Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Friday, July 18, 2008

Money Mule Recruiters use ASProx's Fast Fluxing Services

›
Just consider this scheme for a second. A well known money mule recruitment site Cash Transfers is maintaining a fast-flux infrastructure o...

Money Mule Recruiters use ASProx's Fast Fluxing Services

›
Just consider this scheme for a second. A well known money mule recruitment site Cash Transfers is maintaining a fast-flux infrastructure o...

Money Mule Recruiters use ASProx's Fast Fluxing Services

›
Just consider this scheme for a second. A well known money mule recruitment site Cash Transfers is maintaining a fast-flux infrastructure o...

The Ayyildiz Turkish Hacking Group VS Everyone

›
Certain hacktivist groups often come and go by the time the momentum of their particular cause is long gone. Excluding the hardcore hacktivi...
Thursday, July 17, 2008

The Unbreakable CAPTCHA

›
In response to the continuing evidence of how spammers are efficiently breaking the CAPTCHAs of popular free email service providers in or...

Obfuscating Fast-fluxed SQL Injected Domains

›
It's all a matter of how you put it, and putting it like represents a good example of tactical warfare, namely, combining different tact...
Tuesday, July 15, 2008

The Neosploit Malware Kit Updated with Snapshot ActiveX Exploit

›
Raising Symantec's ThreatCon based on a newly introduced exploit within a (random) copy of a popular web malware exploitation kit? Now ...

Are Stolen Credit Card Details Getting Cheaper?

›
What is shaping the prices of stolen credit card details? The investments the cybercriminals or real life scammers ( through credit card clo...
Monday, July 14, 2008

Malware and Office Documents Joining Forces

›
Common office files as documents, presentations, spreadsheets and PDF files, are the most widely abused ones in targeted attacks, which when...

Monetizing Compromised Web Sites

›
Despite that pure patriotic hacktivism is still alive and kicking, compromised sites are largely getting monetized these days, starting fro...
Friday, July 11, 2008

Violating OPSEC for Increasing the Probability of Malware Infection

›
Are malware authors and the rest of the participants in fact willing to violate their OPSEC (operational security) for the sake of increasin...
Thursday, July 10, 2008

The Template-ization of Malware Serving Sites

›
Just like web malware exploitation kits and phishing pages turned into a commodity underground good , allowing easy localization to diffe...
Wednesday, July 09, 2008

Mobile Malware Scam iSexPlayer Wants Your Money

›
A bogus media player ( iSexPlayer.jar ) targeting Symbian S60 3rd edition devices according to several affected parties, is currently being ...

Storm Worm's U.S Invasion of Iran Campaign

›
The Storm Worm-ers are keeping themselves busy, with two campaigns in less than a week, following the latest on the 4th of July . Now, they ...
Tuesday, July 08, 2008

Fake Porn Sites Serving Malware - Part Two

›
This summary is not available. Please click here to view the post.
Monday, July 07, 2008

The Risks of Outdated Situational Awareness

›
It's been two months since I analyzed the proprietary email and personal information harvesting tool targeting major career web sites -...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.