Using hashes to detect adversary infrastructure: mWISE 2024

Wholesome Hashes for a DNS Breakfast: How to Chew Through Adversary Automation by Kasey Best.

In September, Silent Push Direct of Threat Intelligence Kasey Best presented at the mWISE 2024 conference to discuss using hashes and fuzzy hashes to detect adversary infrastructure. Threat actors are capitalizing on the scalability and efficiency that automation provides. Why deploy a single phishing site when you can launch five with just a few clicks?

Hashing (and fuzzy hashing) allows you to detect identical or similar malicious infrastructure as soon as it’s created.

In this video, Kasey dives into hashes, what they are, and how they can help you preemptively detect malicious infrastructure, before an attack even goes live. Kasey also takes you through several examples of using hashes to detect even the most high-profile threat actors including FIN7, CryptoChameleon, Prolific Puma and more.


Want to stay ahead of emerging threats? Discover how Silent Push’s Indicators of Future Attack can give your organization the foresight to counter threats before they strike. Request your personalized demo today and see the power of preemptive threat intelligence in action: