Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, August 09, 2007

The Storm Worm Malware Back in the Game

›
After coming across the story on how Storm Worm is taking over the world for yet another time , I wondered - who are the novice malware auth...
Wednesday, August 08, 2007

A Cyber Jihadist DoS Tool

›
I've seen mail bombers courtesy of chinese hacktivists released during the China/U.S cyber skirmish , encryption tools released by cyb...

A Commercial Click Fraud Tool

›
India's secret army of "ad clickers" employed on a revenue sharing basis is an already well known threat to the future online...
Friday, August 03, 2007

Delicious Information Warfare, Friday, 3rd

›
It's time for this week's research papers, tools and services worth going through. Catch up with last week's content , stay info...

GIMF Now Permanently Shut Down

›
That was fast, and we could easily start talking about the average time it took to shut down cyber jihadist communities like these . On Tues...
Tuesday, July 31, 2007

Average Online Time for Phishing Sites

›
Some vendors specialize in clustering phishing attacks to better understand the phishing ecosystem and reveal all of its nodes. Others too,...

Feeding Packed Malware Binaries

›
Remember the avvcc.com domain which I mentioned in a previous example of a fast-flux network using the WebAttacker kit two months ago? It...

GIMF Switching Blogs

›
The Global Islamic Media Front like pretty much all other cyber jihadist supporters, and jihadist media agencies, seem to have fallen in lo...
Monday, July 30, 2007

World of Warcraft Domain Scam

›
World of Warcraft playing species, beware! Can you find the differences? Depending on the font type, font size and email client, an euphori...

The IcePack Malware Kit in Action

›
The IcePack is a rather average web based malware C&C kit compared to for instance, the Black Sun , the Cyber Bot , Mpack , and mostly ...
Saturday, July 28, 2007

Shark2 - RAT or Malware?

›
The latest release (26 July 2007) of the Shark2 RAT (Remote Administration Tool) once again demonstrates how thin is in fact the line betwee...

Delicious Information Warfare, Saturday, 28th

›
Here are some of the most interesting security papers, tools and services I stumbled upon during the week. Enjoy, and stay informed! Papers ...
Thursday, July 26, 2007

More Malware Crypters for Sale

›
There's an ongoing trend among malware authors to either code malware crypters and packers from scratch and sell then at a later stage,...

Cyber Jihadists' and TOR

›
You've always knew it, I've always speculated on it, now I can finally provide a decent screenshot of cyber jihadist's howto rec...

Confirm Your Gullibility

›
The Rock Phish kit in action. Registered yesterday, a .info domain is faking a Royal Bank of Scotland Customer Confirmation Form, and is a g...
Wednesday, July 25, 2007

Malware Embedded Sites Increasing

›
The emerging trend of malware embedded sites Malware embedded web sites are steadily gaining a priority in an attacker's arsenal of infe...
Thursday, July 19, 2007

SQL Injection Through Search Engines Reconnaissance

›
In previous posts " Google Hacking for Vulnerabilities " ; " Google Hacking for Cryptographic Secrets " and " Natio...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.