Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, July 02, 2008

Chinese Bloggers Bypassing Censorship by Blogging Backward

›
With China trying to silence over 30,000 rioters during the weekend, by deleting forum postings and deactivating accounts mentioning the rio...
Tuesday, July 01, 2008

Decrypting and Restoring GPcode Encrypted Files

›
The futile attempt to directly attack the encryption algorithm used by the GPcode ransomware, is prompting Kaspersky Labs to invest in a mor...

Summarizing June's Threatscape

›
June's threatscape that I'll summarize in this post based on all the research conducted during the month, was a very vibrant one. Wi...
Monday, June 30, 2008

The Malicious ISPs You Rarely See in Any Report

›
The recently released badware report entitled “ May 2008 Badware Websites Report " lists several Chinese netblocks tolerating maliciou...
Friday, June 27, 2008

ICANN and IANA's Domain Names Hijacked by the NetDevilz Hacking Group

›
The official domains of ICANN , the Internet Corporation for Assigned Names and Numbers, and IANA , the Internet Assigned Numbers Authority ...
Thursday, June 26, 2008

Right Wing Israeli Hackers Deface Hamas's Site

›
Compared to historical hacktivism tensions between different nations, Israeli and Palestinian hacktivists seem to be most sensitive to ...
Wednesday, June 25, 2008

Backdoording Cyber Jihadist Ebooks for Surveillance Purposes

›
It appears that cyber jihadists are striking back at the academic and intelligence community, by binding their propaganda Ebooks with malwar...

Fake Porn Sites Serving Malware

›
Ah, that RBN with its centralization mentality for the sake of ease of management and 99.999% uptime. In this very latest example of using m...
Tuesday, June 24, 2008

An Update to Photobucket's DNS Hijacking

›
With Photobucket’s recently hijacked DNS records by Turkish hacking group , the second high profile DNS hijack for the past two months next ...
Monday, June 23, 2008

Underground Multitasking in Action

›
How many ways in which a malicious party can abuse its unauthorized access to a host, can you think of? In this example of remotely file inc...
Friday, June 20, 2008

Phishing Campaign Spreading Across Facebook

›
Phishers have once again indicated their interest in obtaining fresh passwords for social networking sites, by using the already hacked acco...

Fake Celebrity Video Sites Serving Malware

›
With blackhat search engine optimization tactics clearly converging with social engineering , the result of which is the increasing supply o...
Wednesday, June 18, 2008

The Zeus Crimeware Kit Vulnerable to Remotely Exploitable Flaw

›
Just like you have sophisticated cyber criminals trying to scam wannabe cyber criminals by providing them with backdoored web malware exploi...
Monday, June 16, 2008

Malicious Doorways Redirecting to Malware

›
This summary is not available. Please click here to view the post.
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.