Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, July 01, 2008

Decrypting and Restoring GPcode Encrypted Files

›
The futile attempt to directly attack the encryption algorithm used by the GPcode ransomware, is prompting Kaspersky Labs to invest in a mor...

Summarizing June's Threatscape

›
June's threatscape that I'll summarize in this post based on all the research conducted during the month, was a very vibrant one. Wi...
Monday, June 30, 2008

The Malicious ISPs You Rarely See in Any Report

›
The recently released badware report entitled “ May 2008 Badware Websites Report " lists several Chinese netblocks tolerating maliciou...
Friday, June 27, 2008

ICANN and IANA's Domain Names Hijacked by the NetDevilz Hacking Group

›
The official domains of ICANN , the Internet Corporation for Assigned Names and Numbers, and IANA , the Internet Assigned Numbers Authority ...
Thursday, June 26, 2008

Right Wing Israeli Hackers Deface Hamas's Site

›
Compared to historical hacktivism tensions between different nations, Israeli and Palestinian hacktivists seem to be most sensitive to ...
Wednesday, June 25, 2008

Backdoording Cyber Jihadist Ebooks for Surveillance Purposes

›
It appears that cyber jihadists are striking back at the academic and intelligence community, by binding their propaganda Ebooks with malwar...

Fake Porn Sites Serving Malware

›
Ah, that RBN with its centralization mentality for the sake of ease of management and 99.999% uptime. In this very latest example of using m...
Tuesday, June 24, 2008

An Update to Photobucket's DNS Hijacking

›
With Photobucket’s recently hijacked DNS records by Turkish hacking group , the second high profile DNS hijack for the past two months next ...
Monday, June 23, 2008

Underground Multitasking in Action

›
How many ways in which a malicious party can abuse its unauthorized access to a host, can you think of? In this example of remotely file inc...
Friday, June 20, 2008

Phishing Campaign Spreading Across Facebook

›
Phishers have once again indicated their interest in obtaining fresh passwords for social networking sites, by using the already hacked acco...

Fake Celebrity Video Sites Serving Malware

›
With blackhat search engine optimization tactics clearly converging with social engineering , the result of which is the increasing supply o...
Wednesday, June 18, 2008

The Zeus Crimeware Kit Vulnerable to Remotely Exploitable Flaw

›
Just like you have sophisticated cyber criminals trying to scam wannabe cyber criminals by providing them with backdoored web malware exploi...
Monday, June 16, 2008

Malicious Doorways Redirecting to Malware

›
This summary is not available. Please click here to view the post.
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.