Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, January 15, 2008

The Random JS Malware Exploitation Kit

›
The Random JS infection kit as originally named by Finjan , is perhaps the first publicly announced malicious innovation for 2008, in fact ...

RBN's Fake Account Suspended Notices

›
In the last quarter of 2007, under the public pressure put on the Russian Business Network's malicious practices, the RBN started faking...
Monday, January 14, 2008

PAINTing a Botnet IRC Channel

›
I suppose that even for a script kiddie it takes extra time and patience to come up with such a spoofed IRC channel getting crowded with inf...

The Pseudo "Real Players"

›
What happened with the recent RealPlayer massive embedded malware attack ? Two of the main hosts are now, and the third one ucmal.com/0.js ...
Thursday, January 10, 2008

Malware Serving Exploits Embedded Sites as Usual

›
The combination of the recent RealPlayer exploit and MDAC is a fad, but the very same is getting embraced in the short-term by malicious p...
Tuesday, January 08, 2008

The Invisible Blackhat SEO Campaign

›
Count this as a historical example of a blackhat SEO campaign, and despite that "Fresh Afield's" blog ( blogs.mdc.mo.gov ) is ...
Monday, January 07, 2008

MySpace Phishers Now Targeting Facebook

›
The "campaigners" behind the MySpace phishing attack which I briefly assessed in previous posts seem to have started targeting F...

Massive RealPlayer Exploit Embedded Attack

›
This malware embedded attack is massive and ugly, what's most disturbing about it is the number of sites affected, which speaks for coo...
Friday, December 28, 2007

The New Media Malware Gang - Part Two

›
This summary is not available. Please click here to view the post.

Riders on the Storm Worm

›
During the last couple of days the folks behind Storm Worm have started using several new, and highly descriptive domains. It seems they...
Monday, December 24, 2007

Spreading Malware Around the Christmas Tree

›
Stormy Wormy is back in the game on the top of Xmas eve, enticing the end users with a special Xmas strip show for those who dare to downloa...

Pinch Variant Embedded Within RussianNews.ru

›
This is a perfect and currently live example demonstrating how a once compromised site can also be used as a web dropper compared to the def...
Thursday, December 20, 2007

ClubHack 2007 - Papers and Presentations

›
Informative presentations and papers from ClubHack 2007- India's premier security event : " ClubHack is one of its kind hackers...

Russia's FSB vs Cybercrime

›
In what looks like a populist move from my perspective, the FSB , the successor of the KGB, have "Pinch-ED" the authors of the DIY...
Wednesday, December 19, 2007

Pushdo - Web Based Malware as Usual

›
Interesting assessment , especially the explanation of the GET variables, however, such descriptive use of POST variables to a malware's...
Monday, December 17, 2007

Cyber Jihadist Hacking Teams

›
These groups and fractions of religiously brainwashed IT enthusiasts utilizing outdated ping and HTTP GET flooding attack tools, represent t...
Sunday, December 16, 2007

Cached Malware Embedded Sites

›
Google, with its almost real-time crawling capabilities, has rarely proved useful while researching malware embedded sites who were cleaned ...
Saturday, December 15, 2007

Have Your Malware In a Timely Fashion

›
Keep your allies close, the human right violators closer. French officials have been receiving lots of criticism by human rights groups reg...
Wednesday, December 12, 2007

Combating Unrestricted Warfare

›
It's February, 1999, and two senior colonels from China's PLA, namely Qiao Liang and Wang Xiangsui depressed the world's militar...

Phishing Metamorphosis in 2007 - Trends and Developments

›
WindowSecurity.com have just published my second article entitled " Phishing Metamorphosis in 2007 - Trends and Developments " : ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.