Friday, December 27, 2019

Exposing High Tech Brazil Hack Team Mass Web Site Defacement Group - An OSINT Analysis

It's been a while since I've last posted on quality update further detailing the inner workings of a high-profile and prominent Web Site Defacement group that has managed to successfully compromise thousands of Web sites internationally that also includes Bulgaria's National Security Agency (DANS) - hxxp://dans.org Web site.

In this post I'll provide actionable intelligence including personally identifiable information on the people and the gang behind the campaign including an in-depth analysis of their tactics techniques and procedures including personal photos and social media accounts of the infamous High Tech Brazil Hack Team whose responsible for having successfully defaced over 5,000 legitimate Web Sites internationally.

Team Members Include:
- crazyduck - Real Name: Fabian de Souza Peralazzo
- otrasher - Email: Otrasher@live.com - Social Media Account - https://twitter.com/b1tchx_
- l34NDR0
- wicked
- live
- Smoker

Sample Photos of High Tech Brazil Hack Team Team Members:









































Twitter Social Media Accounts known to have participate in the campaign:
https://twitter.com/xFellipeCT
https://twitter.com/Kouback_TR_
https://twitter.com/b1tchx_
https://twitter.com/synchr0n1ze
https://twitter.com/aceeeeeeeer
https://twitter.com/HADESUnsekurity
https://twitter.com/slayer_owner
https://twitter.com/Whiskpentest
https://twitter.com/LulzSecRoot
https://twitter.com/unknown_br
https://twitter.com/Atena_Unknown
https://twitter.com/MandrivaL

Personally Identifiable Information on High Tech Brazil Hack Team Team Members:
  • synchr0n1ze
Real Name: Bruno Maglia

Facebook Account Profile: https://www.facebook.com/brunoaqnp ; https://www.facebook.com/brunao.maglia

Related Facebook Account Profiles: https://www.facebook.com/paulasouzzaa; https://www.facebook.com/francine.maglia - https://www.facebook.com/caio.favaratogalvao - https://www.facebook.com/keli.favarato - https://www.facebook.com/fabiano.galvao.18
  • aceeeeeeeer
Real Name: Gustavo Gemen
Personal Photos: http://imgur.com/zdRoh33 - http://imgur.com/mQfN8jk,49aNcs6,dCQYCgc,XPtKSAB ; http://imgur.com/eKWbZDn,lOiHr7A,HKu5Jw8; http://imgur.com/eKWbZDn,lOiHr7A,HKu5Jw8

Facebook Account Profile: https://facebook.com/gustavo.gemen

Related photos:
http://imgur.com/hZDJSNb,PXjcBsR
http://imgur.com/V6YuIBs,B6CgXKo
http://imgur.com/8wmqbGg,ZKUjM1Q,vKECfQf
http://imgur.com/GTliRuI,GLtvIZl,vfyAhuu

Related URLs:
https://www.youtube.com/channel/UCBgeuuT9sdFOOkFoGnt1p6w
https://koubacktr.wordpress.com/

I'll be soon posting an additional set of details on the High Tech Brazil Hack Team and I'll be definitely looking forward to sharing the necessary details with the Security Industry and Law Enforcement in an attempt to track down and prosecute the individuals behind these campaigns.

Stay tuned!

Monday, December 23, 2019

Happy Holidays!

Dear blog readers,

It's been a pleasure and an honor to serve your needs since December, 2005 when I've officially opened this blog while working as a Managing Director for Astalavista.com - The Underground and I sincerely hope that you'll continue to find my research informative and quality enough to further recommend my personal blog to friends and colleagues including to possibly approach me in terms of seeking additional information regarding a particular blog post or to actually "say hi" and "keep up the good fight" type of message.

My 2020 primary contact points include:

Personal Email - ddanchev@cryptogroup.net
Social Media Accounts - Twitter, LinkedIn, Facebook, Angellist, YouTube, Medium
IM and Skype ID: dancho_danchev_
Web properties that I'm currently running include - Offensive Warfare 2.0 and Unit-123.org
XMPP/OMEMO ID for Real-Time Conversation: 90184@armadillophone.com which is basically compatible with ChatSecure Conversations and Dino - feel free to install any of these applications in case you're not using them already and feel free to "say hi".

Happy holidays and thanks a lot for everyone who's been keeping in touch and keeping up the good fight!

Stay tuned!

Thursday, December 12, 2019

Announcing Law Enforcement and OSINT Intelligence Operation "Uncle George" - Join Me Today! - Part Two

Dear blog readers,

I wanted to let you know that I've been spending more time doing active Security Industry outreach in terms of the 2019 Cybercrime Forum Data Set and that I've already started working with several vendors in terms of possible OSINT enrichment and actual processing of the data.

Perfect timing to say thanks to Ilya Timchenko and McAfee for actually reaching out and managing to process the following artifacts from the actual Data Set which I've decided to publicly share with everyone who reaches out and expresses interest in working with me on the Data Set with the idea to possibly assist the Security Community and Law Enforcement in terms of tracking down the individuals behind these campaigns and actually shutting them down.

Possible Personally Identifiable Artifacts Found in the Actual Data Set Include:
Including the following massive update courtesy of me including all the publicly obtainable Email Addresses obtained from the 2019 Cybercrime Forum Data Set including all the publicly obtainable IP Addresses obtained from the 2019 Cybercrime Forum Data Set which appear to be mostly Socks4/Socks5 and publicly accessible compromised hosts used for "island-hopping" tactics.

I'll be posting an updated set of analysis and data regarding the currently ongoing Law Enforcement and OSINT Intelligence Operation "Uncle George" anytime soon.

Approach me at ddanchev@cryptogroup.net in case you're interested in working with me on this project or want to obtain access to the actual Data Set for possible OSINT enrichment and research purposes.

Stay tuned!

Announcing New Hacking Security and Hacktivism-Themed Online Forum Community! Join me Today!

 
Dear blog readers,

I've recently launched an extremely popular and comprehensive Hacking and Security possibly Hacktivism-Themed Online Forum Community called "Security is Futile" using the extremely popular PlushForums Platform consisting of over 193 Hacking and Security Topic Categories.

The initial idea behind launching the community is to spread data information and knowledge and to provoke discussion into various hot Hacking and Security topics including to solicit high-profile VIP Hacker and Security Experts to actually join the community and contribute with content.

Official "Security is Futile!" Hacking and Security Forum Community URL:
https://forums.offensive-warfare.com

Stay tuned!

Wednesday, December 04, 2019

g0t Bitcoin? - Part Two

Dear blog readers,

I wanted to let you know that I've recently changed to a permanent Dark Web Onion address - for my Cybertronics - Virtual Reality Social Network for Hackers and Security Experts where I'm currently soliciting Bitcoin donations for the purpose of launching the project in January, 2020.

Got Bitcoin? Consider visiting the Dark Web Onion and making a donation today and stay tuned for the upcoming updates and actual launch of the project in January, 2020 - http://lkzihepprlhxtvbutjedoazbsqd4avmifhpjms3zuq7itceiu4qajwad.onion/

Stay tuned!

Monday, December 02, 2019

Join me on Medium!

Dear blog readers,

I wanted to let everyone know that I've recently joined Medium and that I intend to post a variety of editorial type of articles on a daily basis including the fact that I was recently featured as a Top Writer in Privacy.

Missing the editorial? Consider going through my old ZDNet Zero Day Blog content archive including the following recently published editorial type of articles on Medium:

Stay tuned!

Dancho Danchev's Twitter Account - 2010 - Direct Download Link - Historical OSINT

Dear blog readers,

Takes you back doesn't it? I've decided to share with you a direct download link of my old Twitter account for you to download and go through and to say big thanks to everyone who's been keeping in touch with me throughout 2008-2013 including actual research work and related research inquiries.

Consider going through the archive and catching up with some of my research circa 2010-2014 and approach me - ddanchev@cryptogroup.net with your feedback or just to say hi in case you remember some of the research which I used to publish back then.

Stay tuned!

Official World Hacker Global Domination Group (WHGDG) Dark Web Onion Launch!

Dear blog readers,

I've been spending more time on the Dark Web these days including the active launching of a second Dark Web Onion and the official launch of the World Hacker Global Domination Group (WHGDG) which is basically a Call for Papers Call for Participation and Call for Innovation request on behalf of me for the purpose of reaching out to the U.S Intelligence Community as an independent contractor for the purpose of presenting and eventually getting funding for a variety of commercial cyber security and hacking including Threat Intelligence and Offensive Cyber Warfare Projects including the active recruitment of new members.

Check out the Official Dark Web Onion:
http://nexvibpe4xszfx4cp2jldkdyhnjnah5qnckoagoiry3vpyv5eheh55id.onion/ and don't forget to visit Cybertronics - Virtual Reality Social Network for Hackers and Cyber Security Experts Bitcoin-accepting Project - http://ca7brwpxmnbssdoh4dfoijyr7zwetob74x3berlvmeekhmkt7zcjdjqd.onion/ and donate today!

How you can participate?
  • Visit the Dark Web Onion and go through the Call for Participation Call for Papers and Call for Innovation and approach me at ddanchev@cryptogroup.net in case you believe that you can contribute with knowledge data and expertise including the technical "know-how" to participate in any of the Key Points mentioned in the Dark Web Onion
Stay tuned for a major Web Site update by the end of the week including the production of an extremely popular Security Podcast Security Vlog and an additional set of never-published before possibly classified and sensitive Technical Data and Cyber Security and Hacking resources.

Enjoy!

New Cybertronics - VR for Hackers and Security Experts Dark Web Onion Address

Dear blog readers,

I wanted to let everyone know that I've recently changed the official Dark Web Onion address for my Cybertronics - VR for Hackers and Security Experts Project including the actual Bitcoin donation address.

G0t Bitcoin? Consider going through the project proposal today - http://lkzihepprlhxtvbutjedoazbsqd4avmifhpjms3zuq7itceiu4qajwad.onion/ including to make a possible Bitcoin donation using the following Bitcoin Address: 3J8Jt7XCBGtCL6XRLTWhKfRQBmhhqGs4aP

I wanted to say a big thanks to everyone who approached me in terms of the project including to actually make a donation. The official schedule release is scheduled for January, 2020 and I'll make sure to keep everyone posted on current and future project updates.

Stay tuned!

Saturday, November 02, 2019

Exposing Russia's Most Wanted Cybercriminals - An OSINT Analysis

Dancho Danchev's Primary Contact Points - 2019

Dear blog readers, in this post I'll provide and feature my primary contact points for 2019 in order for you to approach me regarding possible research feedback research requests job career opportunities and possible event presentations.

Users interested in approaching me regarding a possible participation in classified or sensitive projects including possible job career opportunities and Threat Data access requests can approach me at - dancho.danchev@hush.com

Looking forward to hearing from you!

Enjoy!

New Commercial Security Research OSINT Cybercrime Research and Threat Intelligence Gathering Services Portfolio Available On Demand!

Dear blog readers,

I wanted to let everyone know of a currently active commercial portfolio of services that I'm publicly offering for the purpose of reaching out to colleagues and friends including companies vendors and organizations who might be interested in working with me for the purpose of obtaining access to never-published before Security Research analysis reports briefs podcasts and various other commercially obtainable virtual and cyber assets that you and your organization can take advantage of.

Approach me at - dancho.danchev@hush.com today to discuss!

Key Commercial Services that I'm currently offering include:
Including the following commercial services available on Patreon Community:
  • Real-Time Security Consultation
  • Security Newsletter
  • Cybercrime Blog Post
  • Security Podcast
  • Malware Analysis
  • Threat Intelligence Analysis
  • Security Workshop
  • OSINT Analysis
  • Geopolitical Analysis
  • Threat Actor Profiling
  • National Security Analysis
  • Cyber Jihad Analysis
  • Dark Web Intelligence and OSINT Analysis
  • Security Presentation
  • Cyber Security Business Development
  • Red Team Penetration Testing Assessment
  • Blue Team Penetration Testing Assessment
  • Target of Opportunity Targeting
  • Cybercrime Forum Monitoring
  • Underground Chatter Monitoring
  • Network Deception Consultation
  • Military Scenario Building
  • Cyber Warfare Scenario Building
  • OSINT Enrichment and Data Mining
  • Cyber Warfare Program Estimation
  • Weapons System Analysis
  • Cyber SIGINT and Cyber Assets Discovery
Stay tuned!

Wednesday, October 16, 2019

Announcing Law Enforcement and OSINT Intelligence Operation "Uncle George" - Join Me Today!

This summary is not available. Please click here to view the post.