Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, May 31, 2007

MSN Spamming Bot

An image is sometimes worth a thousand words. This is a screenshot of infected bots spreading spam messages at MSN via typical !spam IRC based command and control. And here's a related article about malware on IM networks as well:

"It is not clear exactly why the number of IM attacks is increasing, but security researchers have their theories. Don Montgomery, vice president of marketing at Akonix, speculated the increase in the number of attacks reflects the increase in the use of instant messaging, particularly on corporate networks. "IM is becoming favored over e-mail as a distribution vector for malware as a result of e-mail security now being employed by 75 percent or more of companies, while IM security is only employed by 15 to 20 percent of companies," Montgomery said. "The hackers are simply turning to the open door."

Two options remain highly lucrative. Either someone’s spamming p3n1$ enlargement propositions and directing to a spam site, or the social engineering efforts aim at visiting an exploit hosting site. No more direct .pif; .scr; or .exe propositions in plain simple text, what’s exploited is mostly client side vulnerabilities and redirectors to break the ice. IM threats stats courtesy of Symantec's IMlogic and here’s a related post regarding the acquisition of the company with Symantec anticipating the emergence of this market segment and investing in it. IM propagation has it cyclical patterns which like pretty much all other propagation vectors reaching a mature level starts getting at least partly replaced by other ways of propagation.
- May 31, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Wednesday, May 30, 2007

The WebAttacker in Action

Interesting to see that the WebAttacker kit can still be seen in the wild. Here are the redirectors in action :

Input URL: _http://rulife.info/traffic/go.php?sid=1
Effective URL: _http://greencunt.org/crap/index.php
Responding IP: 203.223.159.110
Name Lookup Time: 1.290261
Total Retrieval Time: 5.987628

=> _http://rulife.info/traffic/go.php?sid=1
=> _http://xorry.org/backup/atds/out.php?s_id=1
=> _http://greencunt.org/crap/index.php

What follows is the (sandboxed) infection : file: Write C:\Program Files\Internet Explorer\IEXPLORE.EXE -> C:\sysykiz.exe

Several more URLs are to be found at the "green" domain as well :
_http://greencunt.org/anna/fout.php
_http://greencunt.org/spl1/index.php

Despite that the tool is outdated compared to mature malware platforms and exploitation kits which I'll be covering in upcoming posts, the leak of its source code made it easy for someone to tweak it for their personal needs and simply feed with undetectable binaries, new vulnerabilities, and newly registered domains -- even hijacked ones through web application vulnerabilities for instance.

In case you're interested in a proof that attackers are still successfully infecting victims by using vulnerabilities for which patches have been released months ago, here's another URL that's exploiting two vulnerabilities at once namely :

MDAC ActiveX code execution (CVE-2006-0003)
IE COM CreateObject Code Execution (MS06-042)

The domain in question is - _http://www.avvcc.com and _http://www.avvcc.com/lineage/djyx.htm

Related posts:
RootLauncher Kit
Nuclear Grabber Kit
Shots from the Malicious Wild West - Sample Seven
Shots from the Malicious Wild West - Sample Six
Shots from the Malicious Wild West - Sample Five
Shots from the Malicious Wild West - Sample Four
Shots from the Malicious Wild West - Sample Three
Shots from the Malicious Wild West - Sample Two
Shots from the Malicious Wild West - Sample One
- May 30, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

The Revenge of the Waitress

Think your scrooge tips will achieve their effect? Think twice but don't put the emphasis on underpaid waitresses, rather on the overall availability of credit card data reading devices as well as their vulnerability to such readers. Here's a video of another waitress clonning credit cards on the fly :

"A telltale clue that helped the restaurant and investigators zero in on the waitress: She would make quick visits to the restroom after picking up customers' charge cards, apparently to swipe them through a palm-sized device that recorded the confidential numbers."
- May 30, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Reverse Engineering the ANI Vulnerability

Informative video analyzing the ANI cursor vulnerability, part of the Google TechTalks series.

"Alex Sotirov is a vulnerability engineer at determina. He will discuss some latest techniques in reverse engineering software to find vulnerabilities. Particularly, he'll discuss his technique that lead him to find the ANI bug (a critical new bug in WinXP and Vista)."


- May 30, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Tuesday, May 29, 2007

Phrack Magazine's Latest Issue

Phrack is back believe it or not with its latest Issue 64 released two days ago. The style is still so old-school, so authentic it makes you remember extraordinary Web 1.0 experiences. Articles of notice I went through so far : "A brief history of the Underground scene" ; "Blind TCP/IP hijacking is still alive" ; and "The art of Exploitation: come back on an exploit". Dazzling already :

"In the last decade, Phrack took a very annoying industry-oriented editorial policy and the original spirit was in our opinion not respected. The good old school spirit as we like had somehow disappeared from the process of creating the magazine. That is why the underground got split with a major dispute, as some part of the scene was unhappy with this new way of publishing. We clearly needed to bring together again all the relevant parties around the spirit of hacking and the values that make the Underground. The Underground is neither about making the industry richer by publishing exploits or 0day information, nor distributing hacklogs of whitehats on the Internet, but to go further the limits of technology ever and ever, in a big wave of learning and sharing with the people ready to embrace it. This is not our war to fight peoples doing this for money but we have to clearly show our difference."
- May 29, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Google Hacking for Vulnerabilities

Tools like these are a clear indication in the interest of gathering targets through google hacking techniques and SQL injecting them using a single tool. What’s important to note is that, instead of scanning the target's web server in an automated fashion thus, increasing the potential of detecting your malicious requests in this case the attack vectors are already known even cached on a search engines' servers. Perhaps a good time to set up a google hacking or PHP deception honeypot, make sure google crawls it and either gather first hand statistics, or deceive at your best. A paper released under the Know Your Enemy series comments on the concept of search engines' reconnaissance :

"Below we give the exploits we have seen against our honeypots and where possible an estimate of the number of users for each piece of software. The estimates are obtained by checking the number of Google search results returned for a given page in a website, for example searching for '"powered by PHPBB" inurl:viewtopic.php' suggests there are around 1.5 million installations of PHPBB indexed by Google."

Malware using search engines to build its hit lists is nothing new and it's the Santy worm and perhaps even the JS/Yamanner worm I have in mind. Worms like these are just the tip of the iceberg when it comes to malware because their successful intrusions act as a propagation vector for malware exes, exploits embedded pages, and hosting of phishing sites. In case you remember, over an year ago New Zealand started a nation wide google hacking security audit aiming to not just build awareness on the potential security issues, but to also, measure the country's susceptibility to google hacking which they claim is the highest in the world. If you don’t take care of your web application vulnerabilities someone else will, and your organization wouldn’t even have "the privilege" of getting exploited by an advanced attacker, but by a script kiddie making your server open a reverse shell back to them in between everything else.
- May 29, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Wednesday, May 23, 2007

Microsoft's Forefront Ad Campaign

The introduction of Microsoft's Forefront security solutions is already backed up by a huge ad campaign that can be seen on the majority of tech-news portals. The campaign is however lacking a consistent vision to communicate the benefits and main differentiation points -- if any -- of the product, and is barely informing that it exists in a not so creative way :

There's nothing in Forefront that really makes it notably better or worse than any other solutions that are already in the marketplace. However, the Microsoft name may be sufficient for it to steal market share, and a better integration with other Microsoft solutions…is likely to be a bit of a differentiator,” said Quin. Faced with increasing competition from Microsoft, Symantec Corp. questioned Microsoft's ability to effectively protect enterprise customers.

Trying to be witty too much while fighting ninjas and aliens often results in your ad campaign "clowning" in the eyes of a prospective customer. Security is indeed a cosmic phenomenon for Microsoft, an unexplained pseudo-randomly generated event that's continuing to be researched and analyzed for generations to come. Can they achieve desirable results? Will penetration pricing help? And will the ad agency that got commisioned with the ad campaign come up with a bit of a more creative psychological imagination the next time?

A pure example of an acquisition-to-solution strategy compared to AOLs licensing of a reputable AV vendor's technology, in order for them to enter the market segment as well.
- May 23, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Jihadists' Anonymous Internet Surfing Preferences

Jihadists are logically not just interested in encryption and steganography but also, in ways to anonymize their web surfing activities as much as possible. A wannabe jihadist whose tips and recommendations have gained him a lot of reputation around the forums I follow, recently came up with an in-depth article on recommended and reviewed IP cloaking services with direct download links in between. It makes stats like these questionable to a certain extend as I've already pointed out. Among the IP cloaking tools reviewed are :
- Steganos Internet Anonym Pro
- Hide IP Platinum 3.1
- Proxy Switcher Pro
- Invisible Browsing v5.0.52

TOR is, of course, mentioned as well but at the bottom of the article citing performance issues compared to commercial solutions. IP decloaking is not even considered as a concept.
- May 23, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Counter Espionage Tips from the Cold War

There's nothing old-fashioned in short films like these representing possible techniques used by intelligence services while recruiting - "Cold War counter-spy instructional film created to convince government officials traveling with top secret info to watch their backs. Watch hapless G-men get seduced and setup for blackmail by treacherous Soviet she-spies"



And despite that today's perception of sexy she-spies has evolved proportionally with the technological advances in espionage, some of the tips are still emphasizing on the basics.
- May 23, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Tuesday, May 22, 2007

A Client Application for "Secure" E-banking?

This is perhaps the second product concept myopia right after the lie detection software for text comminations I come across to recently. Remember a previous post heading in the opposite direction, where a bank was trying to rebuild confidence in the most abused phishing medium - the email - to keep in touch with its customers? Here's another company that's betting on a third-party client application to solve the problem of secure E-banking totally falling victim in the secure channel communication myopia one that I think has nothing to do with reality when it comes to the success of phishing :

"Here’s how Armored Online works: A company, such as a financial institution or online retailer, offers a downloadable client to customers through its website. That client then gives the customer’s computer a secure channel with which to communicate and transact with the company. Its Java-based browser is locked down, meaning it won’t accept any plug-ins, like cookies used by criminals. What’s more, the client can only “talk” to the server at the bank or online store. “It’s like iTunes for banks,” Mr. Sowerby said."

The attack of the disabled cookies? Not really, so be realistic. Coming up with a third-party application as the cornerstone of E-banking security directly conflicts with E-banking's biggest benefit - flexibility due to the compatibility with the most popular browsers. So you'd rather focus on the current situation - Brandjacking instead of re-inventing the SSL wheel -- as a matter of fact the Gozi trojan and the Nuclear Grabber are quite comfortable with SSL as they bypass it entirely. Even worse, a trojanized copy of the program will emerge given it receives any acceptance at all. And if banks start embracing it -- don't -- we can easily start talking about DRM enabled E-banking where, both, banks and customers will turn into virtual hostages to a third-party application trying to reboot the market for anti-phishing services, totally forgetting the problem is not in the lack of unencrypted transactions as no one is sniffing the credentials, but pushing fake sites instead of letting customers pull the sites for themselves.

Don't disrupt in irrelevance.
- May 22, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

A Malware Loader For Sale

Continuing the Shots from the Malicious Wild West series and the yet another malware tool in the wild posts, here’s a recently advertised malware loader. Polymorphism, built in packing functions and the ability to set an interval for loading yet another executable at a URL or a URL redirector, DIY firewalls unloading techniques, pretty much anything ugly is in place -- as usual. The loader's source code is currently available for $150, undetected bots go for $15 per piece. Malware on demand in principle, or malicious economies of scale?
- May 22, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Monday, May 21, 2007

MySpace's Sex Offenders Problem

MySpace, being one of the most popular social networking sites is always under fire on its efforts to combat known child offenders registering and using its database to find what they're looking for. The problem isn’t MySpace as a faciliator for such type of communications but the vast amounts of personal information -- future contact points -- kids publish about themselves online, not knowing that on the Internet anyone can be a dog and most importantly, parents loosing the emotional connection with their kids and making it easier for someone to break the ice and establish trust.

Several months ago, funded by nothing more but his common sense Kevin Poulsen gathered name data from the U.S public child offenders registry and found positive results with people -- thankfully -- stupid enough to use their real names. And while they wouldn't do it again the next time instead of making it easier to aggregate the data, a CAPTCHA to limit such automatic activities was implemented. Don't blame MySpace blame bureaucracy. Meanwhile, here's an article on U.S authorities demanding that MySpace provide data on identified and removed known child offenders -- they agreed :

"MySpace agreed Monday to provide the information to all states after some members of the group filed subpoenas or took other legal actions to demand it. The company said last week such efforts were required under the federal Electronic Communications Privacy Act before it could legally release the data."Different states are going about it different ways," said Noelle Talley, spokeswoman for Cooper, who filed a "civil investigative demand" for the information. Connecticut Attorney General Richard Blumenthal used a subpoena that "compels this information right away - within hours, not weeks, without delay - because it is vital to protecting children," he said."

If protecting children is vital, remove the CAPTCHA so everyone knowing how to aggregate and tweak the data will come up with far more sophisticated stats than the ones currently available. Actual results too. Next time it would become harder to track them, so don’t count on measures like these instead, ensure naughty conversations aren’t taking place at all. Makes me wonder one thing - should you be filtering known child offenders on the Internet perhaps a futile attempt given the pseudo-personalities they could establish, or at the ISP level and put them under surveillance right from the very beginning? Of course child offenders should not have unmonitored access to the Internet so rethink the basics.

Related posts:
Registered Sex Offenders on MySpace
IMSafer Now MySpace Compatible
- May 21, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Saturday, May 19, 2007

Tricking a Laptop's Fingerprint Authentication

The joys of fingerprint biometrics with a duplicate fingerprint of the original.

- May 19, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Friday, May 18, 2007

Commercializing Mobile Malware

Visionary enough, I predicted this over an year ago, and despite that for the time being there are only two publicly known pieces of mobile malware sending sms messages from the infected devices to premium numbers, it's an emerging trend for customers and mobile operators to keep an eye on :

"After installation, the Viver trojans immediately start sending SMS messages to premium-rate numbers. The messages are sent with proper international area codes, so they are able to reach the correct destination even when activated outside Russia. We've already seen for-profit malware in mobile devices: Wesber.A and Redbrowser are Java Midlet trojans that try to send messages to Russian premium-rate numbers. But these trojans require user acceptance per each message and are able to send messages correctly only inside Russia."

Some comments I made back then :

"The number and penetration of mobile devices greatly outpaces that of the PCs. Malware authors are actively experimenting and of course, progressing with their research on mobile malware. The growing monetization of mobile devices, that is generating revenues out of users and their veto power on certain occasions, would result in more development in this area by malicious authors. SPIM would also emerge with authors adapting their malware for gathering numbers. Mobile malware is also starting to carry malicious payload. Building awareness on the the issue, given the research already done by several vendors, would be a wise idea."

Something else to think about is related to Europe’s most recent mega-music event Eurovision and the sms voting power that, given enough infected mobile devices are in place the results could change pretty fast if you’re following my thoughts. Thankfully, compared to zombie networks making it possible to do intelligence and espionage tweaks given the large infected population, we still cannot talk about mobile botnets. The most juicy target for the time being however, remains the rise mobile banking.

Another comment I made a while ago :

"Malware authors indeed have financial incentives to futher continue recompling publicly available PoC mobile malware source code, and it's the purchasing/identification features phones, opening a car with an SMS, opening a door with an SMS, purchasing over an SMS or direct barcode scanning, mobile impersonation scams, harvesting phone numbers of infected victims, as well as unknowingly interacting with premium numbers are the things about to get directly abused -- efficiently and automatically."

Related posts:
Proof of Concept Symbian Malware Courtesy of the Academic World
Mobile Devices Hacking Through a Suitcase
- May 18, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Thursday, May 17, 2007

Yet Another Malware Cryptor In the Wild

Just stumbled upon a newly released cryptor in the wild, and as I pointed out in a previous post related to yet another cryptor, they're signature-based malware scanning's worst enemy. By the time AV vendors obtain a sample and analyze the routines they use, unless an IPS solution is in place, and end user friendly perimeter defense detecting the bot-ization of the host are in place - an infection occurs.

What's the big picture? It's launching a denial of service attack on anti virus vendors' labs in the form of distributing couple of hundred malware samples - future family members of a malware group. Polymorphism encrypting routines are nothing new, but with DIY cryptors in the wild the result can be quite successful even for copy cats:

"Another example is the Stration family of malware, responsible for worms and other forms of malware in late 2006. “Stration was changing so quickly—the encryption packaging, the compiler, everything. We saw up to 300 variants in a single day,” says Ron O’Brien, senior security analyst at anti-malware vendor Sophos."

File size: 4608 bytes
MD5: 406e3a1443ec617f2c968a957a460f10
SHA1: 187abe8cec588b53126afbe8e600379a3bac2321
- May 17, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Wednesday, May 16, 2007

Corporate Espionage Through Botnets

Following my previous post on OSINT Through Botnets, here's a company that's categorizing Fortune 500 companies whose networks are heavily polluted with malware infected hosts :

"Support Intelligence (SI), a network security company in San Francisco, has been running what it called "30 Days of Bots," featuring corporate networks infected with spam-churning bots. It began analyzing data in February, monitoring 10,000 domains that plow data into a trap much like a fishnet, except the intelligence in the data is designed to determine what information to keep by looking for spam. In total, SI analyzed traffic from more than 100 sources, including the aforementioned spam traps."

Considering the possibility for gathering open source intelligence through military and government infected PCs only, it is logical to conclude that a specific company can be targeted on the basis of the already infected hosts on its network as well. Think about it. For the time being, a botnet's master doesn't really care if it's a military or Fortune 500 company that's infected as long as spam, phishing and malware goes out of these hosts. But passive corporate espionage in the form of intercepting the traffic going out of a specific company's network shouldn't be excluded as an opportunity.
- May 16, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Visual Script Obfuscation

We often talk and deobfuscate scripts aiming to hide their real and often malicious intentions. But what if malicious attackers have become so efficient in their obfuscation, that they decide to show some JAPH style in order to make them harder to analyze by visually obfuscating the scripts as you can see here?
- May 16, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

The Jihadist Security Encyclopedia

A month ago, the Media Jihad Battalion started distributing a 118 pages long encyclopedia on anything starting from secure communications to keywords not to search for as they'll raise an early warning system alarm. The front cover is so Blade's style, but the PSYOPS motive is highly influential. Here's a translated table of contents and the original version attached.
- May 16, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Sampling Jihadists' IPs

Great idea as a matter of fact :

"The following is based on an analysis of 4,593 IP addresses (1,452 unique IP addresses). The IPs were acquired from 19 of the more prominent of the Salafist/Jihadist forums, including both Arabic and non-Arabic forums, from 01 January through 30 April of this year."

Taking into consideration the per-country stats, do not exclude the logical possibility of IP cloaking while browsing these and also, the tiny number of intelligence and lone gunman info warriors gathering OSINT data. In another much more in-depth analysis on mapping the online jihad, the authors point out the emerging internationalization of jihad as well :

"The near exclusive use of the Arabic language in these significant jihadi websites likely accounts for the concentration of activity in the Middle East and North Africa. But with a reach to more than 40 countries, the virtual community within these ten influential sites assumes a global significance. The international jihadi movement's use of the internet to fuel the exchange of ideological expansion and its corresponding influx of support will increase the vulnerability of many countries to the appeal of extremism."

At least these organizations don't rely on setting up fake jihadist communities to come up with the sample data, but know exactly where to look for.
- May 16, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Monday, May 14, 2007

Mind Mapping Web 2.0 Threats

An informative, and for sure to be expanded mind map presenting various Web 2.0 threats courtesy of Mike Daw who by the way neatly integrated the anti virus detection results to his web backdoors compilation, I commented on in a previous post. Here are two more mind maps of Firefox security related tools, and the threats faced by mobile devices. A related post on the "wormability" of web application insecurities for everyone thinking flash worms.
- May 14, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

XSS The Planet

Yet another initiative proving that major sites indeed suffer from XSS vulnerabilities in exactly the same fashion E-banking sites do. Perhaps the most interesting point regarding the list is that it's from 2005 and some of the sites still remain vulnerable but why is that? Lack of internal incentive programs to deal with the problem? Not getting the necessary attention given the rise of the lost laptop with unencrypted data issue? A lack of common sense is the best alternative for me. Consider the perspective - its like utilizing quantum encryption for the sake of protecting the confidentiality of your data but remaining vulnerable to wardriving attacks capable of obtaining the data in a pre-encryption stage, even on the fly. The encrypted data myopia is on the rise and it's the result of a yet another "stolen laptop news article" emphasizing on current and ignoring the emerging trends, namely, that a mobile workforce's improved productivity is proportional with the insecurities coming from storing sensitive data in a less controlled external environment. There's no point in implementing state-of-the-art technology when you haven't taken care of the basics, such as the ones that are so easy to exploit even a script kiddie can become the next pentagon hacker bruteforcing passwords on an unclassified system. And yes - trivial XSS ones too.

Currently active URLs on the list are the following:
Nortel.com
Federal Deposit Insurance Corporation
JC Penney
SonyStyle.com
D-Link.com
Poetry.com
- May 14, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Friday, May 11, 2007

Big Brother Awards 2007

I always liked the idea of emphasizing on the big picture when it comes to the worst privacy invadors on a worldwide basis compared to that of a particular country only. They are all interconnected to a certain extend, united under the umbrella of the common good which as a matter of fact won a golden boot in this year's Big Brother International Awards :

"PI's 'Big Brother Awards' have been running for nearly ten years, with events run in eighteen countries around the world. Government institutions and companies have been named and shamed as privacy invaders in a variety of countries and contexts. This year was the first time that Privacy International ran an international event to identify the greatest invaders around the world. The event was hosted by 'the pope', as presented by Simon Davies in full regalia. Previous hosts include 'Dr. Evil' and 'The Queen of England'."

Here are the winners in their categories :

Most invasive company - Choicepoint
Data aggregators and centralizing too much personal data in a single place makes it vulnerable even to pringles hacking attacks. Next year I'm sure Google's purchase of Doubleclick would get more attention

Worst Public Official - Stewart Baker
The way Microsoft and open source look awkward in a sentence in this very same way democracy looks awkward next to Russia

Most Heinous Government - The United Kingdom
Fully agree here. Twisting the common good is very marketable

Most Appalling Project or Technology - The International Civil Aviation Organization

I think the CCTV industry should have won here the rest are bureaucrats whose closed doors propositions later on face the public outbreak of how not to implement them. Anyway supply meets the demand for surveillance.

Lifetime Menace Award - The 'Common Good'
The main reason for the existence of today's intrusive surveillance technologies is the idea of the common good. We spy on you to protect you, we take away your civil liberties to protect you, and CCTV after CCTV you end up in a situation which can be best seen in the U.K

Related posts:
The Future of Privacy = don't over-empower the watchers!
Security vs Privacy or what's left from it
The Cell-phone Industry and Privacy Advocates VS Cell Phone Tracking
Afterlife Data Privacy
- May 11, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Thursday, May 10, 2007

Defeating Virtual Keyboards

To deal with the threat of keyloggers -- or to win time during te process of implementing two factor authentication and one-time-passwords-in-everything -- E-banking providers started introducing virtual keyboards as a pragmatic solution to the threat. Malicious attackers are anything but old-fashioned and this is a great example that insecurities are only a matter of perspective. To the E-banking providers who were aware that a static virtual keyboard would be much more easier to defeat, a randomized characters appearance came into play and so attackers adapted by first taking video sessions of the login process, and now turning each mouse click into a screenshot to come up with the accounting data in a PoC on Defeating Citibank Virtual Keyboard:

"Citibank Virtual Keyboard is a security enhancement for protecting from the key loggers. Using this virtual keyboard user can enter Card no and IPIN using mouse. This keyboard will display a keys in random position in a virtual keyboard on the screen where it makes little difficult for password capture. This only gives confidence for end user from key loggers not from other methods. Local attacker can use Win32 API’s to capture using screen shot method and obtain sensitive information including Credit Card/Debit Card (Suvidha Account), IPIN and misuse it."

From a malicious economies of scale perspective, these rather amateur techniques mean lack of efficiency compared to advanced tools suh as the Nuclear Grabber which I intend to cover in-depth in a future post from the Malicious Wild West series.
- May 10, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

International Cryptography Regulations Map

Regulations on importing, exporting and using encryption greatly vary across the world. Bert-Jaap Koops came up with some informative maps highlighting the big picture :

"This is a graphic summary of the pertaining cryptography laws and regulations worldwide as outlined in the most recent version of my Crypto Law Survey. It shows the import controls, export controls, and domestic controls, according to the information available to me. Consult the corresponding entry in the Crypto Law Survey for the contents of the pertaining regulation in a particular country."

And here's a related post on a bureaucratic utopia, another one on bureaucracy vs reality when it comes to security, as well as famous cases related to criminals using encryption.
- May 10, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Disintermediating the Major Defense Contractors

Innovative and cost-effective altogether? Think SpaceShipOne, a commercial space ship that didn't come from a major defense contractor, not even NASA but from a competition won by a privately run company. How to disintermediate yet innovate? Become a venture capitalist, or an angel investor and optimistically hope the academic-to-commercialization process would happen with one of your investments. The DeVenCI project aims to connect sellers with buyers and seems like a sound short-term objectives oriented idea compared with In-Q-Tel the CIA's VC fund emphasizing on long-term R&D :

"Some companies have already profited from the program. In 2003, when DeVenCI was in its experimental phase, the Defense Information Systems Agency was looking for ways to protect computer networks. After speaking to several companies through DeVenCI and evaluating their technology, the agency wound up working with ArcSight, a software company based in Cupertino, Calif., which won $3.6 million in related contracts over the next few years, DeVenCI officials said. Mr. Novak of Novak Biddle said he brought with him to the March DeVenCI meeting two executives from a small start-up developing biometric technology that could be used for things like advanced fingerprinting or eye scans. Mr. Novak said the chief executive and chief technology officer from the Virginia company, which he declined to name for competitive reasons, gave a presentation to the roughly 50 assembled procurement agents."

Here's In-Q-Tel's investment portfolio so far -- Google used to be among them.

Related posts:
Insider Competition in the Defense Industry
Aha, a Backdoor!
Overachieving Technology Companies
- May 10, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Tuesday, May 08, 2007

DDoS on Demand VS DDoS Extortion

There were recent speculations on the decline of DDoS attacks, in respect to the lack of companies actually paying to extortion attacks and that it's supposedly not a cost effective approach for malicious attackers to use their botnets. Think again, as it's always a matter of a vendor's sensor network diversity, one that's also excluding targeting mom-and-pop web properties. Just because DDoS extortion may not be working, and I say may not be working because only a few companies would admit they have paid money given the simple math of losing revenues on an hourly basis and spending more on bandwidth and security consultancy than the money requested, DDoS on demand still remains a well developed underground business model. DDoS attacks may not be profitable for the attacker directly performing them, but remain profitable if he's getting paid to provide the service only. Here's an excerpt from my Future Trends of Malware (January, 2006) publication related to DDoS extortion :

"Now you should ask yourself, would total cost of ownership of the business, the costs of the bandwidth, the DDoS attack protection solution, or the botmaster’s deal with the devil style proposition can solve the situation. If you’re thinking big, each and every time an organization pays, it not only risks a repeated demand, but is also fueling the growth of the practice in itself – so don’t do it!"

I'm aware of an ironic situation where a small-biz client's web server started getting DDoS without any reason whatsoever. The first thing that came to my mind was that it's either a DDoS extortion, or a possible rival, so I asked whether or not they've received any extortion emails. They declined, and here comes the interesting part, two days later, the attacks stopped, and a letter arrived in the form of the following email - "We saw you ignored our first email so we had to demonstrate you the power of our attack, this is your second chance to bla bla bla". What happened, and why did they say no extortion emails were sent? Here comes the irony, in the spam folder of the publicly obtainable email account for the domain was the original extortion email, that got detected as a spam. Time for some cyber intelligence to assess their capacity.. Never comply with such letters, or they'll come back for more. By the way, ever thought of the DDoS extortion bluff?

Here's another excerpt on DDoS on demand :

"There’s a lot of demand for paying to teens to shut down your competitors and hoping they would go under the radar, and while ethics are excluded, given these get busted, they’ll be the first to forward the responsibility to the buyer of the service. There’s also a clear indication of market for such services, and sooner or later these individuals will improve their communication skills, thereby increasing the impact of these attacks. For instance, Jay Echouafni, CEO of TV retailer Orbit Communications, paid a group of botmasters to DDoS his competitors, where the outage costs were estimated at $2 million. Another case of DDoS on demand occurred in March, 2005, when the FBI arrested a 17 year old and a Michigan man for orchestrating a DdoS attack, again causing direct monetary loses. DDoS attacks, and the ease of gaining capability in this field are clearly increasing."

Unethical competitions would favor a service where a third party maintains the infrastructure, launches the attack, and for the safety of both parties, remain as anonymous as possible. Here' a related article at BBC News:

"We are seeing a lot of anti-competitive behaviour," he said. Mr Sop added that many more Asian targets were being hit by DDoS attacks - a region in which Symantec did not historically have a big presence. In Asia, he said, DDoS attacks were proving very popular with unscrupulous firms keen to get ahead of their rivals. "The really frightening thing is you can buy access to a botnet for a small amount of money and you can have you competitor down for a long time," he said."

I never actually enjoyed articles emphasizing on how Russian script kiddies are taking over the world given the idea of "outsourcing malicious services". So next time you see a DDoS attack coming from the Russian IP space against U.S companies, it could still be U.S based rivals that requested the attack on their U.S based competitors -- stereotypes keep you in the twilight zone.

Meanwhile, here's a proof hacktivism is still alive and fully operational as the Estonian Internet infrastructure's been recently under permanent DDoS attacks due to real-life tensions of removing a statue from the Soviet era. It wasn't Chinese Mao-ists that did it for sure, but the recent case is another proof that it's always about the money, as everyone not aware of different malicious attackers' motives is preaching. DDoS extortion isn't dead, it's just happening beneath the radar, as targets are picked up more appropriately balanced with less greed regarding this underground business model only.

UPDATE : More developments on the DDoS attacks in Estonia now combined with defacements, which I think was only a matter of time.

Related posts:
The Underground Economy's Supply of Goods
The War against botnets and DDoS attacks
Emerging DDoS Attack Trends
Korean Zombies Behind the Root Servers Attack
Hacktivism Tensions - Israel vs Palestine Cyberwars
- May 08, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Friday, May 04, 2007

A Chronology of a Bomb Plot

A very detailed overview of a bomb plot, especially the lines related to anything digital such as :

- "An e-mail sent from Mr. Khawaja to Mr. Khyam on Nov. 30, 2003, read: "It's not as easy as we thought it would be. We have to design the whole thing ourselves. "There are two parts to it, one transmitter and another receiver that will be at a distance of about 1 or 2km that will be attached to the wires and send out 5 volts down the line and then we get fireworks."

No details on whether or not the communication was encrypted, how it was decrypted -- indirectly through client side attacks for sure -- and was their communication on purposely intercepted or filtered though the noise with keywords such as transmitter, wires and fireworks.

- "Mr. Mahmood was working for the British gas company, Transco, and had stolen sensitive CD-ROMs from National Grid, a British utility, that detailed the layout of hundreds of kilometres of high-pressure gas pipelines in southeast England."

And the insider threat was just an overhyped threat with lack of statistical evidence of it happenning. Think twice. Don't dedicate efforts in ensuring such information never makes it out of the organization due to terrorist fears only, but consider the consequences of it getting into the wrong hands at the first place.

- "A notebook in the living room included references for books including The Virtue of Jihad, and Declaration of War."

Propaganda writings are easily obtainable online, which reminds me that monitoring them to the very last mile is worth the risk in order to further expand their network, of both, sites they visit and people they communicate with.

- "Downloaded on to his laptop was a computer file, The Mujahideen Explosive Handbook. It contained the exact recipe to build an ammonium nitrate bomb."

On purposely placed online DIY manuals can act as honeypots themselves. As we've already seen, counter-terrorism forces across the world are establishing such fake cyber jihad communities in order to lure and monitor wannabe jihadists. But monitoring who's obtaining the already hosted in the wild manuals, is far more beneficial than hoping someone will eventually fall a victim into your cyber trap.

In another related research by the RAND Corporation entitled "Exploring Terrorist Targeting Preferences" the authors try to come up with various scenarios on the process of prioritizing possible targets such as :

"the coercion hypothesis; the damage hypothesis; the rally hypothesis; and the franchise hypothesis. If Al-Qaeda directs the next attack the coercion and damage hypothesis, and, quite possibly both, are the most likely to influence the nature of the target.

Great psychological imagination applied in the paper, worth the read. From a statistical point of view, the probability of death due to a car accident is higher than that of a terrorist attack, so consider escaping the FUD related to terrorism that's streaming from your favorite TV channels in order to remain objective. The ugliest part of them all is that everyone's discussing the post-event actions taken, and no one is paying any attenting to the pre-event activities that made it possible, and with training camps under heavy fire, the digitalization of terrorist training is taking place.

And here's another great analysis, this time covering the process of how terrorists send money by combining anonymous Internet services in between mobile banking :

"Advanced mobile technology, cooperation between international mobile communications providers and international financial institutions and the lack of regulations make for a swift, cheap, mostly untraceable money transfer -- known as "m-payments" -- anywhere, anytime, by anyone with a mobile telephone."

Dare we say adaptive?
- May 04, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Winamp PoC Backdoor and a Zero Day

Listen to your infection? Not necessarily as this backdoor binds cmd.exe on port 24501, but needs to be socially engineered in the form of a plugin for Winamp. Code originally released in December, 2006, see attached screenshot. Not much of a fun here either, but as the folks at SANS point out Winamp doesn't play .MP4 files automatically from a web page, so no chance to have it embedded within popular sites and cause mass outbreaks as we saw it happen with the with ANI exploit code and the WMF one.

gen_wbkdr.dll
File size: 45056 bytes
MD5: 74d149f4a1f210ea41956af6ecedb96b
SHA1: 5a2e8d5727250a647ce44d00cf7446775e6cd7d5
- May 04, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

Wednesday, May 02, 2007

Anti-Censorship Lifestyle

Following a previous post on security lifestyle(s), and in between the ongoing efforts to censor a 16 digit number I feel it's about time you dress yourself properly in case you haven't done so already. Censorship in a Web 2.0 world is futile, the way security through obscurity is. Seems as everyone's talking about the number today, there's even a domain name registered with it.
- May 02, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

The Brandjacking Index

Picture a situation where a customer gets tricked into authenticating at the wrong site of company XXX. Would they do business with company XXX after they get scammed, trojan-ized, and spammed to (virtual) death? I doubt so, and as we can also see in the results of a recently released survey on whether or not customers would do business with retailers who exposed personal data - they'd rather dump them right away.

MarkMonitor just released their first quarterly Brandjacking Index :

"The Brandjacking Index investigates trends, including drilled-down analysis of how the most popular brands are abused online and the industries in which abuse is causing the most damage. The report examines the ever-adaptive tactics of brandjackers such as cybersquatting, false association, pay-per-click (PPC) fraud, domain kiting, objectionable content, unauthorized sales channels and phishing. The Brandjacking Index tracks the top 25 brands from the 2006 Top 100 Interbrand study plus additional Interbrand ranked companies for business segment analysis."

The old marketing rule that a dissatisfied customer will share the bad experience with at least five more fully applies here, and given he or she's an opinion leader in their circle - you've got a problem as it's your brand in the domain name. Therefore, despite the companies developing a market segment for timely and reliably shutting down phishing sites, the most obvious "cybersquatted" domains shouldn't even be allowed to get registered at the first place. But given the flexibility of registering a domain these days, from a company's perspective, cybersquatting's an uncontrollable external factor, and in order to protect their future flow of "soft dollars" efforts to monitor the domain space are highly advisable.

There're several key techniques you should keep in mind. Cybersquatting, vulnerabilities within the browser to spoof the status bar and make it look like the legitimate page, or a malware infected PC that's basically redirecting all the known E-banking sites to fake ones. No anti virus, no Ebanking is highly advisable, yet not a solution to the problem, and E-banking site's compatibility with the most popular -- and targeted -- Internet Explorer browser ONLY, turn many precautions into a futile attempt to deal with the problem -- heading in the opposite direction. The question is, which technique is more effective at the end user's perspective, and how should the targeted organizations deal with this indirect form of attack on their brands, reputation and the rest of the "soft dollars" goodies such as favorable PR and stakeholder's comfortability? From another perspective, who's more irresponsible, the unaware end user, or banks whose web application security ignorance make it easier for phishers to establish trust?

One solution to the problem is shortening the lifetime of such a domain to the minimum by tracking and shutting them down by using a commercial service like this online trademark monitor, a screenshot of which you can see at the top of the post. Perhaps rather resources-consuming, but educating your customers for their own safety in times when anyone can register a pay-pal-login.tld domain like through third-party registers, is another way to go. Did I mention that anti-phishing toolbars are a free alternative in case common sense fails -- like it does?
- May 02, 2007 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Wikipedia Draft

Shoutcast Hosting Stream Hosting Radio Server Hosting

Followers

Clicky

This Blog - 2005 - 2024

This Blog - 2005 - 2024

Astalavista.com

Astalavista.com

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile

Advertising

Advertising

Advertising

Advertising

Dark Web Onion

Dark Web Onion

Dark Web Onion E-Shop for Threat Intelligence Deliverables

Dark Web Onion E-Shop for Threat Intelligence Deliverables

OSINT and Threat Intelligence Training

OSINT and Threat Intelligence Training

E-Shop for Threat Intelligence Deliverables

E-Shop for Threat Intelligence Deliverables

My YouTube Channel

My YouTube Channel

Compilation

Compilation

Subscribe using RSS

Subscribe to Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Search This Blog

Subscribe using Email

Enter your e-mail address:

Powered by FeedPress

Popular Posts

  • Exposing Bulgaria's Largest Data Leak - An OSINT Analysis
    I've recently came across to a news article detailing the recently leaked Bulgaria NAP records database and I decided to take a closer...
  • Exposing a Currently Active Email Address Portfolio of Web Site Defacement Groups or Lone Web Site Defacement Groups - An OSINT Analysis
    Dear blog readers, This is Dancho and I've decided to share what appears to be one of the most comprehensive and up-to-date and relevant...
  • Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses
      UPDATE: I've just updated the original post and added an additional set of ransomware-themed extortion email addresses. Dear blog rea...
  • Exposing the Conti Ransomware Gang - An OSINT Analysis
    UPDATE: The following set of graphics aims to visualize the recently leaked Conti ransomware gang members conversations. UPDATE: The followi...
  • Intellexa's Cytrox Predator Commercial Spyware Vendor and the Hacker Scene's Underground Connection
    From the "there's a high probability that this might be the case" department. Sample photos: hxxp://cytrox.com - 2015 - Rotem ...
  • Open Letter to International Investigative Journalists on my 2010 Disappearance
    My name is Dancho Danchev. For over two decades, I have navigated the shadowy corridors of the internet, an independent security consultant,...
  • The Pool on the Roof Must Have a Leak
    Open Letter - https://pastebin.com/7h64ZqUf - Emails.rar - https://gofile.io/d/af951551-a57e-49c1-a453-291fa78f24d9 - Emails.rar - https:/...
  • Satoshi Nakamoto IoCs
    A logical question emerges. Who is Satoshi Nakamoto? And a logical answer as well. Let's do some OSINT research and find out more. Sampl...
  • A Full List of Dark Web Onion URLs from the recent LockBit Compromise
    Dear blog readers, In this post I'll provide related actionable intelligence based on the recent LockBit compromise in terms of all of t...
  • Bulgaria's Ransomed VC Ransomware Group's IoCs
    From a previous post. hxxp://ransomedtools.online hxxp://ransom-market.com hxxp://ransomed.biz hxxp://preferredloansla.com hxxp://rinse-rig...

Blog Archive

  • Sep 30 (3)
  • Sep 22 (1)
  • Sep 20 (2)
  • Jul 16 (1)
  • Jul 05 (2)
  • Jun 11 (1)
  • May 20 (1)
  • May 14 (1)
  • May 09 (1)
  • May 08 (2)
  • May 07 (2)
  • Feb 26 (1)
  • Feb 25 (1)
  • Feb 22 (2)
  • Feb 21 (1)
  • Jan 17 (3)
  • Jan 16 (5)
  • Jan 01 (2)
  • Dec 30 (2)
  • Dec 28 (1)
  • Dec 07 (1)
  • Dec 06 (1)
  • Nov 22 (1)
  • Nov 16 (1)
  • Nov 07 (3)
  • Oct 19 (1)
  • Oct 15 (6)
  • Sep 21 (3)
  • Sep 18 (3)
  • Sep 17 (1)
  • Sep 16 (3)
  • Sep 15 (4)
  • Sep 12 (2)
  • Aug 17 (2)
  • Aug 13 (1)
  • Aug 12 (1)
  • Aug 11 (1)
  • Aug 10 (1)
  • Jul 30 (1)
  • Jul 29 (3)
  • Jul 28 (2)
  • Jul 23 (1)
  • Jul 12 (1)
  • Jul 05 (2)
  • Jul 03 (1)
  • Jun 27 (1)
  • Jun 13 (10)
  • May 10 (1)
  • Apr 26 (1)
  • Apr 05 (1)
  • Apr 04 (5)
  • Apr 01 (1)
  • Mar 15 (1)
  • Mar 04 (1)
  • Mar 01 (1)
  • Feb 29 (2)
  • Feb 28 (1)
  • Feb 26 (3)
  • Feb 24 (1)
  • Feb 22 (2)
  • Feb 21 (1)
  • Feb 20 (1)
  • Feb 19 (1)
  • Feb 11 (3)
  • Jan 20 (1)
  • Jan 19 (1)
  • Jan 18 (1)
  • Jan 16 (1)
  • Jan 15 (1)
  • Jan 13 (1)
  • Jan 12 (2)
  • Jan 10 (1)
  • Jan 07 (2)
  • Jan 03 (1)
  • Dec 28 (1)
  • Dec 15 (4)
  • Dec 02 (3)
  • Dec 01 (7)
  • Nov 27 (1)
  • Nov 24 (20)
  • Nov 16 (1)
  • Nov 14 (1)
  • Nov 09 (1)
  • Oct 22 (1)
  • Oct 16 (1)
  • Oct 13 (1)
  • Oct 07 (1)
  • Oct 03 (5)
  • Sep 29 (1)
  • Sep 27 (2)
  • Sep 26 (4)
  • Sep 21 (1)
  • Sep 20 (1)
  • Sep 18 (8)
  • Sep 17 (3)
  • Sep 11 (1)
  • Sep 09 (1)
  • Sep 08 (1)
  • Sep 04 (2)
  • Aug 30 (1)
  • Aug 27 (1)
  • Aug 24 (1)
  • Aug 22 (1)
  • Aug 21 (3)
  • Aug 20 (5)
  • Aug 13 (1)
  • Aug 11 (3)
  • Jul 31 (1)
  • Jul 27 (1)
  • Jul 25 (1)
  • Jul 20 (1)
  • Jul 07 (1)
  • Jun 05 (3)
  • Jun 04 (2)
  • Jun 02 (3)
  • May 20 (2)
  • May 08 (1)
  • May 07 (1)
  • May 03 (1)
  • May 02 (1)
  • May 01 (1)
  • Apr 28 (4)
  • Apr 27 (3)
  • Apr 24 (3)
  • Apr 13 (1)
  • Apr 10 (2)
  • Apr 06 (2)
  • Apr 01 (1)
  • Mar 31 (1)
  • Mar 24 (1)
  • Mar 19 (1)
  • Mar 18 (8)
  • Mar 07 (1)
  • Mar 04 (1)
  • Mar 03 (1)
  • Feb 21 (1)
  • Feb 14 (1)
  • Feb 13 (2)
  • Feb 09 (1)
  • Feb 07 (1)
  • Feb 06 (11)
  • Jan 26 (3)
  • Jan 17 (1)
  • Dec 28 (1)
  • Dec 27 (1)
  • Dec 21 (2)
  • Dec 20 (1)
  • Dec 19 (1)
  • Dec 17 (1)
  • Dec 12 (1)
  • Dec 11 (2)
  • Dec 08 (1)
  • Dec 06 (1)
  • Dec 05 (1)
  • Dec 04 (1)
  • Nov 29 (1)
  • Nov 16 (2)
  • Nov 15 (2)
  • Nov 03 (9)
  • Nov 02 (39)
  • Nov 01 (1)
  • Oct 31 (10)
  • Oct 29 (3)
  • Oct 28 (3)
  • Oct 27 (4)
  • Oct 26 (15)
  • Oct 25 (5)
  • Oct 22 (1)
  • Oct 21 (1)
  • Oct 18 (1)
  • Oct 12 (1)
  • Oct 04 (1)
  • Sep 23 (1)
  • Sep 21 (1)
  • Sep 20 (1)
  • Aug 27 (2)
  • Aug 18 (3)
  • Aug 09 (10)
  • Aug 06 (3)
  • Aug 02 (6)
  • Jul 30 (1)
  • Jul 29 (1)
  • Jul 26 (1)
  • Jul 25 (1)
  • Jul 08 (10)
  • Jul 06 (1)
  • Jul 01 (2)
  • Jun 29 (1)
  • Jun 28 (3)
  • Jun 27 (6)
  • Jun 26 (1)
  • Jun 24 (1)
  • Jun 23 (3)
  • Jun 22 (1)
  • Jun 21 (4)
  • Jun 19 (1)
  • Jun 14 (7)
  • May 27 (1)
  • Apr 24 (1)
  • Apr 13 (2)
  • Mar 30 (3)
  • Mar 29 (1)
  • Mar 28 (1)
  • Mar 24 (3)
  • Mar 20 (1)
  • Mar 08 (1)
  • Mar 04 (1)
  • Feb 28 (2)
  • Feb 27 (3)
  • Feb 26 (1)
  • Feb 25 (1)
  • Feb 21 (1)
  • Feb 17 (1)
  • Feb 12 (1)
  • Feb 05 (2)
  • Feb 03 (1)
  • Feb 02 (1)
  • Feb 01 (1)
  • Jan 28 (12)
  • Jan 27 (11)
  • Jan 26 (1)
  • Jan 25 (1)
  • Jan 24 (3)
  • Jan 23 (3)
  • Jan 22 (1)
  • Jan 20 (5)
  • Dec 30 (1)
  • Dec 28 (2)
  • Dec 25 (1)
  • Dec 21 (1)
  • Dec 14 (2)
  • Dec 10 (1)
  • Dec 09 (2)
  • Dec 04 (7)
  • Nov 30 (2)
  • Nov 29 (1)
  • Nov 28 (2)
  • Nov 27 (3)
  • Nov 03 (1)
  • Oct 30 (2)
  • Oct 29 (6)
  • Oct 18 (3)
  • Oct 10 (1)
  • Oct 08 (1)
  • Oct 07 (1)
  • Oct 06 (1)
  • Oct 04 (5)
  • Oct 03 (1)
  • Oct 02 (7)
  • Sep 30 (4)
  • Sep 27 (1)
  • Sep 25 (1)
  • Sep 22 (2)
  • Sep 20 (8)
  • Sep 18 (1)
  • Sep 16 (1)
  • Sep 09 (1)
  • Sep 08 (4)
  • Sep 07 (4)
  • Aug 18 (1)
  • Aug 16 (1)
  • Jul 31 (2)
  • Jul 29 (1)
  • Jul 27 (1)
  • Jul 22 (8)
  • Jul 12 (1)
  • Jul 11 (2)
  • Jul 09 (1)
  • Jul 06 (1)
  • Jul 05 (2)
  • Jun 25 (4)
  • Jun 24 (3)
  • Jun 14 (1)
  • Jun 13 (3)
  • Jun 09 (1)
  • May 31 (2)
  • May 29 (1)
  • May 28 (1)
  • May 25 (3)
  • May 24 (2)
  • May 04 (1)
  • May 01 (1)
  • Apr 30 (2)
  • Apr 29 (3)
  • Apr 28 (3)
  • Apr 27 (3)
  • Apr 25 (2)
  • Apr 21 (1)
  • Apr 19 (1)
  • Apr 14 (3)
  • Apr 07 (3)
  • Apr 06 (2)
  • Mar 31 (3)
  • Mar 30 (3)
  • Mar 29 (2)
  • Mar 27 (1)
  • Mar 26 (1)
  • Mar 25 (1)
  • Mar 22 (1)
  • Mar 20 (4)
  • Mar 19 (1)
  • Mar 10 (1)
  • Mar 08 (1)
  • Mar 06 (2)
  • Mar 03 (3)
  • Feb 28 (2)
  • Feb 25 (1)
  • Feb 22 (2)
  • Feb 20 (2)
  • Feb 18 (1)
  • Feb 16 (3)
  • Feb 05 (4)
  • Jan 14 (3)
  • Jan 13 (1)
  • Jan 12 (2)
  • Jan 06 (1)
  • Jan 01 (2)
  • Dec 27 (1)
  • Dec 14 (1)
  • Dec 13 (3)
  • Dec 12 (11)
  • Dec 10 (2)
  • Dec 06 (2)
  • Dec 05 (3)
  • Dec 02 (1)
  • Dec 01 (11)
  • Nov 08 (1)
  • Oct 29 (1)
  • Sep 11 (2)
  • Sep 04 (1)
  • Sep 01 (1)
  • Aug 28 (3)
  • Jul 17 (3)
  • Jul 13 (1)
  • Jul 12 (1)
  • Jun 19 (1)
  • Jun 18 (1)
  • May 21 (2)
  • Feb 03 (1)
  • Jan 27 (1)
  • Jan 08 (1)
  • Dec 27 (1)
  • Dec 23 (1)
  • Dec 12 (2)
  • Dec 04 (1)
  • Dec 02 (4)
  • Nov 02 (3)
  • Oct 16 (1)
  • Sep 20 (4)
  • Sep 17 (1)
  • Sep 11 (2)
  • Sep 10 (1)
  • Sep 09 (2)
  • Sep 07 (1)
  • Aug 19 (1)
  • Aug 02 (1)
  • Jul 29 (3)
  • Jul 28 (1)
  • Jul 27 (1)
  • Jul 02 (1)
  • May 30 (2)
  • May 29 (2)
  • May 28 (2)
  • May 23 (1)
  • May 15 (1)
  • May 05 (4)
  • May 04 (4)
  • Apr 22 (1)
  • Apr 12 (1)
  • Apr 04 (1)
  • Mar 22 (1)
  • Feb 07 (9)
  • Feb 06 (1)
  • Feb 03 (1)
  • Jan 31 (1)
  • Jan 27 (1)
  • Jan 24 (1)
  • Jan 16 (1)
  • Jan 15 (1)
  • Dec 18 (1)
  • Dec 17 (1)
  • Dec 16 (1)
  • Nov 28 (2)
  • Oct 22 (6)
  • Oct 21 (9)
  • Oct 20 (8)
  • Oct 19 (2)
  • Sep 20 (1)
  • Aug 12 (1)
  • Aug 02 (1)
  • Jul 30 (1)
  • Jul 28 (1)
  • Jul 24 (1)
  • May 24 (1)
  • May 22 (1)
  • May 14 (1)
  • Jan 23 (1)
  • Jan 20 (1)
  • Nov 15 (2)
  • Nov 09 (1)
  • Jul 28 (1)
  • May 29 (10)
  • Jan 05 (2)
  • Dec 25 (4)
  • Dec 24 (3)
  • Dec 23 (4)
  • Dec 21 (1)
  • Sep 24 (1)
  • Sep 23 (2)
  • Sep 06 (1)
  • Aug 29 (1)
  • Aug 28 (2)
  • Aug 19 (1)
  • Aug 17 (3)
  • Aug 16 (2)
  • Jun 21 (1)
  • Jun 20 (1)
  • Jun 09 (1)
  • May 30 (3)
  • May 17 (3)
  • May 16 (5)
  • May 15 (1)
  • May 07 (1)
  • Apr 26 (2)
  • Apr 24 (3)
  • Aug 28 (1)
  • Aug 27 (1)
  • Jul 29 (1)
  • Oct 21 (1)
  • Mar 22 (1)
  • Mar 06 (2)
  • Jan 16 (2)
  • Jan 09 (2)
  • Jan 07 (2)
  • Jan 06 (1)
  • Dec 11 (2)
  • Dec 04 (2)
  • Dec 03 (1)
  • Nov 14 (2)
  • Nov 12 (4)
  • Nov 04 (5)
  • Nov 01 (1)
  • Oct 02 (1)
  • Oct 01 (2)
  • Sep 28 (2)
  • Sep 18 (2)
  • Sep 16 (1)
  • Aug 30 (1)
  • Aug 29 (4)
  • Aug 23 (1)
  • Aug 22 (2)
  • Aug 21 (1)
  • Aug 15 (1)
  • Aug 10 (2)
  • Aug 01 (1)
  • Jul 23 (2)
  • Jul 19 (2)
  • Jul 04 (3)
  • Jun 22 (2)
  • Jun 20 (1)
  • Jun 12 (1)
  • Jun 10 (2)
  • Jun 04 (1)
  • May 25 (2)
  • May 24 (2)
  • May 01 (1)
  • Apr 17 (2)
  • Apr 10 (2)
  • Apr 01 (1)
  • Mar 06 (2)
  • Mar 04 (1)
  • Feb 21 (2)
  • Feb 06 (2)
  • Feb 04 (2)
  • Jan 09 (1)
  • Jan 07 (2)
  • Jan 05 (3)
  • Dec 27 (1)
  • Dec 13 (1)
  • Nov 30 (2)
  • Nov 26 (2)
  • Nov 23 (1)
  • Nov 02 (2)
  • Oct 26 (2)
  • Oct 01 (1)
  • Sep 28 (4)
  • Aug 23 (2)
  • Jul 10 (2)
  • Jun 06 (2)
  • May 08 (4)
  • Apr 09 (2)
  • Mar 07 (2)
  • Feb 02 (1)
  • Feb 01 (1)
  • Jan 09 (2)
  • Jan 03 (2)
  • Jan 01 (2)
  • Dec 04 (1)
  • Oct 31 (2)
  • Oct 20 (2)
  • Oct 18 (1)
  • Oct 09 (1)
  • Oct 04 (2)
  • Sep 28 (2)
  • Sep 27 (1)
  • Sep 11 (1)
  • Aug 29 (3)
  • Aug 22 (1)
  • Jul 07 (3)
  • Jun 08 (1)
  • May 30 (2)
  • May 26 (2)
  • May 25 (2)
  • May 10 (1)
  • May 09 (3)
  • Apr 28 (1)
  • Apr 12 (1)
  • Apr 11 (1)
  • Apr 04 (2)
  • Mar 31 (2)
  • Mar 25 (1)
  • Mar 23 (1)
  • Mar 16 (2)
  • Mar 11 (1)
  • Mar 10 (4)
  • Mar 07 (1)
  • Feb 28 (1)
  • Feb 21 (1)
  • Feb 16 (1)
  • Feb 15 (1)
  • Feb 14 (1)
  • Feb 09 (1)
  • Jan 31 (2)
  • Jan 26 (1)
  • Jan 22 (1)
  • Jan 21 (1)
  • Sep 11 (1)
  • Sep 08 (1)
  • Aug 13 (1)
  • Aug 09 (1)
  • Aug 02 (1)
  • Jul 20 (1)
  • Jul 19 (1)
  • Jul 16 (1)
  • Jul 15 (1)
  • Jul 14 (1)
  • Jul 13 (1)
  • Jul 05 (1)
  • Jun 29 (1)
  • Jun 17 (1)
  • Jun 16 (1)
  • Jun 15 (1)
  • Jun 08 (1)
  • Jun 03 (2)
  • May 31 (1)
  • May 28 (1)
  • May 26 (1)
  • May 17 (2)
  • May 13 (3)
  • May 11 (4)
  • May 08 (2)
  • May 04 (2)
  • Apr 29 (1)
  • Apr 27 (4)
  • Apr 20 (1)
  • Apr 18 (2)
  • Apr 16 (1)
  • Apr 14 (1)
  • Apr 12 (3)
  • Apr 09 (1)
  • Apr 01 (1)
  • Mar 30 (2)
  • Mar 29 (1)
  • Mar 24 (1)
  • Mar 23 (1)
  • Mar 20 (2)
  • Mar 15 (1)
  • Mar 12 (1)
  • Mar 11 (1)
  • Mar 10 (1)
  • Mar 09 (1)
  • Mar 02 (1)
  • Feb 25 (2)
  • Feb 15 (2)
  • Feb 12 (4)
  • Feb 11 (1)
  • Feb 09 (1)
  • Feb 03 (4)
  • Feb 02 (2)
  • Feb 01 (1)
  • Jan 26 (3)
  • Jan 18 (1)
  • Jan 13 (1)
  • Jan 08 (2)
  • Jan 04 (3)
  • Dec 26 (2)
  • Dec 22 (2)
  • Dec 21 (1)
  • Dec 07 (2)
  • Dec 03 (1)
  • Dec 02 (1)
  • Nov 30 (1)
  • Nov 25 (2)
  • Nov 18 (1)
  • Nov 17 (3)
  • Nov 16 (2)
  • Nov 11 (2)
  • Nov 03 (1)
  • Nov 02 (1)
  • Oct 27 (1)
  • Oct 21 (2)
  • Oct 20 (1)
  • Oct 14 (2)
  • Oct 06 (2)
  • Oct 01 (1)
  • Sep 25 (2)
  • Sep 18 (1)
  • Sep 16 (2)
  • Sep 14 (1)
  • Sep 07 (1)
  • Sep 03 (2)
  • Sep 01 (1)
  • Aug 24 (1)
  • Aug 19 (2)
  • Aug 18 (2)
  • Aug 10 (1)
  • Aug 06 (1)
  • Aug 05 (1)
  • Aug 04 (3)
  • Aug 03 (1)
  • Jul 30 (2)
  • Jul 29 (1)
  • Jul 27 (1)
  • Jul 22 (2)
  • Jul 16 (2)
  • Jul 15 (1)
  • Jul 08 (1)
  • Jul 07 (2)
  • Jul 03 (1)
  • Jul 01 (1)
  • Jun 25 (1)
  • Jun 24 (1)
  • Jun 17 (1)
  • Jun 16 (1)
  • Jun 09 (1)
  • Jun 08 (2)
  • Jun 05 (1)
  • Jun 04 (1)
  • Jun 02 (2)
  • May 27 (1)
  • May 26 (2)
  • May 19 (2)
  • May 14 (1)
  • May 12 (1)
  • May 06 (3)
  • May 01 (1)
  • Apr 30 (1)
  • Apr 29 (1)
  • Apr 28 (1)
  • Apr 22 (1)
  • Apr 16 (2)
  • Apr 15 (1)
  • Apr 14 (1)
  • Apr 08 (2)
  • Apr 01 (1)
  • Mar 31 (2)
  • Mar 26 (1)
  • Mar 25 (1)
  • Mar 19 (1)
  • Mar 18 (1)
  • Mar 12 (1)
  • Mar 11 (1)
  • Mar 09 (1)
  • Mar 04 (2)
  • Feb 26 (2)
  • Feb 24 (1)
  • Feb 23 (1)
  • Feb 18 (1)
  • Feb 17 (1)
  • Feb 11 (1)
  • Feb 05 (1)
  • Feb 03 (2)
  • Feb 02 (2)
  • Jan 28 (1)
  • Jan 27 (1)
  • Jan 21 (1)
  • Jan 19 (2)
  • Jan 14 (2)
  • Jan 07 (1)
  • Jan 06 (3)
  • Dec 17 (1)
  • Dec 15 (3)
  • Dec 11 (1)
  • Dec 09 (1)
  • Dec 08 (1)
  • Dec 04 (1)
  • Dec 02 (2)
  • Nov 27 (1)
  • Nov 25 (1)
  • Nov 19 (2)
  • Nov 18 (1)
  • Nov 13 (2)
  • Nov 12 (3)
  • Nov 10 (1)
  • Nov 06 (1)
  • Nov 04 (1)
  • Nov 03 (2)
  • Oct 29 (1)
  • Oct 28 (2)
  • Oct 24 (1)
  • Oct 22 (1)
  • Oct 21 (1)
  • Oct 20 (1)
  • Oct 16 (2)
  • Oct 15 (1)
  • Oct 14 (2)
  • Oct 09 (2)
  • Oct 07 (3)
  • Oct 06 (1)
  • Oct 03 (2)
  • Oct 02 (4)
  • Oct 01 (1)
  • Sep 30 (2)
  • Sep 29 (2)
  • Sep 26 (1)
  • Sep 25 (1)
  • Sep 24 (2)
  • Sep 17 (1)
  • Sep 16 (1)
  • Sep 15 (2)
  • Sep 10 (1)
  • Sep 04 (1)
  • Sep 03 (2)
  • Sep 02 (1)
  • Aug 29 (1)
  • Aug 28 (1)
  • Aug 27 (1)
  • Aug 26 (2)
  • Aug 25 (1)
  • Aug 22 (1)
  • Aug 21 (1)
  • Aug 20 (2)
  • Aug 19 (1)
  • Aug 18 (2)
  • Aug 14 (2)
  • Aug 13 (1)
  • Aug 11 (1)
  • Aug 08 (2)
  • Aug 07 (2)
  • Aug 05 (3)
  • Aug 04 (1)
  • Aug 01 (1)
  • Jul 31 (1)
  • Jul 30 (1)
  • Jul 29 (2)
  • Jul 28 (2)
  • Jul 25 (2)
  • Jul 24 (3)
  • Jul 22 (2)
  • Jul 21 (2)
  • Jul 18 (4)
  • Jul 17 (2)
  • Jul 15 (2)
  • Jul 14 (2)
  • Jul 11 (1)
  • Jul 10 (1)
  • Jul 09 (2)
  • Jul 08 (1)
  • Jul 07 (3)
  • Jul 04 (1)
  • Jul 03 (1)
  • Jul 02 (1)
  • Jul 01 (2)
  • Jun 30 (1)
  • Jun 27 (1)
  • Jun 26 (1)
  • Jun 25 (2)
  • Jun 24 (1)
  • Jun 23 (1)
  • Jun 20 (2)
  • Jun 18 (1)
  • Jun 16 (1)
  • Jun 13 (1)
  • Jun 12 (1)
  • Jun 11 (1)
  • Jun 10 (1)
  • Jun 09 (1)
  • Jun 05 (1)
  • Jun 03 (1)
  • Jun 02 (1)
  • May 30 (2)
  • May 27 (2)
  • May 26 (4)
  • May 23 (1)
  • May 22 (1)
  • May 21 (2)
  • May 20 (3)
  • May 19 (2)
  • May 17 (1)
  • May 15 (2)
  • May 14 (1)
  • May 13 (1)
  • May 12 (3)
  • May 09 (1)
  • May 08 (1)
  • May 07 (2)
  • May 06 (1)
  • May 05 (1)
  • May 02 (2)
  • Apr 30 (3)
  • Apr 29 (1)
  • Apr 28 (2)
  • Apr 27 (1)
  • Apr 26 (1)
  • Apr 24 (1)
  • Apr 23 (2)
  • Apr 22 (1)
  • Apr 21 (4)
  • Apr 18 (1)
  • Apr 16 (2)
  • Apr 15 (1)
  • Apr 14 (2)
  • Apr 08 (1)
  • Apr 07 (1)
  • Apr 03 (1)
  • Apr 02 (1)
  • Apr 01 (4)
  • Mar 31 (2)
  • Mar 28 (1)
  • Mar 25 (1)
  • Mar 20 (1)
  • Mar 19 (1)
  • Mar 18 (1)
  • Mar 17 (1)
  • Mar 12 (4)
  • Mar 10 (1)
  • Mar 07 (1)
  • Mar 06 (1)
  • Mar 05 (2)
  • Mar 04 (1)
  • Mar 03 (1)
  • Feb 27 (2)
  • Feb 26 (1)
  • Feb 25 (1)
  • Feb 22 (1)
  • Feb 21 (2)
  • Feb 20 (2)
  • Feb 18 (5)
  • Feb 13 (4)
  • Feb 12 (2)
  • Feb 11 (1)
  • Jan 31 (1)
  • Jan 28 (1)
  • Jan 21 (2)
  • Jan 17 (1)
  • Jan 16 (1)
  • Jan 15 (2)
  • Jan 14 (2)
  • Jan 10 (1)
  • Jan 08 (1)
  • Jan 07 (2)
  • Dec 28 (2)
  • Dec 24 (2)
  • Dec 20 (2)
  • Dec 19 (1)
  • Dec 17 (1)
  • Dec 16 (1)
  • Dec 15 (1)
  • Dec 12 (2)
  • Dec 11 (1)
  • Dec 10 (3)
  • Dec 07 (1)
  • Dec 05 (1)
  • Dec 03 (1)
  • Nov 29 (1)
  • Nov 28 (2)
  • Nov 27 (3)
  • Nov 26 (2)
  • Nov 23 (1)
  • Nov 21 (2)
  • Nov 20 (1)
  • Nov 18 (2)
  • Nov 16 (1)
  • Nov 15 (2)
  • Nov 14 (3)
  • Nov 12 (3)
  • Nov 09 (1)
  • Nov 08 (1)
  • Nov 07 (1)
  • Nov 06 (1)
  • Nov 05 (2)
  • Nov 03 (2)
  • Nov 02 (2)
  • Oct 30 (2)
  • Oct 29 (2)
  • Oct 25 (1)
  • Oct 23 (4)
  • Oct 22 (1)
  • Oct 21 (1)
  • Oct 20 (1)
  • Oct 19 (2)
  • Oct 18 (1)
  • Oct 17 (1)
  • Oct 16 (3)
  • Oct 15 (1)
  • Oct 13 (1)
  • Oct 11 (3)
  • Oct 10 (2)
  • Oct 08 (1)
  • Oct 05 (1)
  • Oct 03 (2)
  • Oct 02 (1)
  • Oct 01 (1)
  • Sep 30 (2)
  • Sep 29 (2)
  • Sep 28 (1)
  • Sep 27 (1)
  • Sep 26 (3)
  • Sep 24 (1)
  • Sep 21 (1)
  • Sep 20 (1)
  • Sep 19 (2)
  • Sep 17 (3)
  • Sep 14 (1)
  • Sep 12 (1)
  • Sep 11 (1)
  • Sep 10 (2)
  • Sep 06 (1)
  • Sep 05 (2)
  • Sep 04 (2)
  • Sep 03 (1)
  • Aug 31 (2)
  • Aug 30 (1)
  • Aug 29 (2)
  • Aug 28 (1)
  • Aug 26 (1)
  • Aug 25 (1)
  • Aug 24 (2)
  • Aug 22 (2)
  • Aug 21 (1)
  • Aug 20 (1)
  • Aug 17 (1)
  • Aug 16 (3)
  • Aug 13 (2)
  • Aug 09 (1)
  • Aug 08 (2)
  • Aug 03 (2)
  • Jul 31 (3)
  • Jul 30 (2)
  • Jul 28 (2)
  • Jul 26 (3)
  • Jul 25 (1)
  • Jul 19 (1)
  • Jul 18 (2)
  • Jul 17 (1)
  • Jul 11 (2)
  • Jul 09 (2)
  • Jul 06 (1)
  • Jul 05 (1)
  • Jul 04 (1)
  • Jun 29 (1)
  • Jun 28 (1)
  • Jun 27 (1)
  • Jun 26 (1)
  • Jun 25 (2)
  • Jun 22 (2)
  • Jun 21 (2)
  • Jun 20 (1)
  • Jun 18 (1)
  • Jun 12 (3)
  • Jun 07 (1)
  • Jun 06 (2)
  • Jun 04 (2)
  • May 31 (1)
  • May 30 (3)
  • May 29 (2)
  • May 23 (3)
  • May 22 (2)
  • May 21 (1)
  • May 19 (1)
  • May 18 (1)
  • May 17 (1)
  • May 16 (4)
  • May 14 (2)
  • May 11 (1)
  • May 10 (3)
  • May 08 (1)
  • May 04 (2)
  • May 02 (2)
  • Apr 30 (3)
  • Apr 26 (3)
  • Apr 25 (1)
  • Apr 23 (1)
  • Apr 20 (4)
  • Apr 12 (1)
  • Apr 10 (2)
  • Apr 09 (1)
  • Apr 04 (3)
  • Apr 01 (1)
  • Mar 30 (2)
  • Mar 28 (1)
  • Mar 27 (2)
  • Mar 22 (2)
  • Mar 21 (3)
  • Mar 20 (4)
  • Mar 19 (5)
  • Mar 14 (1)
  • Mar 12 (3)
  • Mar 11 (1)
  • Mar 10 (5)
  • Mar 09 (3)
  • Mar 08 (3)
  • Mar 07 (4)
  • Mar 02 (1)
  • Mar 01 (1)
  • Feb 28 (2)
  • Feb 27 (3)
  • Feb 23 (3)
  • Feb 22 (2)
  • Feb 21 (1)
  • Feb 19 (1)
  • Feb 18 (3)
  • Feb 16 (2)
  • Feb 15 (2)
  • Feb 14 (2)
  • Feb 13 (3)
  • Feb 12 (1)
  • Feb 08 (2)
  • Feb 06 (1)
  • Feb 02 (1)
  • Feb 01 (3)
  • Jan 26 (2)
  • Jan 25 (4)
  • Jan 23 (2)
  • Jan 17 (2)
  • Jan 15 (1)
  • Jan 13 (1)
  • Jan 11 (2)
  • Jan 10 (3)
  • Jan 09 (3)
  • Jan 08 (2)
  • Jan 07 (5)
  • Jan 04 (2)
  • Dec 19 (2)
  • Dec 18 (1)
  • Dec 14 (3)
  • Dec 12 (2)
  • Dec 11 (2)
  • Dec 10 (6)
  • Dec 08 (2)
  • Dec 07 (2)
  • Nov 30 (2)
  • Nov 29 (2)
  • Nov 27 (4)
  • Nov 20 (1)
  • Nov 14 (3)
  • Nov 13 (2)
  • Nov 09 (2)
  • Nov 07 (1)
  • Nov 03 (1)
  • Nov 01 (2)
  • Oct 30 (1)
  • Oct 29 (2)
  • Oct 28 (1)
  • Oct 26 (3)
  • Oct 24 (3)
  • Oct 18 (2)
  • Oct 17 (1)
  • Oct 16 (2)
  • Oct 15 (1)
  • Oct 14 (1)
  • Oct 12 (7)
  • Oct 05 (3)
  • Oct 04 (1)
  • Sep 28 (4)
  • Sep 27 (2)
  • Sep 25 (3)
  • Sep 22 (4)
  • Sep 19 (1)
  • Sep 18 (4)
  • Sep 14 (1)
  • Sep 13 (5)
  • Sep 12 (1)
  • Sep 11 (3)
  • Sep 08 (3)
  • Sep 07 (1)
  • Sep 06 (2)
  • Sep 05 (1)
  • Sep 04 (2)
  • Sep 03 (1)
  • Sep 02 (2)
  • Aug 28 (1)
  • Aug 27 (1)
  • Aug 26 (4)
  • Aug 22 (3)
  • Aug 20 (1)
  • Aug 19 (1)
  • Aug 16 (1)
  • Aug 12 (2)
  • Aug 11 (1)
  • Aug 10 (3)
  • Aug 09 (2)
  • Aug 07 (1)
  • Aug 06 (1)
  • Aug 05 (1)
  • Aug 04 (1)
  • Aug 03 (2)
  • Aug 02 (1)
  • Jul 31 (2)
  • Jul 30 (1)
  • Jul 27 (1)
  • Jul 26 (1)
  • Jul 25 (1)
  • Jul 24 (1)
  • Jul 21 (5)
  • Jul 20 (1)
  • Jul 17 (1)
  • Jul 16 (3)
  • Jul 14 (1)
  • Jul 10 (2)
  • Jul 09 (1)
  • Jul 08 (1)
  • Jul 06 (2)
  • Jul 05 (1)
  • Jul 03 (1)
  • Jul 02 (1)
  • Jul 01 (1)
  • Jun 30 (2)
  • Jun 29 (2)
  • Jun 28 (1)
  • Jun 27 (2)
  • Jun 26 (3)
  • Jun 25 (2)
  • Jun 24 (1)
  • Jun 13 (2)
  • Jun 11 (2)
  • Jun 10 (3)
  • Jun 09 (1)
  • Jun 08 (2)
  • Jun 06 (2)
  • Jun 04 (2)
  • Jun 03 (1)
  • May 31 (1)
  • May 30 (4)
  • May 28 (1)
  • May 27 (4)
  • May 23 (5)
  • May 22 (1)
  • May 16 (3)
  • May 15 (1)
  • May 12 (1)
  • May 11 (5)
  • May 09 (2)
  • May 08 (1)
  • May 04 (2)
  • May 03 (1)
  • May 02 (1)
  • Apr 27 (2)
  • Apr 26 (1)
  • Apr 25 (1)
  • Apr 24 (2)
  • Apr 20 (2)
  • Apr 18 (2)
  • Apr 14 (1)
  • Apr 13 (2)
  • Apr 12 (2)
  • Apr 05 (4)
  • Apr 03 (1)
  • Mar 31 (2)
  • Mar 27 (2)
  • Mar 21 (2)
  • Mar 20 (1)
  • Mar 17 (2)
  • Mar 16 (1)
  • Mar 15 (1)
  • Mar 10 (1)
  • Mar 07 (2)
  • Mar 06 (5)
  • Feb 27 (1)
  • Feb 25 (1)
  • Feb 24 (4)
  • Feb 17 (3)
  • Feb 16 (1)
  • Feb 15 (2)
  • Feb 14 (1)
  • Feb 13 (1)
  • Feb 09 (2)
  • Feb 08 (1)
  • Feb 07 (2)
  • Feb 06 (1)
  • Feb 03 (1)
  • Feb 02 (2)
  • Jan 31 (1)
  • Jan 30 (3)
  • Jan 26 (5)
  • Jan 24 (1)
  • Jan 23 (5)
  • Jan 19 (2)
  • Jan 17 (2)
  • Jan 16 (3)
  • Jan 12 (2)
  • Jan 11 (1)
  • Jan 10 (4)
  • Jan 09 (1)
  • Jan 04 (9)
  • Dec 19 (3)
  • Dec 14 (1)
  • Dec 12 (1)
  • Dec 07 (1)

Subscribe To

Posts
Atom
Posts
All Comments
Atom
All Comments

Labels

29A (1) 29A Virus Coding Group (1) 419 Scam (4) AbdAllah (1) Abdallah Internet Hizmetleri (1) Able Danger (1) Abuse Department (1) Active Security Monitor (1) Advance Fee Scam (2) Advanced Persistent Threat (2) Advertising (3) Adware (3) Affiliate Network (7) Ahmad Al Agha (1) Al Qaeda (3) Aleksandr Zhukov (1) Allied Group Inc (1) Amazon AWS (1) ANA Spoofer Project (1) Android (2) Anonymity (31) Anonymizer (1) Anonymous (1) Anonymous Hacking Collective (1) Anti-Phishing Group (1) Antivirus (6) Antivirus Signatures (3) Anton Nikolaevich Korotchenko (1) AOL (2) API (1) Apple (1) APT (1) Aqua ZeuS Gang (1) Armadillo Phone (2) Ashiyane Digital Security Team (5) ASProx (2) Astalavista (7) Astalavista Security Group (1) Astalavista.box.sk (4) ATM Skimmer (1) ATS (1) Australia (1) Authentication (2) Avalance Botnet (2) Avast (1) Background Check (1) BadB (1) Bahama Botnet (1) BakaSoftware (1) Bantu (1) BBC (1) Bebo (1) Bed Time Reading (1) Behrooz Kamalian (2) Best Practices (2) BGP (1) Big Brother (3) Bill Gates Botnet (1) Biography (1) Biometrics (1) Bitcoin (1) Bjorn Andreasson (1) Black Energy (1) Blackhat SEO (27) Blood and Honor (1) Blood and Honor Bulgaria (1) Boeing (1) Bogus Account (1) bother (1) Botners (1) Botnet (160) Botnets (21) Box.sk (1) Brian Krebs (1) Brute-Forcing (1) Bulgaria (18) Bulgaria Law Enforcement (14) Bulgarian Cyber Army (1) Bulgarian Cyber Army Hacking Group (1) Bullet Proof Hosting (1) Bust (1) C4I (2) CALEA (1) Caller ID (1) Caller ID Spoofer (1) Candid Wuest (1) CAPTCHA (2) Career Enrichment (1) Cash Transfers (1) CCTV (1) CDT (1) Cell Phone Monitoring (1) Cell Phone Surveillance (1) CellDEK (1) Censorship (28) Center for Democracy and Technology (1) CERT (1) Cheyenne Mountain Operations Center (1) China (9) China Eagle Union (1) CIA (15) CipherTrust (1) Classified Information (1) Client-Side Exploits (30) Client-Side Vulnerabilities (30) CNO (1) COCOM (1) Cold War (1) COMINT (1) Competitive Intelligence (3) Compliance (3) Computer Crime Survey (1) Computer Network Operation (1) Conficker (1) Confidential Connections (1) Conspiracy (1) Conspiracy Theory (1) Conti (8) Conti Ransomware (7) Conti Gang (8) Conti Ransomware (7) Conti Ransomware Gang (8) Cookies (1) CoolWebSearch (4) Corporate Risk Management (4) Counter Espionage (2) Counter Intelligence (1) Credit Cards (7) Crimeware (3) Critical Infrastructure (2) Crusade Affiliates (1) Crypters (1) Cryptography (6) Cryptome (2) Cryptoviral Extortion (2) CSIA (2) CVE (1) Cyber Attack (61) Cyber Espionage (73) Cyber Insurance (1) Cyber Jihad (34) Cyber Militia (7) Cyber Security Industry Alliance (1) Cyber Security Investment (9) Cyber Terrorism (40) Cyber Threat Actor Attribution Maltego Graphs (2) Cyber Warfare (68) Cyber Weapon (1) Cyber Weapons (1) CyberCamp 2016 (1) Cybercrime (334) Cybercrime Ecosystem (21) Cybercrime Forum (36) Cybercrime Forum Data Set (13) Cybercrime Incident Response (1) Cybercrime Incident Response Maltego Graphs (1) Cybercrime Search Engine (1) Cybercriminal (1) Cyberpunk (4) Cyberspace (22) Cybertronics (3) Daniel Brandt (1) Dark Vader (1) Dark Forum (1) Dark Web (10) Dark Web Onion (5) Dark Web Search Engine (2) DarkComet RAT (1) Darkode (1) Darkode Forum Community (1) Data Acquisition (1) Data Breach (10) Data Center (1) Data Leak (2) Data Mining (6) David Endler (2) DCLeaks (1) DDoS (10) DDoS For Hire (1) Defense Complex (1) Delicious Information Warfare (1) Denmark (1) Department of Defense (2) DHS (1) DIA (1) Digital Armaments (1) Digital Forensics (2) Digital Rights (8) Dilbert (1) Distributed Computing (4) Distributed Computing Project (4) Distributed Project (4) DNS (2) DNS Changer (1) DoD (3) DoJ (1) DotCom (1) DreamHost (1) Dropbox (1) Durzhavna Sigurnost (3) DVD of the Weekend (5) E-Banking (2) E-Business (3) E-Commerce (2) E-Shop (2) Eavesdropping (24) Ebay (1) ECHELON (2) ECOFIN Projects (1) Economics (3) eID (1) Electric Universe (1) Electromagnetic Pulse Weapons (3) Electronic Banking (1) ELINT (1) Emotet (2) Emotet Botnet (1) EMP (3) Encrochat (1) Encrochat Database Leak (1) Encrypted Communication (6) Encrypted Phone (1) Encryption (8) Enigma (2) ENISA (1) Enki Bilal (1) Enron (1) Erasmus Bridge (1) Eric Goldman (2) Espionage (6) Espionage Movie (2) Evgeniy Mikhaylovich Bogachev (1) Exmanoize (1) Exploit Broker (10) Exploit Kit (2) Exploits (39) Eyeball Series (1) F-Secure (1) Facebook (15) Fake Account (1) Fake Adobe Flash Player (4) Fake Certificate (1) Fake Chrome Extension (1) Fake Chrome Update (1) Fake Code Signing Certificate (1) Fake Confirmed Facebook Friend Request Email (1) Fake Documents (7) Fake Facebook Appeal (1) Fake Facebook Notification (1) Fake Facebook Profile Spy Application (1) Fake Firefox Update (1) Fake Hosting Provider (1) Fake ID (7) Fake Internet Explorer Update (1) Fake Passport (8) Fake Personal ID (1) Fake Safari Update (1) Fake Security Software (48) Fake Tech Support Scam (1) Fake Utility Bill (4) Fake Video Codec (2) Fake Visa (1) Fake Visa Application (1) Fake Web Site (1) Fake Who's Viewed Your Facebook Profile Extension (4) Fake YouTube Player (1) Fast-Flux (3) FBI (4) FBI Most Wanted (5) FCC (1) FDIC (1) Financial Management (1) Firas Nur Al Din Dardar (1) FireEye (1) Flashpoint Intel (1) Foreign Influence Operations (2) Forensics (2) Forwarderz (2) FoxNews (1) Fraud (17) Free Speech (17) FSB (2) FTLog (1) FTLog Worm (1) Gartner (1) Gavril Danilkin (1) GazTranzitStroyInfo (1) GCHQ (8) GDBOP (1) Generation I (1) George Bush (1) Georgi Markov (1) Georgia (4) Germany (1) Gift Cards (1) GiveMeDB (1) Global Security Challenge (1) Goa Trance (1) GoDaddy (1) Google (11) Google Firebase (1) Google Ads (1) Google Docs (6) Google Earth (4) Google Groups (1) Google Hacking (2) Google Maps (3) Google Play (1) Google Store (1) Greece (1) Growth Hacker (2) GRU (1) Guccifer 2.0 (1) GUI (1) Gumblar (1) Hacked Database (5) Hacked Web Site (5) Hacker (2) Hackers (2) Hacking (233) Hacking Book (1) Hacking Forum (1) Hacking Group (5) Hacking Groups (1) Hacking Tools (1) HackPhreak (1) HackPhreak Hacking Group (1) Hacktivism (5) Haiti (1) Hamas (1) Hezbollah (1) High Tech Brazil Hack Team (1) Hilary Kneber (4) HKLeaks (1) Home Molestation (8) Homebrew (1) Honeynet Project (1) Honker Union of China (1) HUMINT (2) ICBM (1) ID Theft (4) iDefense (3) Identity Theft (4) Illegal Arrest (13) Illegal Hosting (1) Illegal Restraint (3) IMINT (2) IMLogic (3) India (1) India Company (1) Indicator of Compromise (1) Information Operations (2) Information Security (598) Information Security Forum (1) Information Security Market (5) Information Warfare (67) Infrastructure Security (1) InFraud (1) InFraud Cybercrime Gang (1) InFraud Cybercrime Syndicate (1) InFraud Organization (1) InqTana Mac OS X Malware (1) Insider (8) Insider Monitoring (2) Insider Threat (9) Instant Messaging (6) Intellectual Property (1) Intelligence (19) Intelligence Agency (17) Intelligence Community (35) Internal Revenue Service (1) International Exploit Shop (2) Internet (15) Internet Censorship (23) Internet Economy (4) Internet Relay Chat (1) Investment Banking (6) IoC (1) IP Cloaking (2) IP Hiding (1) IP Spoofing (1) iPowerWeb (1) IPSec (1) IPv4 (1) IPv6 (2) Iran (19) Iran Election (1) Iran Election 2009 (1) Iran Hacker Groups (7) Iran Hacking Groups (7) Iran Mabna Hackers (1) IRC (1) IRS (1) ISIS (1) Israel (1) Jabber (5) JabberZeuS (2) Javor Kolev (1) Jeffrey Carr (1) Joanna Rutkowska (1) Johannes Ullrich (2) John Young (1) K Rudolph (1) Kaseya (1) Kaseya Ransomware Attack (1) Katrina (1) Keylogger (1) KGB (7) Kidnapping (14) Koobface (29) Koobface Botnet (3) Korean Demilitarized Zone (1) KrotReal (1) Latest News Articles (2) Latvia (1) Law Enforcement (29) Lawful Interception (5) Leaks (1) Lenovo (3) Liberty Front Press Network (1) Lizamoon (2) Loads.cc (1) Localization (1) Location Tracking (2) Lockheed Martin (1) Logicube (1) Lone Gunmen (3) Lovely Horse (2) Lubyanka Square Headquarters (1) M4 Project (1) Mac OS X (3) Malicious Software (190) Maltego (6) Maltego Graphs (1) Malvertising (4) Malware (49) Malware Information Sharing Platform (1) Marketing (2) Mass Web Site Defacement (10) Mastercard (1) McAfee (3) MD5 (1) Media Methane (1) Memoir (2) Metrics (1) Microsoft (3) Microsoft Live (1) Military Communications (2) Ministry of Interior (1) MISP (1) Missile Base (1) Mobile (5) Mobile Application (2) Mobile Communication Censorship (1) Mobile Internet (3) Mobile Location Tracking (5) Mobile Malware (10) Mobile Security (2) Mohammad Sagegh Ahmadzadegan (1) Money Laundering (24) Money Mule (26) Money Mule Recruitment (26) Monoculture (1) Morgan Stanley (1) Moses Staff (1) Most Wanted Cybercriminals (1) MSN (3) MSRC (1) MSRC Researcher Recognition Program (1) Muhammad Cartoons (1) MVR (1) MyWebFace (1) NASA (1) National Cyber Security Centre (1) National Security (2) Native Intelligence (1) NBC (2) NCSC (1) NetAssist LLC (1) NetCraft (1) Network Centric Warfare (1) Network Solutions (3) New Media (9) Nikolay Nedyalkov (1) Nikopol Trilogy (1) Nintendo (1) Nintendo DS (1) NordVPN (1) Norman Sandbox (1) North Korea (3) North Korea Missile Launch Pad (1) NSA (16) NSO Group (1) NSO Group Spyware (1) Nuclear Weapons (3) Nyxem (1) OEM (1) Offensive Cyber Warfare (1) OMEMO (1) Omerta (1) One-Time Password (1) One-Time Passwords In Everything (2) OneCare (1) Online Advertising (5) Online Fraud (12) Online Marketing (3) Online Propaganda Campaign (1) Online Scam (3) Open Source Malware (3) Operation EQUALIZER (1) Operation Uncle George (8) OPIE (1) OPSEC (1) Osama Bin Laden (1) OSINT (118) OSINT Training (1) OTC (1) OTP (1) Over-The-Counter (1) Packers (1) Parked Domains (1) Passwords (2) Pavlin Georgiev (1) Pay Per Install (3) PayPal (1) Perplex City (1) Persistent Cookies (1) Personal Career (1) Personal Data (4) Pharmaceutical Scams (1) Phileas Crawler (1) Phishing (12) Phishing Campaign (8) Phishing Domain Farm (1) Phishing Toolbar (2) PhishTube (1) Phreedom (1) Physical Security (1) Pinterest (1) Piracy (1) PlushForums (1) Podcast (2) Point of Sale Terrminal (1) Politics (1) PornTube (1) POS (1) Potentially Unwanted Application (2) PR (1) Press Coverage (1) Privacy (34) Project RAHAB (1) Prolexic (1) Protonmail (4) Proxy Service (1) Psychedelic Trance (2) PSYOPS (2) Psytrance (2) Psytrance Song of the Day (2) Qassam Cyber Fighters (2) Radicati Group (1) Ransomware (20) RAT (1) Ray Kurzweil (1) RBN (1) Reconnaissance Satellite (2) Red Joan (1) Regulation (1) Remote Access Tool (4) Reporters Without Borders (1) Return On Investment (9) Return On Security Investment (10) REvil Ransomware Group (1) Revolution in Militvry Affairs (1) RIPA (1) Risk Management (2) Rogue Account (1) Rogue Chrome Extension (1) Rogue Facebook Appeal (1) Rogue Security Software (2) Rogue Video Codec (1) Rogue YouTube Player (1) Rogueware (3) ROI (3) Roman Polesek (1) Root Server (2) Rootkit (1) ROSI (7) RSA (1) RSA Conference (1) Russia (12) Russia Small Group (1) Russian (1) Russian Bomber (1) Russian Business Network (4) Russian Submarine (1) Safe Harbor (1) Satellite Imagery (3) Satellite Jamming (1) Satellite SIGINT (1) Scam (4) Scams (9) Scandoo (1) ScanSafe (1) Scareware (50) Scientific Intelligence (1) Scribd (1) Search Engine (16) Search Engine Optimization (26) SEC (1) SecondEye Solutions (2) Secret Service (1) Secure Communication (1) SecureDrop (1) Securities and Exchange Commission (1) Security (645) Security Awareness (2) Security Book (1) Security Breach (4) Security Conference (2) Security Directory (1) Security Education (1) Security Event (2) Security Forum (1) Security Game (1) Security Industry (6) Security Interviews (3) Security Investment (5) Security Metrics (3) Security Podcast (2) Security Project (1) Security Research (1) Security Statistics (3) Security Training (1) Security Trends (8) Sensitive Information (2) SEO (2) Shadow Server (1) ShadowCrew (5) SIGINT (2) Silent Circle (1) Sipco Systems (1) SIPRNET (2) SITE Institute (1) SiteAdvisor (4) Skype (2) Sniffing (1) Social Engineering (4) Social Network Analysis (5) SocialMediaSystem (1) Software Piracy (1) Solarwinds (1) Song of the Day (2) Sophos (1) Soviet Union (1) Space Warfare (3) Space Weapons (1) Spam (10) Spam Campaign (7) Spam Operations (7) Spear Phishing (2) Spoofing (1) Sprott Asset Management (1) Spyware (3) SQL Injection (3) SSL (2) SSN (1) Stalkware (1) Starlight (1) Stealth Ideas Inc (1) Steganography (1) STIX (3) STIX2 (3) Stolen Credit Card (9) Stolen Credit Cards (5) Stolen Gift Cards (1) Strider Crawler (1) Sub7 (1) Suri Pluma (1) Surveillance (24) Swine Flu (1) Symantec (5) Symbian (1) Syria (2) Syrian Electronic Army (1) Syrian Embassy (1) Taia Global (1) TAN (1) TAXII (3) TDoS (1) Team Code Zero (1) Team Code Zero Hacking Group (1) Tech Support Scam (1) Technical Collection (73) Technical Mujahid (1) Telephony Denial of Service Attack (1) Terrorism (8) th3j35t3r (1) THAAD (1) The Bunker (1) The Immortals (1) The Lawnmower Man (2) The Outer Limits (4) Thought Leadership (1) Thousand Talents Program (1) Threat Intelligence (18) Threat Intelligence Feed (2) Threat Intelligence Report (1) TIA (4) Tipping Point (1) Top Secret Program (1) Tor (1) Tor Project (1) Torrent (1) TorrentReactor (1) Total Information Awareness (4) Travel Without Moving (9) TrendMicro (2) Trickbot (1) Trickbot Gang (1) Trickbot Malware (1) Trickbot Malware Gang (1) Trifinite Group (1) Trojan Horse (2) TROYAK-AS (2) Tutanota (2) Twitter (4) Two Factor Authentication (1) Two-Factor Authentication (3) Typosquatting (3) U.K National Cyber Security Centre (1) U.S Bureau of Engraving and Printing (2) U.S Cyber Command (1) U.S Driving License (1) U.S Elections (3) U.S Sanctions (1) U.S Secret Service (1) Underground Search Engine (1) United Kingdom (4) University ID Card (1) Vasil Moev Gachevski (1) Vault 7 (1) VeriSign (1) Vertex Net Loader (1) Virtual Private Network (2) Virtual Reality (5) Virtual Reality Social Network (4) Virtual World (4) Virus (1) Virus for You (1) Virus Map (1) Virus Recovery Button (1) Viruses (2) VirusTotal (1) Visa (1) Visual Information System (2) Visualization (3) Void Balaur Malware Gang (1) VoIP (2) VPN (3) Vulnerabilities (39) Vulnerability Broker (10) War Driving (1) War Games (1) Weapon Systems (1) Web 2.0 (3) Web Application Worm (1) Web Crawler (2) Web Inject (1) Web Proxy Service (1) Web Shells (1) Web Site Defacement (10) Web Site Defacement Groups (4) Webroot (2) WHGDG (1) WhoisXML API (10) WhoisXML API Jabber ZeuS Gang (1) Wireless (2) Wireless Hacking (1) Wireless Internet (2) Wiretapping (10) WMF Vulnerability (2) World Hacker Global Domination Group (1) X-Files (2) X-Tunnel (1) XMPP (4) XSS (1) Yahoo (2) Yaroslav Vasinskyi (1) Yavor Kolev (1) YouTube (1) ZDNet (1) ZDNet Zero Day Blog (1) Zero Day Exploit (6) Zero Day Initiative (2) Zerodium (1) ZeuS (4) Zombie Alert (2) Zone-H (2) Zotob (1)
Powered by Blogger.