Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, May 20, 2008

Pro-Serbian Hacktivists Attacking Albanian Web Sites

›
The rise of pro-kosovo web site defacement groups was marked in April, 2008, with a massive web site defacement spreading pro-kosovo propag...

Fake PestPatrol Security Software

›
Continuing the rogue security software series I've just stumbled upon a fake PestPatrol site - pest-patrol.com (85.255.121.181) host...

All You Need is Storm Worm's Love

›
The Storm Worm malware launched yet another spam campaign promoting links to malware serving hosts, in between a SQL injection related to St...
Monday, May 19, 2008

Fast-Fluxing SQL Injection Attacks

›
The botnet masters behind Asprox are converging tactics already, by fast-fluxing the SQL injected domains . Related URLs for this campaign :...

The Small Pack Web Malware Exploitation Kit

›
Yet another proprietary web malware exploitation kit has been released at the beginning of this month, further indicating that the efficient...
Saturday, May 17, 2008

Redmond Magazine SQL Injected by Chinese Hacktivists

›
Four Redmond related web properties appear to have been SQL injected by Chinese hacktivists , namely, Redmond - The Independent Voice of the...
Thursday, May 15, 2008

Got Your XPShield up and Running?

›
Don't. Continuing previous posts with three different portfolios of fake security software , and Zlob malware variants posing as video c...

DIY Phishing Kits Introducing New Features

›
Factual evidence on the emergence of individual phishing kits is starting to appear, with two more available in the wild. So what? For the t...
Wednesday, May 14, 2008

A Botnet of U.S Military Hosts

›
Building DDoS bandwidth capacity for offensive cyber warfare operations may seem rational, but this departamental cyber warfare approach wo...
Tuesday, May 13, 2008

The FirePack Exploitation Kit Localized to Chinese

›
The process of localizing open source malware, as well as publicly obtainable web malware explotation kits is continuing to receive the atte...
Monday, May 12, 2008

Major Career Web Sites Hit by Spammers Attack

›
What is the future of spamming next to managed spamming appliances , like the ones already offered for use on demand? It’s targeted spamming...

Custom DDoS Attacks Within Popular Malware Diversifying

›
One of the many Chinese script kiddies' favorite malware tools has been recently updated with several other DDoS attack capabilities bui...

Stealing Sensitive Databases Online - the SQL Style

›
In a perfect world from a malicious SQL-ers perspective, mom and pop E-shops filling market niches and generating modest but noticeable reve...
Friday, May 09, 2008

Skype Phishing Pages Serving Exploits and Malware

›
"Please, don't update your account information", at least not on recently spammed phishing pages which will not only aim at ob...
Thursday, May 08, 2008

A Chinese DIY Multi-Feature Malware

›
What is the current state of the Chinese IT Underground ? Are its participants copycats who just localize successful malware kits , and port...
Wednesday, May 07, 2008

Blackhat SEO Campaign at The Millennium Challenge Corporation

›
Among the very latest victims of a successful blackhat SEO campaign that has managed to inject and locally host 1,370 pharmaceutical pages, ...

Harvesting YouTube Usernames for Spamming

›
With a recently distributed database of several thousand YouTube user names, spammers continue trying to demonstrate their interest in estab...
Tuesday, May 06, 2008

Ethical Phishing to Evaluate Phishing Awareness

›
What is the most efficient and cost-effective way of both, measuring your employees awareness of phishing threats, and building awareness of...
Monday, May 05, 2008

MySpace Hosting MySpace Phishing Profiles

›
The ongoing arms race between phishers and social networking sites, is a great example of how malicious parties continue to be a step ahead ...
Friday, May 02, 2008

Segmenting and Localizing Spam Campaigns

›
One-to-many or one-to-one communication channel? That's the questions from a spammer's perspective. Given that spammers have long em...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.