Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Friday, April 18, 2008

Phishing Emails Generating Botnet Scaling

›
A bigger and much more detailed picture is starting to emerge, with yet another spammed malware campaign courtesy of the botnet that is so f...
Wednesday, April 16, 2008

Fake Yahoo Greetings Malware Campaign Circulating

›
The persistence of certain botnet masters cannot remain unnoticed even if you're used to going through over a dozen active malware campa...

Web Email Exploitation Kit in the Wild

›
XSS exploitation within the most popular Russian, and definitely international in the long-term, web email service providers is also embraci...
Tuesday, April 15, 2008

Malware and Exploits Serving Girls

›
Descriptive domains such as beautiful-and-lonely-girl dot com, amateur homepage looking sites, a modest photo archive of different girls, ap...
Monday, April 14, 2008

Localized Fake Security Software

›
Would you believe that in times when top tier antivirus vendors are feeling the heat from the malware authors' DoS attacks on their hone...

ICQ Messenger Controlled Malware

›
IM me a command, master - part two . Diversifying the command and control channels of malware is always in a permanent development phrase, w...
Tuesday, April 08, 2008

Romanian Script Kiddies and the Screensavers Botnet

›
Shall we turn into zombies, and peek into the modest botnet courtesy of Romanian script kiddies, that are currently spamming postcard.scr gr...
Monday, April 07, 2008

Skype Spamming Tool in the Wild

›
Have you ever wondered what's contributing to the rise of instant messanging spam ( SPIM ), and through the use of which tools is the p...
Thursday, April 03, 2008

The Cyber Storm II Cyber Exercise

›
I first blogged about the "Cyber Storm" Cyber Exercise aiming to evaluate the preparedness for cyber attacks of several governmen...
Wednesday, April 02, 2008

Quality and Assurance in Malware Attacks

›
The rise of multiple antivirus scanners and sandboxes as a web service, did not only increase the productivity level of researchers and util...
Tuesday, April 01, 2008

HACKED BY THE RBN!

›
The RBN 0wnZ 7th1$ Bl0g! April 1st, 2008, St.Petersburg, Russia. The Russian Business Network, an internationally renowned cyber crime power...

Cybersquatting Symantec's Norton AntiVirus

›
For the purpose of what? Upcoming fraudulent activities, again courtesy of Interactivebrand's undercover domains portfolio having regis...

UNICEF Too IFRAME Injected and SEO Poisoned

›
The very latest, and hopefully very last, high profile site to successfully participate in the recently exposed massive SEO poisoning , is U...

A Commercial Web Site Defacement Tool

›
On the look for creative approaches to cash out of selling commodity tools and services, malicious parties within the underground economy co...
Monday, March 31, 2008

Phishing Pages for Every Bank are a Commodity

›
A new phishing scam is currently in the wild, emails pretending to be from Bank of ****** were detected by *****, anti spam vendors are indi...

The Epileptics Forum Attack

›
Now that's a weird example of a successful targeted attack abusing epileptics' photo sensitivity . Hackers post seizure causing flas...
Friday, March 28, 2008

Massive IFRAME SEO Poisoning Attack Continuing

›
Last week's massive IFRAME injection attack is slowly turning into a what looks like a large scale web application vulnerabilities audit...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.