including the following two ICQ numbers 855377 and 555724 and let's don't forget his personal email address accounts obtained using public sources which are polkas@bk.ru nordexin@ya.ru
and it doesn't get any better than this as we've got a pretty good and informative domain portfolio registered by the same individual based on public information sharing the same domain registration details such as for instance hxxp://worldissuer[.]biz which actually are:Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Saturday, May 20, 2023
Exposing The "Denis Gennadievich Kulkov" a.k.a Kreenjo/Nordex/Nordexin/Try2Check Cybercriminal Enterprise - An Analysis
Exposing Hacking Team GhostSec - An Analysis
In this post I'll profile Hacking Team GhostSec and I'll provide all the relevant and necessary IoCs (Indicators of Compromise) including all the relevant personally identifiable information in terms of assisting U.S Law Enforcement and the U.S Intelligence Community on its way to properly track down and monitor and prosecute the cybercriminals behind these campaigns.
Personal Photos:
Related IoCs and personally identifiable information for GhostSec:
Official Web Site URL: hxxp://opiceisis.strangled.net
Official Web Site URL: hxxp://81.4.124.11/index.php
Official Web Site URL: hxxp://pst.klgrth.io
Official Group's Twitter account: hxxp://twitter.com/ghost_s3curity
Official Group's Telegram account: hxxp://t.me/GhostSecc
Official Group's Medium account: hxxp://medium.com/@OfficialGhostSec
Official Group's Web Site URL: hxxp://ghostsec-team.org
Official Group's Web Site URL: hxxp://ghostsecret-team.blogspot.com
Official Group's Email Address Account: ghostsecteam.org@gmail.com
Stay tuned!
Monday, May 08, 2023
Sunday, May 07, 2023
Hacker Database
I would like to take the time and effort and let you know about my latest project which is called Hacker Database. Obtain access here.
Sample screenshots:
Sample visualizations produced using the database in GraphML format:
Wednesday, May 03, 2023
How Do Cybercriminals Manage Compromised Hosts Using Desktop Management Applications? - An Analysis
Sample screenshots include:
Tuesday, May 02, 2023
Who's Behind the Butterfly Bot/DCI Bot/DownTroj/Aspergillus Botnet Malicious Software?
Emails known to have been involved in the campaign include:
iserdo@gmail.com
toadmin@1337crew.info
wg.fatal@gmail.com
emailedgov.hacN@gmail.com
admin@1337crew.info
jernej_5@hotmail.com
usediserdo@gmail.com
toiserdo@gmail.com
schlist90210@gmail.com
Waisted.time@hotmail.com
addressnetNairo@hotmail.com
betweennetNairo@hotmail.com
hamlet1917@hotmail.com
addresshamlet1917@hotmail.com
withhamlet1917@hotmail.com
floxter@hotmail.com
ice@iceman.in
addressleniqi.mentor@siol.net
leniqi.mentor@siol.net
accountiserdo@gmail.com
addressicemangjN@hotmail.com
Sample screenshot:
Sample screenshot of Voc Cash:
Monday, May 01, 2023
Exposing the Ukrainian Insider Trading Hackers that Stole $30M Using a SEC's EDGAR Securities Fraud Scheme - The Technical Details - Exclusive
Official U.S Secret Service $1M reward listing on U.S Secret Service's Most Wanted Cybercriminals List for "Oleksandr Vitalyevich Ieremenko".
Handle: Zl0m; Lamarez; Ded.MCz; l@m@rEz
Email: lamarez@mail.ru; uaxakep@gmail.com - xeljanzusa.com - 62.109.25.228 (https://www.secureworks.com/research/point-of-sale-malware-threats); 62.109.1.69
Commpany: 2016 Кзерокс
Phone: +7 951 366 17 17
ICQ: 123424
Web Money: 258807111393
Related URLs:
hxxp://ageline.ru/lamarez.php
hxxp://k0x.ru/md5.salt.tx
hxxp://k0x.ru/_bot.exe - 82.146.60.59
hxxp://k0x.ru/black_energy_31337_/stat.php
http://k0x.ru/siicywu36dswh/addddos.php
hxxp://xtoolz.ru
hxxp://cup.su
hxxp://xwarez.us