Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, October 17, 2007

Thousands of IM Screen Names in the Wild

›
In the past, malware interested in establishing a one-to-one social engineering communication channel with potential victims, used to crawl ...
Tuesday, October 16, 2007

MPack and IcePack Localized to Chinese

›
It is logical to consider the possibility that once a malware author starts evaluating the benefits out of releasing a malware in an open s...

Fast Fluxing Yet Another Pharmacy Scam

›
Spam and phishing are indeed starting to operate behind the curtains of a fast-flux network of constantly changing IPs of malware infected ...

DIY German Malware Dropper

›
Yet another publicly available DIY malware dropper this time courtesy of German compared to Russian malware crews, whose releases on the oth...
Monday, October 15, 2007

The Global Security Challenge - 2007

›
The Global Security Challenge have just announced the world's five most promising security startups chosen to compete at the GSC Final...
Saturday, October 13, 2007

Managed Spamming Appliances - The Future of Spam

›
What's the future of spam? Spammers breaking CAPTCHAs of legitimate email providers and take advantage of their clean IP reputation to ...
Thursday, October 11, 2007

A Journey to the Heart of Internet Censorship

›
Reporters Without Borders just released their latest report on China's Internet Censorship practices , outlining how exactly bureaucrac...

Does This Blog Speak for Itself?

›
Before January 2007, I could only say that I'm glad to have you as a reader of this blog, but with the Talkr-ization of my blog during ...

Fast-Flux Spam and Scams Increasing

›
As I pointed out in my last series of posts assessing pharmaceutical scams and phishing campaigns, both, botnet masters , pharma masters , a...
Wednesday, October 10, 2007

Compromised Sites Serving Malware and Spam

›
Wish it was the average .cn domain I'm referring to, in this case it's the web sites of three U.S towns, namely the City of Chetek ,...

Incentives Model for Pharmaceutical Scams

›
Sometimes, it's unbelievable how easy is in fact to social engineer people on their way to "make a deal" online, especially wh...
Monday, October 08, 2007

Assessing a Rock Phish Campaign

›
The majority of Rock Phish campaigns usually take advantage of a single domain that's hosting numerous different phishing scams targe...
Friday, October 05, 2007

People's Information Warfare Concept

›
Malicious Culture of Participation DoS battle stations operational in the name of the " Please, input your cause ". Preventing a m...
Wednesday, October 03, 2007

DIY CAPTCHA Breaking Service

›
Given that spammers and phishers are already breaking, bypassing our outsourcing their CAPTCHA breaking needs, the introduction of a DIY ( ...

CISRT Serving Malware

›
The Chinese Internet Security Response Team is reporting that it has found embedded IFRAMEs serving malware within some of its pages. And d...
Tuesday, October 02, 2007

The Dynamics of the Malware Industry - Proprietary Malware Tools

›
The Underground Economy's Supply of Goods and Services The demand for private malware tools such as crypters, loaders and droppers is i...
Monday, October 01, 2007

Love is a Psychedelic Too

›
Compared to a previous example of an over-performing image spammer whose efforts to bypass spam filters make it virtually impossible for so...
Sunday, September 30, 2007

Don't Play Poker on an Infected Table

›
The scammy Euro VIP Casino is making another round this afternoon and trying to entice the spammed European users into downloading its soft...

Zero Day Vulnerabilities Market Model Gone Wrong

›
It's one thing to allow legitimate buyers, presumably the affected vendors themselves to bid for a zero day vulnerability discovered wi...
Saturday, September 29, 2007

DIY Chinese Passwords Stealer

›
This DIY passwords stealer courtesy of a chinese hacking group is pitched as Vista Compatible, with a server size in less than 20kb, process...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.