Community Corner Web Scanner with Maulik Limbachiya

Webinar: Community Corner – Web Scanner & Live Q&A

Details

  • Date: October 8, 2024, 11am EST
  • Level: All Silent Push platform users welcome
  • Duration: 30 mins (20 mins + 10 min Q&A)

About

Join us on 8 October at 11 AM EST for our second Community Corner session, where Director of Sales Engineering Maulik Limbachiya will guide you through an in-depth look at our popular Web Scanner tool. This session will cover:

  • An overview of common Web Scanner use cases
  • Step-by-step instructions on how to run a Web Scanner query
  • Tips on pivoting from Web Scanner results to map additional infrastructure

Following the presentation, we’ll host a live Q&A, giving you the chance to ask any questions you have about the platform or specific features.

Feel free to submit your questions before any of our monthly Community Corner sessions in our Q&A box here. Otherwise, you’ll have the opportunity to ask them in the live session.


Haven’t registered for Silent Push Community Edition yet? Don’t worry, you can sign-up here for free and take advantage of our powerful scanning engine and range of offensive/defensive tools including Web Scanner and Live Scan:


"Tis the season to be wary": Silent Push tracks Russia-linked threat actor involved in US political spoofing and crypto giveaway scams. Large cluster of IOFA domains discovered.

Executive Summary

Silent Push Threat Analysts are tracking a threat actor, with links to Russia, who is actively deploying domains involved in crypto scams targeting the US Presidential Election, and prominent US tech brands.

The scams involve fake giveaways of Bitcoin and Ethereum cryptocurrency. Users are being asked to send coins to an attacker-controlled wallet, with the promise of double the amount of coins being returned to them.

Our research has unearthed a large number of websites featuring prominent US political figures, business leaders and global brand names advertising the fake giveaways, with counterfeit legal letters from US Government agencies attached to the domains to add legitimacy to the scam.

Individuals targeted include Former President Donald Trump, Vice President Kamala Harris, Apple CEO Tim Cook, Elon Musk, MicroStrategy co-founder Michael Saylor, Former Congressman Gene Green, Former Congressman Pete Olson, Peggy Kim (SEC), and Kerry O’Brien (FTC).

Brands and political institutions targeted include Apple, SpaceX, Donald Trump for President 2024 Campaign, MicroStrategy, Cardona Foundation, U.S. House of Representatives, U.S. Securities and Exchange Commission, and the U.S. Federal Trade Commission.

Background

Over the last 6 months, numerous reports have been published of websites using the image and likeness of Elon Musk and Donald Trump to propagate crypto scams, including AI deepfake videos.

Threat actors have hacked the YouTube channels of prominent social media personalities, and international sporting events, before posting videos promoting the scam to millions of subscribers.

Tracking the campaign

While investigating an unrelated campaign, our Threat Analysts discovered Indicator of Future Attack (IOFA) domains registered to the Russian email address [email protected], that suggested involvement in the aforementioned scams.

We executed an advanced content lookup using Silent Push Web Scanner, and what we knew about the deployment, management and on-page content of the aforementioned infrastructure, that revealed a cluster of live scam domains with the following shared characteristics:

  • Registered to [email protected]
  • Hosted behind Cloudflare
  • Similar themes, revolving around cryptocurrency, US financial/tech organizations, and the upcoming US Presidential Election (e.g. trumpdebate24[.]com), with matching body content
  • Pages hidden behind a CAPTCHA
  • Some pages featuring a chat function

One of the sites in the cluster features Russian language content – cryptologic[.]online – but seemingly isn’t involved in directly spoofing any organizations or individuals.

Analyzing domain content

Although some domains in the cluster have been identified as malicious and taken down by Cloudflare, there are still a number of domains live as of writing.

Here’s a sample of domains from the cluster, spoofing well-known US politicians, and business leaders:

Donald Trump spoofing page
Donald Trump spoofing page @ https://musk.trump[.]io
Presidential debate/Tesla spoofing page
Presidential debate/Tesla spoofing page
Apple spoofing page
Apple spoofing page @ https://apple-event2024[.]com
SpaceX spoofing page
SpaceX spoofing page @ https://btcstarship[.]com

Following the link on trump-debate[.]com, users are asked to participate in a “giveaway” by sending Ethereum coins to the wallet address 0x207Fe723F8B0d864A4Ae4e3B5F064883F207c642.

Chat scam operation

Initiating the transfer via chat functionality

Some domains also feature a chat function, that gives specific instructions on how to send transfer coins, prior to receiving “payment” from the scammers.

Chat scam operation response
Chat scam operation instructions

Several domains we encountered featured footer content that included fake legal letters from US regulatory bodies, legitimizing the proposed “giveaways” as sanctioned by the SEC, FTC and DOJ.

Here’s an example letter from debate[.]gives, involved in Tesla and US political debate spoofing:

Legal “disclaimer” on debate[.]gives
Legal “disclaimer” on debate[.]gives
Fake FTC letter @ debate[.]gives
Fake FTC letter @ debate[.]gives
Fake DOJ letter @ debate[.]gives
Fake DOJ letter @ debate[.]gives

Mitigation

Our Analysts are constructing a Silent Push IOFA Feed containing all the scam domains gathered during our investigation.

Enterprise users can ingest this data into their security stack to inform their detection protocols, or use it to pivot across attacker infrastructure using the Silent Push Console and Feed Analytics screen.

Register for Community Edition

Throughout our investigation, we used the Silent Push Web Scanner to search for matching content elements and linked DNS infrastructure.

Web Scanner is available free as part of a Silent Push Community Edition subscription. Sign-up here.

IOFAs

  • trumpdebate24[.]com
  • cryptologic[.]online
  • musk.trump[.]io
  • apple-event2024[.]com
  • btcstarship[.]com
  • debate[.]gives
  • 0x207Fe723F8B0d864A4Ae4e3B5F064883F207c642

Silent Push Context Similarity search: a CTI "easy button" that reveals matching infrastructure from a standing start

Security teams often begin their investigations from a standing start, with little to no intel on a suspect indicator.

A domain has appeared in your organization’s detection mechanisms, and warrants an investigation. Where do you go from here?

The Silent Push Context Similarity search displays a list of malicious domains that have been set up and managed in a similar fashion to an unknown target domain, at the click of a button, with zero prior analysis required.

Why is it useful?

The speed and simplicity of a Context Similarity search allows security teams – where resources are often stretched – to make fast, efficient value judgments on the likelihood of a domain being involved in malicious activity, what that activity is, and where to look next.

Context Similarity removes the burden of performing extended DNS and TTP analysis on an unknown indicator, and offers Community and Enterprise users an “easy button” for generating meaningful insights on a piece of infrastructure they’ve never encountered before, and have zero prior intelligence on.

How does it work?

The Context Similarity tool harnesses the power of the Silent Push collection and aggregation engine and provides what we call “directionality” to an initial threat investigation – an instructive process that shows teams where to look next, based on a single input point (i.e. a suspect domain).

Context Similarity works by applying over 50 characteristics to every malicious domain we encounter in a Silent Push IOFA Feed, and uses those characteristics to ascertain how similar two domains are to each other, in their underlying management and deployment.

Characteristics include (but aren’t limited to) the use of shared infrastructure such as nameservers and ASNs, how certificates are managed, reputation scores, and the presence of open directories.

We’re able to do this because we source, own and control all of our own DNS and web content data. We don’t rely on any third-party collection, storage or aggregation methods, which allows us to create self-contained searchable datasets that are designed to fulfil a specific use case, such as providing context to an unknown observable.

Generating a set of results

Context Similarity is accessed via a tab on the Total View screen.

Total View combines 10 Community and Enterprise tools into one screen, at the click of a button, without the need to perform additional DNS, infrastructure, feed-based or web content pivots.

To generate a set of Context Similarity results, simply enter a suspect domain into the main search bar, click Enrich to bring up the Total View screen, and click the Context Similarity tab.

Context Similarity takes the inputted domain, and displays known malicious domains within Silent Push IOFA Feeds that have been setup and managed (“Context”) in a similar fashion (“Similarity”).

Here’s a Context Similarity search run on the suspect domain adsitct.bgjutdqwpcdddtj[.]com:

The coloured dots indicate how similar the target domain is to other malicious domains, working from left to right in the order of most similar to least similar.

Every domain returned is featured on a Silent Push IOFA Feed. Different colours represent different IOFA Feeds. Hovering over the dots will provide the feed that the returned domain is contained within.

In the below example, the domain lukkal[.]cyou – appearing as the first domain on the returned list, with a dot on the extreme left, and contained within the IOFA Feed “Bulletproof Hosting Feeds” – is deemed to be the most similar domain to the target domain adsitct.bgjutdqwpcdddtj[.]com.

The domain muvisfaeco[.]top is deemed to be the least similar domain to the target domain (whilst still warranting inclusion), with a dot on the extreme right:

Working with Context Similarity results

The Silent Push console is designed to provide users with a centralized management space that can be used to gather the maximum amount of intelligence on a given indicator, without the need to navigate off the page and perform endless additional queries before receiving a set of useful results.

Each domain returned can be expanded to show the list of characteristics used to calculate similarity, so that users can make value judgements based on other sources of intel available to them, with differential data clearly displayed in red and green.

Once you’ve generated a set of results, a table populates below the similarity chart containing all the displayed indicators, ordered by similarity rank, from which you can one-click pivot across DNS records, or perform a Live Scan of the domain that returns a snapshot of realtime infrastructure.

Register for Community Edition

Silent Push Community Edition is a free threat hunting and cyber defense platform used by researchers, defenders and threat hunters, featuring a range of advanced offensive and defensive lookups, web content queries, and enriched data types, including Silent Push Context Similarity.

Sign-up for a free account here.

Total View Screen

Introducing Silent Push 'Total View': a one-stop CTI homepage for security teams and brand defenders

What is Total View?

The Silent Push Total View screen provides end-to-end analysis of a domain or IPv4 address in a single screen, at the click of a button, without the need to perform additional DNS (dangling records, subdomains etc.), infrastructure (associated ASNs and nameservers), feed-based or web content pivots.

Total View enhances the enrichment function by displaying 100+ pivotable IOFA data points related to a single domain or IP, and presenting key DNS datasets alongside Live Scan and Web Scanner data to provide all the context security teams need to quickly establish the origin, function and risk level of a piece of infrastructure – be it known or unknown.


Sign-up to Community Edition to access Total View

The Total View screen is available free of charge through a Silent Push Community Edition subscription (as well as a Professional and Enterprise subscription).


Why is Total View useful?

The Total View screen consolidates 10 different Silent Push queries, scans and proprietary features into one screen, providing a central command console that acts as the first port of call for offensive and defensive operations, across a range of CTI job roles.

Total View doesn’t limit output to realtime intelligence data. When you enrich a domain or an IPv4 address, you’re also receiving a wealth of historical data related not just to your chosen observable, but the infrastructure it’s hosted on, including risk scores, the likelihood of an ASN, nameserver, or associated domain being involved in malicious activity, and where that activity is occurring.

All of this data is delivered via an intuitive UI, that reveals the biographical story behind a piece of observable data, allowing teams to make highly-evidential CTI decisions, and adjust their detection/blocking mechanisms and IR activities accordingly.

Accessing Total View

To access Total View, enter a domain or IPv4 address into the top search bar and click Enrich. You’ll then be presented with the main Total View screen.

Total View has two key sections – Highlights, and Contextual Data. Let’s take a look at each one in turn.

Total View Highlights

The Highlight section is just that… an at-a-glance run down of key data types that we think you’d like to know about.

For demonstration purposes, we’ve used pokerpalacehotel[.]com – a malicious domain associated with the FIN7 group.

Total View ‘Highlight’ section

In this section, you will find:

  1. The Silent Push Total Risk Score, along with the underlying mechanisms we’ve used to arrive at that score. In the above example, you can see that the domain carries a score of 100 due its true positive presence in an active threat feed.
  2. A clickable count of all DNS records associated with the observable, including current and historic
  3. WHOIS information, including the registrar and create date
  4. Key Live Scan data, including the HTML response, favicon, real time screenshot, scan date and header information
  5. Any threat feeds the observable currently resides in
  6. Infrastructure Variance metrics… more on these key data points later

You can also use Total View to enrich an IPv4 address, and be presented with data categories relevant to an IP, rather than a domain.

In the Highlight section, this means you get all of the above data minus the WHOIS highlights, given that WHOIS data only relates to domains, not IP addresses.

From the Highlight section, you can save the observable to a new or existing feed, using the drop-down menu on the top right.

Total View Contextual Data

Below the Highlight section, you’ll find a table containing comprehensive contextual datasets that fulfil the main use cases of the Total View screen, comprised of 10 distinct queries and scans found elsewhere on the Silent Push platform.

To centralize intelligence gathering, each function is accessed as a tab from a single static table, preventing the need to navigate away from the page to gain additional context.

Let’s use the same FIN7 domain – pokerpalacehotel[.]com, and see what’s on offer from the tabbed menus above the main table.

Note: Any piece of data displayed in blue on the Total View screen can be pivoted on. Left-click the data point to bring up a contextual menu that allows you to perform forward and reverse lookups, based on the data type in question.

1. PADNS

Query: Domains and IPv4 addresses

Total View ‘PADNS’ tab

The PADNS menu displays all the passive DNS data Silent Push holds on your chosen domain or IP address, including SOA records.

Results are broke down by record type, with a range of forward and reverse lookups available for hostnames, IPs, ASNs and associated DNS records, including reverse lookups on nameserver hashes.

2. Infrastructure Variance

Query: Domains only

The Infrastructure Variance tab allows you to gain a top-down view of how a domain has moved across different infrastructure sets (ASNs, hosting IPs and nameservers) over time, including the trustworthiness of those infrastructure sets, and the frequency of any hops.

The ASN tab contains a list of historical ASNs associated with the domain, and ability to enrich each ASN with a one-click pivot, to gain additional intelligence including associated subnets and the ASN’s takedown reputation

Infrastructure Variance ‘ASN’ tab

The IP Diversity tab displays both a visual and numerical representation of how the domain has moved between IP hosts over time, including the ASNs that a given IP operates on. This section is particularly useful for locating “outlier ASNs” within an organization’s public DNS presence – infrastructure hosted on an ASN which isn’t to be expected.

Infrastructure Variance ‘IP Diversity’ tab

The final tab displays a wealth of information relating to each nameserver associated with the domain, including:

  1. Nameserver Domain Density: how many domains are used by a specific nameserver
  2. Nameserver Reputation Score: the number of blacklisted domains, taken from the total number of domains using a nameserver
  3. Listed Domains: The number of domains using a nameserver are found on feeds and/or blacklists
  4. Nameserver Entropy Score: a score that includes the recency, frequency, and the number of NS changes
Infrastructure Variance ‘Name Server’ tab

3. Web Scanner

Query: Domains and IPv4 addresses

The Web Scanner tab automatically executes a Web Scanner query on the given domain, using the following syntax, that displays all the historic web content data that we hold on a given domain, across 100+ searchable fields:

origin_hostname = [domain] AND hostname = [domain]
Total View ‘Web Scanner’ tab

Results are displayed across the following field names:

  1. origin_url
  2. url
  3. ip
  4. scan_date
  5. response
  6. html_title
  7. html_body_ssdeep
  8. favicon_icons
  9. header.server
  10. ssl.issuer.organization

All of these fields are able to be pivoted on individually, or used to execute additional Web Scanner queries that produces a narrower set of results.

4. WHOIS

Query: Domains only

The WHOIS tab displays the history of WHOIS data related to the given domain, including a visual timeline and a tabulated view of timestamped differential changes, side-by-side.

WHOIS changes visual timeline
WHOIS changes tabulated differentials

5. Threat Feeds

Query: Domains and IPv4 addresses

The Threat Feeds tab contains two sections that display metrics relating to an observable’s existence within an IOFA Feed.

The first section – Threat Feed History – displays various data points that allows you to track a domain or IP’s presence within a given threat feed over time.

Threat Feed History

The second section provides live data on any feeds in which the observable currently exists, including a timeline of the amount of indicators, and a link to the feed’s TLP Amber report (available to Enterprise users only),

Live Threat Feed data

6. Screenshots

Query: Domains and IPv4 addresses

The Screenshots section is particularly useful when attempting to understand how a threat actor is recycling their infrastructure to host different pieces of content on a single domain over time, as well as establishing what’s currently being displayed to users visiting the domain or IP.

Screenshots are displayed on a visual timeline, in descending order.

Screenshot timeline

7. Dangling DNS

Query: Domains only

A dangling DNS record is a DNS entry that points to a resource that no longer exists or is no longer in use. This can happen when a service is decommissioned, a domain name expires, or a DNS record is misconfigured.  

Attackers exploit dangling DNS records to redirect traffic to malicious websites or services, or perform a subdomain takeover.

The Dangling DNS tab scans your organization’s domain infrastructure, and displays both a list and a count (based on your subscription level) of any records that are dangling, so that they can be dealt with immediately.

8. Subdomains

Query: Domains only

The Subdomains tab displays a list of all the subdomains associate with the enriched apex domain, allowing you to establish all the visible secondary infrastructure associated with your given domain name.

Subdomain enumeration in Total View

If the domain has a wildcard A record in place, you’re able to click on each record to view details of where the wildcard A record resolves to.

Results are populated on an Explore table, allowing you to set up automated monitoring that alerts you to changes in the dataset every 24 hours.

9. Certificates

Query: Domains and IPv4 addresses

The Certificates tab performs two functions – it displays a visual count of realtime certificate data (more specifically, any certificates that are due to expire, and who the certificate issuers currently are), and runs a Web Scanner query that returns data on any active certificates, across the following field names:

  1. ssl.SHA26
  2. ssl.issuer.organization
  3. ssl.not_before
  4. ssl.not_after
  5. IPS Scanned On
  6. Certificate Status
Certificate data in Total View

This allows defenders to obtain a real-time appraisal of how certificates are being applied across their attack surface, and gives offensive team members the ability to perform a deep dive into an observables certificate infrastructure, and locate domains or IPs that are circumventing global certificate standards to legitimize malicious infrastructure.

Register for Community Edition

Silent Push Community Edition is a free threat hunting and cyber defense platform used by researchers, defenders and threat hunters, featuring a range of advanced offensive and defensive lookups, web content queries, and enriched data types, including Silent Push Total View.

Sign-up for a free account here.

Release 4.4: Total View, Infrastructure Variance, Context Similarity and more...

Release 4.4 is here and it’s our biggest yet! Check out the new features and changes below.

Total View

We’ve implemented a major restructuring of the IPv4 and domain Enrichment screens. Enriching either of these data types now presents the ‘Total View’ screen.

‘Total View’ populates data relating to an IPv4 address or domain across the following queries and functions, from one screen:

  1. Passive DNS record count, and list per record type
  2. WHOIS information
  3. Infrastructure Variance (associated ASNs, IP diversity data and nameservers used)
  4. Live Scan highlights
  5. Web Scanner quick scan
  6. WHOIS changes over time
  7. Threat Feed presence
  8. Screenshot history
  9. Dangling DNS record count and list
  10. Associated subdomains
  11. Associated certificates

This allows users to quickly pivot within a single page, and view a range of new data visualizations to interpret data more effectively.

Improved Enrichment highlights

Infrastructure Variance

Under the Total View menu, there is a new tab for ‘Infrastructure Variance’ – a data element unique to Silent Push. This tab hosts variance data for ‘ASN Diversity’, ‘IP Diversity’ and ‘NS Changes’ relating to any enriched domain:

  1.  A list of ASNs associated with the domain
  2. The domain’s IP Diversity metrics (visual timelines of AS hops, IP diversity score, ASN diversity data)
  3. Nameserver data (associated nameservers, nameserver domain density, nameserver reputation scores)

You are now able to track these variances in one place, supporting the identification of patterns to stop attacks before they escalate.

Infrastructure Variance IP Diversity Visualization

Context Similarity

Also unique to Silent Push is a new ‘Context Similarity’ tab under Total View. This tool visualizes domain similarity and compares enriched attributes of your domain with others on your Silent Push threat intel feeds.

You are also able to compare any two of the results side-by-side, and unearth new pivots to enhance your threat hunting.

Context Similarity Visualization

Additional resources

The Silent Push Knowledge Base comprises more than 200 articles that provide simple guidance on every aspect of the platform. It caters to both Community and Enterprise subscribers, and it’s constantly updated with new features and functionality.

Get in touch

Have any questions about the new release, or would like to learn more about our Community and Enterprise Editions? Get in touch today and we’ll get back to you shortly.