Attacks by Silence
A comprehensive technical analysis of Silence’s tools, tactics, and evolution. This is the first time Group−IB’s reports of this kind have been made publicly available.
In September 2018, Group-IB released Silence: Moving into the darkside, the first comprehensive technical report on the group’s attacks. The analysis remains the most complete source of technical information about the infrastructure and tools the cybercriminals used between June 2016 and April 2018.
Since that time, however, the geography of the group’s attacks, some of their tools, and other important elements characteristic of Silence have changed. Group-IB experts continuously monitor the cybercriminals’ activities and in August 2019 published Silence 2.0: Going global, an additional report about the threat actor’s evolution, tactical changes, and new targets.
With the most extensive expertise on the group’s activities, and experience in responding to their attacks, Group-IB experts help combat threats at different stages:
A comprehensive technical analysis of Silence
For the first time in its history, Group-IB has made both reports publicly available with no registration needed, with the aim of helping researchers detect attacks at early stages and correctly attribute them. YARA and Suricata rules, however, are only available to Group‑IB Threat Intelligence & Attribution customers.
Advanced protection against cyber threats
Group-IB’s security ecosystem provides comprehensive protection for your IT infrastructure based on our unique cyber intelligence and deep analysis of attacks and incident response.
Аctionable, finished intelligence to track actors and prevent attacks before they happen
Comprehensive solution to protect corporate network, hunt for threats and respond to even the most complex cyber attacks
Client-side fraud and attack prevention system for online banking, working across sessions, platforms and devices
Protection from bots, fraud and data leakage for e‑commerce and web portals