Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, August 20, 2007

RATs or Malware?

›
After the Shark 2 DIY Malware got the publicity it deserved as perhaps the most recent and publicly obtainable DIY malware , another DIY RA...
Friday, August 17, 2007

Analyses of Cyber Jihadist Forums and Blogs

›
Where are cyber jihadists linking to, outside their online communities? Which are the most popular file sharing and video hosting services u...
Thursday, August 16, 2007

534 Biographies of Jihadist Fighters

›
On the look for patterns of terrorist behaviour researchers often stereotype in order to portrait a terrorist. The Book of Martyrs (compiled...

PayPal's Security Key

›
PayPal's recently introduced Security Key two-factor authentication for the millions of its customers in cooperation with VeriSign'...

The Shark 2 DIY Malware

›
The Shark2 DIY malware (screenshots, its features, checksums of the builder, and the detection rates as of Saturday, 28th of July) finally ...
Monday, August 13, 2007

Pharming Attacks Through DNS Cache Poisoning

›
A month ago, a detailed assessment of a recently released vulnerability in BIND9 was conducted by Amit Klein to highlight the wide impact t...

DIY Phishing Kits

›
Rock Phish's efficiency-centered approach in terms of hosting numerous phishing pages on a single domain , often infected home user'...
Thursday, August 09, 2007

The Storm Worm Malware Back in the Game

›
After coming across the story on how Storm Worm is taking over the world for yet another time , I wondered - who are the novice malware auth...
Wednesday, August 08, 2007

A Cyber Jihadist DoS Tool

›
I've seen mail bombers courtesy of chinese hacktivists released during the China/U.S cyber skirmish , encryption tools released by cyb...

A Commercial Click Fraud Tool

›
India's secret army of "ad clickers" employed on a revenue sharing basis is an already well known threat to the future online...
Friday, August 03, 2007

Delicious Information Warfare, Friday, 3rd

›
It's time for this week's research papers, tools and services worth going through. Catch up with last week's content , stay info...

GIMF Now Permanently Shut Down

›
That was fast, and we could easily start talking about the average time it took to shut down cyber jihadist communities like these . On Tues...
Tuesday, July 31, 2007

Average Online Time for Phishing Sites

›
Some vendors specialize in clustering phishing attacks to better understand the phishing ecosystem and reveal all of its nodes. Others too,...

Feeding Packed Malware Binaries

›
Remember the avvcc.com domain which I mentioned in a previous example of a fast-flux network using the WebAttacker kit two months ago? It...

GIMF Switching Blogs

›
The Global Islamic Media Front like pretty much all other cyber jihadist supporters, and jihadist media agencies, seem to have fallen in lo...
Monday, July 30, 2007

World of Warcraft Domain Scam

›
World of Warcraft playing species, beware! Can you find the differences? Depending on the font type, font size and email client, an euphori...

The IcePack Malware Kit in Action

›
The IcePack is a rather average web based malware C&C kit compared to for instance, the Black Sun , the Cyber Bot , Mpack , and mostly ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.