Wednesday, April 07, 2021

Dancho Danchev's Blog - Proprietary MISP (Malware Information Sharing Platform) Instance Running - Request Access Today!

Dear blog readers,

This is Dancho. I wanted to let everyone know that I've recently started running a proprietary MISP (Malware Information Sharing Platform) instance where I distribute and share most of my proprietary research with a variety of third-parties including connected instances or users who have API access to my research which is now also available in STIX/TAXII including MISP format where you or your organization can request API access to my proprietary threat intelligence feed for research or commercial purposes by approaching me at dancho.danchev@hush.com

Sample categories which I cover in my daily batch of proprietary threat intelligence research include:

  • Targeted Malware Analysis - An Analysis
  • In-the-Wild Malware Analysis - An Analysis
  • Targeted Phishing Analysis - An Analysis
  • Malicious URL Analysis - An Analysis
  • Targeted Mobile Malware Analysis - An Analysis
  • APT Coverage - New Campaign
  • Fraudulent Infrastructure - An Analysis
  • Online Fraud Campaign - An Analysis
  • Historical OSINT Campaign - An Analysis
  • Russian Business Network coverage
  • Koobface Botnet coverage
  • Kneber Botnet coverage
  • Hundreds of IOCs (Indicators of Compromise)
  • Tactics Techniques and Procedures In-Depth Coverage
  • Malicious and fraudulent infrastructure mapped and exposed
  • Malicious and fraudulent Blackhat SEO coverage
  • Malicious spam and phishing campaigns
  • Malicious and fraudulent scareware campaigns
  • Malicious and fraudulent money mule recruitment scams
  • Malicious and fraudulent reshipping mule recruitment scams
  • Web based mass attack compromise fraudulent and malicious campaigns
  • Malicious and fraudulent client-side exploits serving campaigns

Sample screenshots of the research posted at my proprietary MISP (Malware Information Sharing Platform) instance:



Stay tuned!

No comments:

Post a Comment