen (CTO) mission is to change how intelligence is delivered and better inform organizations about global adversaries. They have worked together for over 15 years, most recently at FireEye, Inc., who acquired their previous company, The Email Laundry—software that protected email from malware, phishing, spam, and other advanced threats for over 10,000 organizations worldwide.
The Silent Push threat intelligence team shares ongoing insights on dangerous adversaries. Follow its blog and check out its most recent findings on FIN7 and Triad Nexus exposing FUNNULL criminal campaigns.
The Tradewinds Solutions Marketplace is a digital repository of post-competition, readily awardable pitch videos that address the Department of Defense’s (DoD) most significant challenges in the Artificial Intelligence/Machine Learning (AI/ML), data, and analytics space. All awardable solutions have been assessed through complex scoring rubrics and competitive procedures and are available to Government customers with a Marketplace account. Government customers can create an account at www.tradewindai.com. Tradewinds is housed in the DoD’s Chief Digital Artificial Intelligence Office.
For more information or media requests, contact: [email protected]
Silent Push Threat Analysts have been tracking the activity of a threat actor we’ve dubbed “Aggressive Inventory Zombies” (AIZ) throughout 2024, which has been noticeably ramping up over the past few months.
Our observations of a few suspicious domains impersonating Etsy led to the discovery of a large-scale phishing and pig-butchering network targeting retail brands and a crypto phishing campaign.
Silent Push Threat Analysts recently observed a few suspicious domains appearing to impersonate the e-commerce company Etsy—something we initially thought was timely for the 2024 holiday season. Further investigation, however, led us to uncover a large-scale phishing campaign and a crypto phishing network.
We found that the retail phishing campaign extends beyond Etsy and targets major retailers, including, but not limited to, Amazon, BestBuy, eBay, Rakuten, Wayfair, and more.
The threat actor has been using a popular website template to build phishing websites and appears to primarily conduct phishing activities over chat services integrated into the sites. Based on some sensitive details acquired when testing the phishing process on retail sites, our team can confirm that the threat actor has some financial ties to India.
It’s clear that the threat actor behind this AIZ retail campaign is also targeting crypto audiences, and the scale of the sites in this network proves this is a substantial effort.
This blog’s research will begin with our understanding of the AIZ retail network and then provide additional context about the crypto sites and other infrastructure we found.
Silent Push Enterprise users have access to two dedicated IOFA Feeds containing all the true positive domains and IPs we gathered during our research.
For operational security reasons, we are unable to share the exact specifics of each query and pivot utilized. Silent Push Enterprise customers have access to a dedicated AIZ Retail & Crypto Phishing Network TLP: Amber report, which contains all the relevant data types and pivot points we used to track the infrastructure referenced in this blog.
Register for our free Community Edition to use all of the tools and queries mentioned in this blog.
Silent Push Threat Analysts have been tracking a threat actor’s activity throughout 2024 that has been noticeably ramping up over the past few months. Our discovery of its large-scale phishing campaign began with our researchers observing suspicious domains appearing to impersonate Etsy.
Extending beyond Etsy, the phishing campaign targets major retailers and marketplaces, including, but not limited to, Amazon, BestBuy, Costco, eBay, Rakuten, and Wayfair.
The threat actor has been using a popular website template with nearly 9,000 sales, available for purchase publicly on Envato, to build its retail phishing sites. These sites feature dozens to hundreds of products that appear to have been scraped from other sites. Searching the exact title of products in popular search engines exposed additional websites in the threat actor’s network.
The threat actor appears to be primarily conducting its phishing activity over chat services integrated into the websites, with some sites not having working checkout systems. Based on some sensitive details acquired when testing the phishing process, our team can confirm this threat actor has financial ties to India.
As the Silent Push Threat Analyst Team dug deeper into the activities of the AIZ retail phishing network, we discovered the threat actor is also targeting crypto audiences. We researched reused metadata to find a huge pool of crypto phishing sites targeting Binance, Kraken, and a variety of other generic crypto brands.
After completing our initial research and starting the process of alerting impacted organizations, we requested a takedown of some domains hosted on Stark Industries (AS44477). Within half an hour, Stark had not only taken down the offending host but was also able to connect the account that had registered that IP to 34 other IPs, some of which hosted similar retail phishing websites but also several new groupings of crypto phishing websites. This Stark lead also allowed us to pivot into even more of their infrastructure.
While reviewing recently registered domains, Silent Push Threat Analysts found a few appearing to impersonate the official Etsy store, a popular e-commerce company that specializes in the sale of handmade/vintage goods and craft supplies.

We found a short list of six domains, all targeting Etsy:

The six domains appearing to target Etsy were mapped to 2.56.178[.]87 – and four live sites all utilize the same theme:



While doing the initial investigation, Silent Push Threat Analysts realized the Etsy-targeted sites all shared a website theme and some common code. We began to look for potential pivots.
We experimented with our research by performing Silent Push Web Scanner queries on Amazon, BestBuy, and eBay in the following examples:





After spot-checking approximately 1,300 brands, starting with Etsy and then searching Amazon, BestBuy, eBay, and many more, we gathered a list of true positive hits in this phishing network, including but not limited to Etsy, Allegro, AliExpress, Amazon, ASOS, BestBuy, eBay, Costco, Flipkart, Rakuten, Shopee, Temu, TikTok, Wayfair, and Wish.

The threat actor’s malicious websites feature products that appear to have been scraped from other sites. Searching for the exact title of products in popular search engines exposes more websites in the network. These websites feature dozens (to hundreds) of products that could show up on specific search results.
One example is a Google shopping search for the term “Fashion Women’s PU Leather Handbags Tote Purse Crossbody Messenger Satchel Bags” that results in:

The “Contact Info” on the Etsy sites includes a real Etsy phone number but a fake email address such as “etsys6151@gmail[.]com.”
Additional emails used by this network include:
Payment methods on the sites include crypto and methods of payment not accepted at Etsy:

On some sites in the network, navigating to a product and then adding it to the cart starts the purchase process, which leads to a checkout page with three payment options: PayPal, “Cash on Delivery,” or Tether/(USDT) cryptocurrency:

When attempting to test this purchase flow on etsyappstoreglobal[.]com, the PayPal option wasn’t available, the “Cash on Delivery” option provided no details, and the Tether option didn’t have a wallet ID to send the money. The website was using a chat widget from crisp[.]chat, a French company founded in 2015.
When we reviewed another store in the network, ai-tiktok[.]top, we uncovered different purchase options. The “Customer Service” option includes what appears to be an effort to obtain a bank account number and routing details—essentially a checking account phishing effort.

The same site, ai-tiktok[.]top, has an option for “USDT” (Tether) that appears to have a wallet address of “THNjjnCzxyiMrzhm6mrn36wLhUe2raoS4k” which appears to be a wallet containing only about $30. It’s unclear if this is the real threat actor’s wallet or if a generic one was embedded here.

The menu bar on this ai-tiktok[.]top TikTok site features a prominent “Online Customer Service” link that redirects to chat.ssrchat[.]com/service and a unique chat session ID.

On the TikTok Shop ai-tiktok[.]top, the site’s “Online Customer Service” redirected our researchers to chat.ssrchat[.]com/service, and this is where customer support finally chimed in:



The support staff asked us, “When you are browsing the product, do you see the store information about the merchant?” This was alluding to a subtle “Contact the Merchant” link that can be easily overlooked:

Clicking the “Contact the merchant” button opens a chat widget to communicate with the “seller account” – as seen in this short video (click the “Play” icon in the lower left corner to view):
While hosting a seemingly inefficient phishing process on at least some of the websites, this network seems to operate like a common e-commerce phishing network.
On this same TikTok site, the option to “Register Your Shop” includes a request for the front/back of an ID card, which could be part of an effort to acquire credentials:

The menu bar on the ai-tiktok[.]top TikTok site features a prominent “Online Customer Service” link that redirects to chat.ssrchat[.]com/service and a unique chat session ID.
In this support portal, the threat actors communicated with website visitors, directing them on how to continue (in the scam).
Whenever Silent Push Analysts find a service like this, we always work to confirm whether the threat actors have built a customer support tool or if they are using a third-party resource.
After a brief investigation, our analysts confirmed ssrchat[.]com is a Chinese customer support tool called “SaleSmartly.”

The ssrchat[.]com website lists numerous Chinese companies using the platform, which appears to be a popular choice for certain Chinese organizations. In the footer of the website is a Chinese ID known as an “ICP license”—this “Internet Content Provider license” is required for most Chinese businesses on the mainland that send data through the Great Firewall.
The ICP license number for ssrchat[.]com is listed in their footer as “20046039”:

To learn about vendors this network is using, we used the Silent Push Web Scanner to find other organizations with the same ICP license number.
We found 21 unique hosts with matching data. The results include one domain standard-software[.]cn, that claims to own SaleSmartly and several other products, including adspower[.]net.
It appears the threat actor creating countless e-commerce phishing sites is using a Chinese “chat widget” product from a company with a product called AdsPower, which is a browser for ban evasion and managing multiple social media accounts.
We could spend time requesting takedowns of these likely phishing accounts abusing the ssrchat[.]com service, but knowing more about the parent company and confirming they don’t have any clear way to report abuse helps us save time. We changed our focus from takedown efforts to hosts, registrars, and third-party products being used that are more likely to support takedowns.
Across this network, there are some sites spoofing Amazon, such as amazonprime[.]id, designed to offer products only via bulk purchase with a minimum of 500 units, so the minimum purchase price is nearly $75,000 – this could be a mistake and potential way to find more of their sites:

While analyzing the initial pools of domains, along with additional domains found via the pivots below, it’s clear this network heavily uses “Live Chat” widgets. Most of the sites appear to use “Message Seller” and “Contact the Merchant” links on product pages, and many of them also have additional chat widgets from third-party companies embedded into the pages.
Outside of the sites using the Chinese chat widget from SaleSmartly, many appear to be using “Crisp” chat from crisp[.]chat.
Another grouping of sites from this network, like wayfairmy[.]cc, which targets Wayfair, uses livechat[.]com.
Our team reached out to Crisp Chat and Live Chat to share details and encourage them to investigate and potentially ban these clients.
Within hours of our report, Crisp Chat significantly escalated the research, banned the client, and took additional steps to look for any other sites where the threat actors were using their service. Our team at Silent Push thanks the Crisp Chat team for their prompt and serious response.
We are still waiting for feedback from Live Chat and will update the report if/when it arrives.
As part of the Silent Push commitment to collaborating with hosts, our team sent an initial lead to Stark Industries (stark-industries[.]solutions) about one of the IPs in this network hosting these domains, which was registered through the Stark Industries service.
Our initial IP shared with Stark Industries was taken down in less than half an hour, and they were able to conduct an investigation and take down even more infrastructure associated with this same account and threat actor – sending us a total of 34 new IPs, which provided deeper insight into the AIZ threat actor infrastructure.
Through our reporting process to web host Stark Industries, we were given an IP used by this threat actor, 45.144.30[.]184, to which the domain mapped to aml-check-wallet[.]com.
Performing a Web Scanner query confirmed that this domain used consistent metadata, which allowed us to pivot into several dozen other domains/hosts with the same content as the original source.
The cryptocurrency phishing sites in this network look like the example below:

One of the IP ranges shared by Stark Industries included 45.144.31[.]235 which has an odd grouping of sites hosted on it – several have the classic “shopping” structure like vipmydealshopgo[.]xyz, but others such as store-joo[.]org, group-joo[.]org, and global-joom[.]org have hosted pages that may have led to unique phishing or pig-butchering experiences. One site had a “Please Input Pass Code” message, which raises questions about the purpose of these sites:

One of the IPs shared by Stark Industries that this threat actor was using briefly hosted a site, “haiwaidemosite[.]com,” with the HTML title “MBN” in October 2024.
A huge pool of these crypto phishing sites can be found via reused metadata on the sites – targeting Binance, Kraken, and a variety of other generic crypto brands.

On an IP shared with us by Stark Industries, there are domains such as “pantera-exchange[.]com” with the HTML title “Pantera-Exchange.”
These sites look nearly identical to the “MBN” phishing sites, and there are hundreds of unique results with the same metadata targeting crypto audiences:

From another IP shared by Stark Industries, we can pivot into a small grouping of domains, such as klo-ok[.]cc.
This website had similar metadata to other new sites in the network, and by creating a proprietary query, we can pivot into about a dozen unique hosts. The results include an IP that has a live “crypto investment” website in Mandarin, albeit with somewhat broken functionality.

Another IP shared by Stark Industries used by this threat actor is connected to a grouping of websites that look similar, including:
While these sites now all appear to be down, at one point, they looked like this example:

Another IP taken down by Stark used by this threat actor is connected to domains like spsailexpsess[.]com, which appear to be targeting Aliexpress.
This site has unique indicators, resulting in hundreds of additional retail phishing sites being discovered.
One IP taken down and shared by Stark connects to a pool of websites targeting Bitcoin and other crypto tokens – likely for a phishing or pig-butchering scam.
These sites include:
Like many of this threat actor’s websites and campaigns, the site templates are unique and are being reused across the sites. As a result, we can find hundreds of crypto phishing efforts targeting major brands and what appears to be made up of crypto brands via this template.
Silent Push threat researchers will continue to observe and monitor changes to this actor’s infrastructure. New discoveries and TTP changes will be immediately reflected in our feeds.
We will also continue to share our research on threats like this with law enforcement. If you have any tips about this threat actor or other kinds of retail and crypto phishing scams, please consider sharing those details with our team.
We’re continuing to track the AIZ Retail & Crypto Phishing Network’s activity and will report our findings to the security community in a series of follow-up reports.
We’ve also published a TLP: Amber report for Enterprise users that contains links to the specific queries we’ve used to identify and traverse the AIZ Retail & Crypto Phishing Network—including proprietary queries that we’ve omitted from this blog for operational security reasons.
Silent Push believes all AIZ Retail & Crypto Phishing Network domains offer some level of risk.
Our analysts have constructed a Silent Push IOFA Feed that provides a partial list of AIZ Retail & Crypto Phishing Networks Indicators of Future Attack domains focused on their scams, along with an IOFA Feed containing suspect AIZ Retail & Crypto Phishing Network IPs.
Silent Push IOFA Feeds are available as part of an Enterprise subscription. Enterprise users can ingest IOFA Feed data into their security stack to inform their detection protocols or use it to pivot across attacker infrastructure using the Silent Push Console and Feed Analytics screen.
Silent Push Community Edition is a free threat-hunting and cyber defense platform featuring a range of advanced offensive and defensive lookups, web content queries, and enriched data types.
Click here to sign up for a free account.
Here is a sample list of AIZ Retail & Crypto Phishing Network IOFAs – our full list is available for enterprise users. Silent Push Enterprise clients have access to a domain and IP feed containing the AIZ Retail & Crypto Phishing Networks’ infrastructure: