Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, January 28, 2008

The Dutch Embassy in Moscow Serving Malware

›
The Register reports that the Royal Netherlands Embassy in Moscow was serving malware to its visitors at the beginning of last week : ...
Monday, January 21, 2008

Mujahideen Secrets 2 Encryption Tool Released

›
Originally introduced by the Global Islamic Media Front (GIMF), the second version of the Mujahideen Secrets encryption tool was releas...

E-crime and Socioeconomic Factors

›
Interesting points by F-Secure with two main issues covered, namely the lack of employment opportunities for skilled IT people who turn to ...
Thursday, January 17, 2008

DIY Fake MSN Client Stealing Passwords

›
This tool deserves our attention mostly because of its do-it-yourself (DIY) nature , just like the many other related ones I discussed ...
Wednesday, January 16, 2008

Storm Worm's St. Valentine Campaign

›
The Riders on the Storm Worm started riding on yet another short term window of opportunity as always - St. Valentine's day with a mass...
Tuesday, January 15, 2008

The Random JS Malware Exploitation Kit

›
The Random JS infection kit as originally named by Finjan , is perhaps the first publicly announced malicious innovation for 2008, in fact ...

RBN's Fake Account Suspended Notices

›
In the last quarter of 2007, under the public pressure put on the Russian Business Network's malicious practices, the RBN started faking...
Monday, January 14, 2008

PAINTing a Botnet IRC Channel

›
I suppose that even for a script kiddie it takes extra time and patience to come up with such a spoofed IRC channel getting crowded with inf...

The Pseudo "Real Players"

›
What happened with the recent RealPlayer massive embedded malware attack ? Two of the main hosts are now, and the third one ucmal.com/0.js ...
Thursday, January 10, 2008

Malware Serving Exploits Embedded Sites as Usual

›
The combination of the recent RealPlayer exploit and MDAC is a fad, but the very same is getting embraced in the short-term by malicious p...
Tuesday, January 08, 2008

The Invisible Blackhat SEO Campaign

›
Count this as a historical example of a blackhat SEO campaign, and despite that "Fresh Afield's" blog ( blogs.mdc.mo.gov ) is ...
Monday, January 07, 2008

MySpace Phishers Now Targeting Facebook

›
The "campaigners" behind the MySpace phishing attack which I briefly assessed in previous posts seem to have started targeting F...

Massive RealPlayer Exploit Embedded Attack

›
This malware embedded attack is massive and ugly, what's most disturbing about it is the number of sites affected, which speaks for coo...
Friday, December 28, 2007

The New Media Malware Gang - Part Two

›
This summary is not available. Please click here to view the post.

Riders on the Storm Worm

›
During the last couple of days the folks behind Storm Worm have started using several new, and highly descriptive domains. It seems they...
Monday, December 24, 2007

Spreading Malware Around the Christmas Tree

›
Stormy Wormy is back in the game on the top of Xmas eve, enticing the end users with a special Xmas strip show for those who dare to downloa...

Pinch Variant Embedded Within RussianNews.ru

›
This is a perfect and currently live example demonstrating how a once compromised site can also be used as a web dropper compared to the def...
Thursday, December 20, 2007

ClubHack 2007 - Papers and Presentations

›
Informative presentations and papers from ClubHack 2007- India's premier security event : " ClubHack is one of its kind hackers...

Russia's FSB vs Cybercrime

›
In what looks like a populist move from my perspective, the FSB , the successor of the KGB, have "Pinch-ED" the authors of the DIY...
Wednesday, December 19, 2007

Pushdo - Web Based Malware as Usual

›
Interesting assessment , especially the explanation of the GET variables, however, such descriptive use of POST variables to a malware's...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.