UPDATE: I can be reached at dancho.danchev@hush.com or at +359 87 68 93 890 in case of an emergency.
UPDATE: It appears that recently a car belonging to local police department (hxxp://troyan-police.com; police_troyan@abv.bg) was stopped somewhere around my place with the lights turned on with the idea to provoke a possible local police visit.
UPDATE: It appears that my place was visited for a second time by local police officers (hxxp://troyan-police.com; police_troyan@abv.bg) with third-party doctors (http://mbal-troyan.com; mbal_troyan@abv.bg) for the purpose of apparently injecting me and a document for the injection was signed by someone that I know.
UPDATE: It appears that someone managed to twist my arm and therefore pressed a pressure on my eye without my knowledge with random people attempting to communicate with me behind a wall.
UPDATE: It appears that prior to my presentation at InfoSec 2012 someone managed to place a plaque on the wall in Earl's Court and therefore I experienced a pressure on my head while making a presentation.
UPDATE: It appears that prior to my presentation visit in Lyon in 2010 someone managed to wound my mouth with something that can be described as wall interference.
UPDATE: It appears that someone managed to open my eye and therefore I'm currently experiencing a pressure behind a wall with random people attempting to communicate with me.
UPDATE: It appears that I'm currently persistently experiencing a pressure on my mouth including something in the lines of a toxic chemical on my nose.
UPDATE: It appears that someone managed to map my place including my head and body using rubber and is persistently trying to communicate with me.
UPDATE: In case you're interested in contacting me in terms of my law enforcement issues and potential kidnapping and harassment attempts including possible interview requests - feel free to approach me at dancho.danchev@hush.com as I'm currently busy looking for a full time cybercrime researcher security blogger and threat intelligence analyst type of position.
I would be also definitely looking forward to sharing some of my sensitive projects including related work in various other sensitive areas with the idea to end the ongoing IP (Intellectual Property) robbery courtesy of a variety of industry-leading companies and individuals. Has the time come to work hard and set them straight? It appears so. Feel free to approach me at dancho.danchev@hush.com
You can use the following PGP key to approach me regarding possible career opportunities regarding possible involvement in related sensitive projects at dancho.danchev@hush.com or just to say hi request Threat Data access including a sample or a possible trial or make a comment regarding my current and historical OSINT research including possible references to my 2010 disappearance including various cybercrime underground chatter referencing me and my research including disappearance and possible kidnapping including possible GCHQ Lovely Horse references and related resources and comments.
Sample Information Security and Information Warfare cartoon circa 2008:
Second Sample Information Security and Information Warfare cartoon circa 2008:
UPDATE: It appears that someone managed to somehow place a basketball ball on my head chin and eye and therefore I'm currently experiencing a pressure on my eye and my face with people attempting to communicate with me.
UPDATE: It appears that someone is attempting to communicate with me using pressure pressed on my stomach.
UPDATE: It appears that someone is pressing a doll on a wall and is attempting to communicate with me including an increased pressure in my place.
UPDATE: It appears that different people are attempting to communicate with me behind a wall using a basketball ball interfering with the pressure in my place.
UPDATE: It appears that the robot has been persistently sprayed with homo-sexual spray including a possible female spray leading to a persistent harassment and torture currently affecting my life-being work-relationships and intellectual property.
UPDATE: It appears that someone managed to placed a box on the top of the robot for a period of several years successfully blinding me and restraining me from remote work activity.
In a related news story regarding my experience and expertise in the field it appears that the GCHQ has been actively monitoring me on Twitter including active traffic monitoring in a 2012 Intelligence Community program labeled - Lovely Horse that's basically a Palantir implementation of OSINT practices regarding a certain Twitter account. The purpose? Active traffic and content monitoring for the purpose of robbing me out of sensitive research and related research data which leads me to believe that I've been successfully contributing to a massive treasure trove IP (Intellectual Property) theft and robbery courtesy of the GCHQ and the NSA for a significant period of time.
- Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise
- LOVELY HORSE: GCHQ Program Monitored Hacker/InfoSec Community on Social Media
- GCHQ's 'Lovely Horse' tool helped spooks monitor hackers online
- GCHQ created 'Lovely Horse' to keep track of top hackers' and security specialists' blogs and tweets
- Spy Agencies Rely on Hackers for Stolen Data and Monitoring Security Experts for Expertise
- GCHQ Create Their Own Tweetdeck To Track People of Interest
- GCHQ siphoned off info stolen by hackers for its own ends
- Some hackers are unknowingly gathering intel for the NSA
It's also becoming increasingly evident that I'm also a participant in several other Intelligence Community Programs that appear to have successfully attempted to rob and steal my "know-how" leading me to pursue a possible closed-community data and research sharing or to request invite-only access to related research and data. Remember HBGary? It appears that every then and now a security company tries to re-position the industry by offering targeted and proprietary Threat Intelligence to a variety of sources successfully undermining a variety of community-offered and presented actionable Threat Intelligence.
While it's an honor to receive a competing proposition it should be noted that the majority of my research is public excluding several community-driven sensitive projects that I spend my time working on. It appears that the time has come for me to take my research to a whole new level which led me to pursue my own career patch within the Intelligence Community by successfully launching Disruptive Individuals including the Obmonix - Cybercrime and Cyber Jihad Fighting Platform including the eventual launch of the invite-only Threat Data - The World's Most Comprehensive Threat Database including a possible career opportunity with the industry-leading Webroot including a short-term venture with GroupSense including a possible SCMagazine 2011 nomination for my Twitter activity including the upcoming launch of Astalavista Security Group 2.0 - my primary working location throughout the 90's with a currently active crowdfunding campaign.
While I continue to be a firm believer that sharing and communicating actionable Threat Intelligence to a variety of source is the appropriate way to proceed and process a variety of cybercrime-related campaigns and malicious activity I believe that the time has come for me to take my research to a whole new level prompting me to seek a new career opportunity as the World's leading cybercrime researcher security blogger and threat intelligence analyst.
The majority of sources referenced in the original research basically represent the majority of my RSS feeds circa 2006 and it's becoming increasingly interesting perhaps even funny to figure out that the majority of my OSINT techniques including active WHOIS monitoring and research are widely accepted and discussed within the Intelligence Community.
What prompted the GCHQ to issue an active traffic and Twitter account monitoring campaign? Keep reading - back in the day throughout the period of 2008-2013 I used to actively monitor and profile various high-profile nation-state malicious and fraudulent campaigns including the infamous Koobface botnet -- listed to the original MP3 interview -- which I extensively profiled and managed to practically take down including the active exposing of its core botnet master including the active exposure of client-side exploits being served through the Koobface botnet through what appears to be a partnership between the Koobface botnet master and a well known cybercriminal - Exmanoize a well known author of a well known Web malware exploitation kit including the receiving of malware-infected host embedded messages in response to my "10 things you didn't know about the Koobface gang" including what appears to be a direct redirection of Facebook to my personal blog including yet another message left by the Koobface gang, including a variety of typosquatted C&C server domains registered to my name including extensive Russian Business Network coverage at the time.
Sample Koobface Botnet Infographic courtesy of CyberCamp 2016:
It's also worth mentioning that at the time the U.S Treasury Department was also redirecting to my Blogger profile including the active HOST file modification courtesy of a well known money-mule recruitment campaign.
Consider going through the following set of resources and news articles throughout 2008-2013 which can best describe the Threat Intelligence Scene the way I know it and the way I'm positive it should be.
Research and News Articles covering my research and referencing me throughout - 2008:
- Russian hacker 'militia' mobilizes to attack Georgia
- Fraudsters Target Facebook With Phishing Scam
- Fake Microsoft e-mail contains Trojan virus
- Hackers expand massive IFRAME attack to prime sites
- Hackers infiltrate Google searches
- Hackers expand massive IFrame attack to prime sites
- Hackers knocked Comcast.net offline
- Adobe investigates Flash Player attacks
- High-tech bank robbers phone it in
- Attackers booby-trap searches at top Web sites
- Carpet bombing networks in cyberspace
- Storm worm e-mail says U.S. attacked Iran
- India's underground CAPTCHA-breaking economy
- Domain Name Record Altered to Hack Comcast.net
- Google searchers could end up with a new type of bug
- Ongoing IFrame attack proving difficult to kill
- Hackers expand massive IFRAME attack to prime sites
- Danchev: The small pack Web malware exploitation kit
- Danchev: Massive SQL injection the Chinese way
- CAPTCHAs are dead - new research from Dancho Danchev confirms it
- Hackers infiltrate Google searches
- Massive faux-CNN spam blitz uses legit sites to deliver fake Flash
- Faked CNN spam blitz pushes fake Flash
- Danchev: Anti-fraud site DDOS attack
- Sony PlayStation site victim of SQL-injection attack
- Fake CNN Alert Still Spreading Malware
- Look Ma, I'm on CIA.gov
- Green Dam exploit in the wild
- “In gaz we trust”: a fake Russian energy company facilitating cybercrime
- Don’t pay your ransom via SMS
- NYT scareware scam linked to click fraud botnet
- Danchev: A crimeware developer's to-do list
- Danchev rained on my scareware campaign
- Is “aggregate-and-forget” the future of cyber-extortion?
- NYT scareware scam linked to click fraud botnet
- Microsoft declares war on 'scareware'
- Don’t pay your ransom via SMS
- Twitter warms up malware filter
- What's really the safest Web Browser?
- With Unrest in Iran, Cyber-attacks Begin
- Zeus bot found using Amazon's EC2 as C&C server
- Firefox add-on encrypts sessions with Facebook, Twitter
- Watch out for malware with those pretty Mac screensavers
- Months-old Skype vulnerability exploited in the wild
- Danchev: Money mule recruiters
- Cybercrime's bulletproof hosting exposed
- Malware Threatens to Sue BitTorrent Downloaders
- Firefox add-on encrypts sessions with Facebook, Twitter
- Chuck Norris Botnet Karate-chops Routers Hard
Research and News Articles covering my research and referencing me throughout - 2011:
- Kaspersky disputes McAfee's Shady Rat report
- Has EV-SSL Growth Been Slow?
- Report: Vishing Attack Targets Skype Users
Research and News Articles covering my research and referencing me throughout - 2012:
- Fake UPS notices deliver malware
- ZeuS/Zbot Trojan Spread Through Rogue US Airways Email
- New Skype malware threat reported: Poison Ivy
- Five Koobface botnet suspects named by New York Times
- Virtual jihad: How real is the threat?
- Is the death knell sounding for traditional antivirus?
- Can the Nuclear exploit kit dethrone Blackhole?
- Experts split over regulation for bounty-hunting bug sniffers
- Spammers Using Fake YouTube Notifications to Peddle Drugs
- Adele Bests Adderall As Affiliate Spammers Offer Music Downloads
- Bulgarian sleuth unveils botnet operators
- Fake PayPal Emails Distributing Malware
- Web Gang Operating in the Open
- ZeuS/Zbot Trojan Spread Through Rogue US Airways Email
- Buy 500 hacked Twitter accounts for less than a pint
- NBC.com Hacked, Infected With Citadel Trojan
Research and News Articles covering my research and referencing me throughout - 2013:
- How Much Does A Botnet Cost?
- Automated YouTube account generator offered to cyber crooks
- Upgraded Modular Malware Platform Released in Black Market
- Deconstructing the Al-Qassam Cyber Fighters Assault on US Banks
- NBC hack infects visitors in 'drive by' cyberattack
- Bitcoins are being traded for hack tools
- New DIY Google Dorks Based Hacking Tool Released
- Hacking The TDoS Attack
- Mass website hacking tool alerts to dangers of Google dorks
- Cybercrime service automates creation of fake scanned IDs
- Spammers unleash DIY phone number slurping web tool
- Spam email contains malware, not Apple gift card
- APT1, that scary cyber-Cold War gang: Not even China's best
- Mass website hacking tool alerts to dangers of Google dorks
- C&C PHP script for staging DDoS attacks sold on underground forums
- Russian Malware-as-a-Service Offers Up Server Rentals for $240 a Pop
- Java exploit kit sells for $40 per day
- Buggy DIY botnet tool leaks in black market
- New DIY Google Dorks Based Hacking Tool Released
- Botnets for rent, criminal services sold in the underground market
- Spam email contains malware, not Apple gift card
UPDATE: It appears that someone placed a remote robot at local police department capable of recording my life including my life-being leading to a ruined career work relationships and intellectual property.
UPDATE: It appears that an unknown group of people is attempting to communicate with me using a transmitter on my mouth using plastic paper in their mouth.
UPDATE: It appears that someone is permanently trying to hide my eyes using plastic paper apparently using a transmitter that's been apparently placed on my mouth. It also appears that the person behind the transperant is attempting to move closely thereby ruining my equipment and life-being.
UPDATE: It appears that the transperant is operated by someone relying on lenses including bottles to map and touch-point related activities of an individual in place following persistent harassment and life-being manipulation.
In a related news article - "ZDNet Security Blogger Goes Missing in Bulgaria" covering my disappearance I came across to a juicy comment referencing the work of a well-known artist which leads me to research a little bit further leading me to the following CD/Vinyl label - "Blue Sabbath Black Cheer / Griefer – We Hate You / Dancho Danchev Suck My Dick" courtesy of the the following individual.
"It's 2010 and I'm stumbling upon a defaced image of my head shot (circa 2006). I never actually bothered about what others say, even when they insist that I'm maliciously enjoying the fact that I profile, expose, and disrupt cybercrime campaigns when there's no time for enjoyment, as the stakes are too high.
The defaced headshot is part of the released back in 2010 album "We Hate You/Dancho Danchev S*ck my D*ck" by the Blue Sabbath Griefer group.
So who's behind this "black PR" campaign? Who's the mysterious Photoshop-er? It's a Canadian music artist called Ron Brogden, who spends his spare time coding for hire, when he's not photoshoping my headshots.
Hatred-friendly domain name reconnaissance:
deterrent.net - 95.142.172.70 - Email: slave@codegrunt.com
Domain owner: Ron Brogden, Secondary emai: moron@industrial.org
Music Label Address: P.O. Box 8021; Victoria, BC, Canada; V8W 3R7
Home address: 647 Speed Avenue, Victoria, British Columbia, V8Z 1A5
Phone: +1.250-360-0372; +1.250-381-0088
Responding to the same IP are also the following domains operated by Ron:
codegrunt.com
deterrent.net
industrial.org
nuckflix.com"
In terms of my 2010 disappearance I also recently came across to the following screenshots courtesy of the cybercrime-friendly forum Darkode courtesy of an individual known as Xylitol discussing my disappearance including a possible Hitman Request charging at $10,000. Unfortunately, the screenshots were taken using the name of Nassef with whom Xylitol shared his accounting details with me including the taking of the screenshots.
UPDATE: It appears that my 2010's disappearance is slowly turning into a modest kidnapping attempt on behalf of Bulgarian law enforcement in constitution with DANS (State Agency for National Security) who appear to have been operating a long-turn operation to ruin my reputation intellectual property and work relationships successfully holding me a hostage for a period of seven years following a long-run kidnapping and harassment attempts leading to a ruined career intellectual property violation and work relationships.
Operating a remotely-operated gas pomp with azbest targeted at my place Bulgarian law enforcement in constitution with DANS (State Agency for National Security) appear to have successfully tracked down and manipulated my life-being following a successful set of long-run kidnapping and harassment attempts leading to a successfully ruined career intellectual property violation and work relationships.
It appears that Bulgarian law enforcement in constitution with DANS (State Agency for National Security) have placed remote stickers on my place and have managed to successfully map my place leading to a successful illegal entry courtesy of an unknown person followed by another unknown person supposedly a colleague followed by an illegal entry courtesy of unknown police officers who took my ID an escorted me to a local institution without explaining the reason for holding me hostage there.
It appears that the group is operating a transperant using feelings to map and touch point related activities of the individuals in place following a successful kidnapping and harassment attempt leading to illegal entry and possible kidnapping attempt. It appears that Bulgarian law enforcement in constitution with DANS (State Agency for National Security) have managed to place a plastic sticker in my mouth leading to a successful monitoring and tracking including the use of a transperant leading to a successful kidnapping and harassment attempt leading to a ruined career intellectual property violation and work relationships.
UPDATE: Great News: Missing Cybersecurity Expert Dancho Danchev Is No Longer Missing, We need help with the strange disappearance of Dancho Danchev, Security Researcher, Cybercrime Foe Goes Missing, Dancho Danchev: Missing cybersecurity expert, Cybercrime Blogger Vanishes After Finding Tracking Device In His Bathroom, Zero Day blogger Dancho Danchev: he's back, The Strange Disappearance of Dancho Danchev, We need help with the strange disappearance of Dancho Danchev, Mystery Surrounds Cyber Security Blogger Dancho Danchev’s Whereabouts, Update on Dancho Danchev, ZDNet Security Blogger Mysteriously Disappears, ZDNet Blogger Disappears Mysteriously In Bulgaria, ZDNet Blogger Disappears Under Mysterious Circumstances
UPDATE: Prior, to, my, stay, in, another, town, I, was, contacted, by, Riva Richmond, (riva@rivarichmond.com), and, set, up, a, meeting, to, discuss, a, potential, New York Times, article.
UPDATE: Prior, to, my, stay, at, this, particular, apartment, I, contacted, Nart Villeneuve, (n.villeneuve@secdev.ca), seeking, assistance, signaling, potential, trouble.
UPDATE: Prior, to, my, stay, at, a, local, institution (dpblovech@abv.bg), for, a, period, of, three, months, the, same, person, Kamen Kovachev (Kamen Tzura) (tsyrov@abv.bg), was, released, by, another, person, known, as, Nesho Sheygunov (https://www.facebook.com/nesho.sheygunov).
UPDATE: While, my, stay, at, a, local, institution (dpblovech@abv.bg), for, a, period, of, three, months, another, person, that, I, know, Kamen Kovachev (Kamen Tzura) (tsyrov@abv.bg), was, taken, to, the, room, where, I, was, confined, and, I, spent, a, night, in, the, corridor.
UPDATE: While, I, was, taken, to, a, local, institution (dpblovech@abv.bg), for, a, period, of, three, months, I, had, my, phone, taken, and, I, was, confined.
UPDATE: While, I, was, taken, out, of, my, place, to, an, unknown, car, the, fuel, was, charged, to, someone, that, I, know.
UPDATE: Prior, to, my, stay, at, a, local, institution (dpblovech@abv.bg), I, was, offered, to, take, vitamins.
UPDATE: My, place, was, recently, visited, by, unknown, men, taking, me, to, local, police, department (hxxp://troyan-police.com; police_troyan@abv.bg), and, asking, me, to, write, that, my, equipment, was, interfering, with, that, of, local, police, department.
UPDATE: It, appears, that, someone, has, taken, the, time, and, effort, to, take, a, t-shirt, of, mine.
UPDATE: Prior, to, my, visit, at, a, local, hotel, (hxxp://central-hotel.com/en; central@central-hotel.com), some, of, my, clothes, were, missing.
UPDATE: It, appears, that, my, place, was, recently, supposedly, visited, by, Plamen, Dakov (hxxp://universalstroi.com), Hristo, Radionov (hxxp://universalstroi.com; hxxp://www.facebook.com/hristo.radionov), and, Ivailo, Dochkov (hxxp://www.facebook.com/ivodivo), who, left, money, for, me.
UPDATE: Prior, to, my, attendance, in, a, local, institution (dpblovech@abv.bg), Ivailo, Dochkov (hxxp://www.facebook.com/ivodivo), tried, to, meet, me.
UPDATE: Prior, to, my, attendance, at, this, particular, apartment, I, was, invited, by, Briana Papa (Briana@crenshawcomm.com), to, visit, Prague, on, behalf, of, Avast! Software, where, I, met, with, Vince Steckler (steckler@avast.com), and, Miloslav, Korenko (korenko@avast.com), where, I, met, with, Lucian Constantin (hxxp://twitter.com/lconstantin).
Prior, to, my, attendance, at, this, apartment, I, was, also, invited, to, another, event, held, at, INTERPOL, by, Steve Santorelli
(steve.santorelli@gmail.com), which, I, successfully, attended, and, presented, at, where, I, also, met, with, Krassimir Tzvetanov (krassi@krassi.biz).
Something, else, worth, pointing, out, is, that, my, place, is, visited, by, an, unknown, woman, known, as, Boriana Mihovska, an, unknown, man, known, as, Leonid, an, unknown, person, known, as, Tzvetan Georgiev (hxxp://www.youtube.com/user/laron640; tzvetan.leonid@gmail.com); (hxxp://plus.google.com/107108766077365473231), and, an, unknown, person, known, as, Dobrin Danchev (hxxp://www.facebook.com/dobrin.danchev); (hxxp://www.sibir.bg/parachut), and, another, unknown, person, known, as, Ina, Dancheva (http://otkrovenia.com/bg/profile/innadancheva).
The, most, recent, visit, to, my, place, was, by, a, person, known, as, Vasil, Stanev, from DANS (dans@dans.bg), who, was, supposedly, asking, me, to, take, a, job, and, consequently, asked, me, to, attend, a, doctor, session.
Dear, blog, readers, I, feel, it's, about, time, I, post, an, honest, response, regarding, my, disappearance, in, 2010, with, the, purpose, of, information, my, readers, on, my, current, situation, and, to, continue, posting, and, contributing, valuable, threat, intelligence, to, the, security, community.
In, 2010, I, moved, to, an, apartment, located, in, another, town, and, apparently, my, apartment, have, been, vandalized, including, persistent, harassment, by, my, neighbors, including, a, possible, illegal, entry, courtesy, of, the, person, responsible, for, hiring, the, apartment (Kalin Petrov; kalin_petrov@hotmail.com).
After, a, persistent, chase, down, and, harassment, courtesy, of, the, person, responsible, for, hiring, the, apartment, I, received, a, notice, to, leave, and, had, my, apartment, visited, by, the, person, responsible, for, hiring, including, another, man, including, another, man, that, was, supposedly, supposed, to, take, care, of, my, belongings.
Prior, to, my, accommodation, I, was, contacted, by, Pauline, Roberts (pauline.roberts@ic.fbi.gov), who, recommended, me, to, Yavor, Kolev (javor.kolev@gmail.com), and, Albena, Spasova (albaadvisors@gmail.com), from, Bulgarian, local, authorities, followed, by, a, series, of, communication.
Prior, to, returning, to, my, place, in, 2011, my, house, was, vandalized, by, three, police, officers (hxxp://troyan-police.com; police_troyan@abv.bg), from, the, local, police, department, who, entered, my, house, in, particular, my, bedroom, and, unpolitely, asked, my, to, dress, while, showing, me, a, copy, of, my, personal, ID, that, I, haven't, presented, and, taking, me, to, an, unknown, car, without, explaining, the, reason, for, taking, me.
Sample Email communication between me, Pauline Roberts, Javor Kolev and Albena Spasova circa 2010:
Original message sent by Pauline Roberts - 2010
Original message received by Albena Spasova - 2010
Original response issued to Pauline Roberts, Javor Kolev, and Albena Spasova - 2010
Original response issued to Javor Kolev - 2010
Original response issued by Javor Kolev - 2010 - Part Three
Original response issued to Javor Kolev - 2010
Original response issued by Javor Kolev - 2010 - Part Four
Original response issued by Javor Kolev - 2010 - Part Five
Original response issued to Javor Kolev - 2010
Original response issued by Javor Kolev - 2010 - Part Six
A, few, hours, later, I, find, myself, located, in, an, institution (dpblovech@abv.bg), for, a, period, of, three, months, without, anyone, explaining, the, reason, for, holding, me, there.
Upon, entering, I, had, my, phone, taken, without, having, received, any, sort, of, explanation, for, taking, me, and, holding, me, there.
UPDATE: My most recent visit to local police department was to announce a possible food-poisoning and I was told not to live in my place.
Given, this, circumstances, I, feel, that, it, has, become, highly, unproductive, to, continue, my, work, and, therefore, I'm, currently, seeking, a, permanent, relocation, including, a, possible, full, time, career, opportunity, in, the, field, of, cybercrime, research, security, blogger, or, threat, intelligence, analyst.
In case you're aware of someone looking to hire full-time threat intelligence analyst cybercrime researcher or a security blogger feel free to approach me at dancho.danchev@hush.com