Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, August 21, 2008

Fake Celebrity Video Sites Serving Malware - Part Two

›
Malicious parties remain busy crunching out domain portfolios of legitimately looking celebrity video sites. The very same templates used on...
Wednesday, August 20, 2008

A Diverse Portfolio of Fake Security Software - Part Three

›
One would assume that once you've managed to trick leading advertising providers into accepting your malicious flash ads inside their ne...

DIY Botnet Kit Promising Eternal Updates

›
Among the main differences between a professional botnet command and control kit, and one that's been originally released for free, is t...
Tuesday, August 19, 2008

A Diverse Portfolio of Fake Security Software - Part Two

›
With scammers continuing to introduce new typosquatted domains promoting well known brands of rogue security software that is most often fou...
Monday, August 18, 2008

Compromised Cpanel Accounts For Sale

›
Is the once popular in the second quarter of 2007, embedded malware tactic on the verge of irrelevance, and if so, what has contributed to ...

Banker Malware Targeting Brazilian Banks in the Wild

›
Despite the ongoing customerization of malware, and the malware coding for hire customer tailored services, certain malware authors still be...
Thursday, August 14, 2008

Guerilla Marketing for a Conspiracy Site

›
An image is worth a thousand words they say, especially when it's creative enough to count as a decent guerrilla marketing campaign for ...

Who's Behind the Georgia Cyber Attacks?

›
Of course the Klingons did it, or you were naive enough to even think for a second that Russians were behind it at the first place? Of the t...
Wednesday, August 13, 2008

76Service - Cybercrime as a Service Going Mainstream

›
Disintermediating the intermediaries in the cybercrime ecosystem, ultimately results in more profitable operations. Controversial to the con...
Monday, August 11, 2008

The Russia vs Georgia Cyber Attack

›
Last month's lone gunman DDoS attack against Georgia President's web site seemed like a signal shot for the cyber siege to come a w...
Friday, August 08, 2008

Summarizing Zero Day's Posts for July

›
Different audience provokes different approach for communicating a particular event. In case you aren't reading ZDNet's Zero Day , w...

Email Hacking Going Commercial - Part Two

›
Malware authors seeking financial gains from releasing their trojans often promote them as Remote Access Tools , which if we exclude the bui...
Thursday, August 07, 2008

Phishers Backdooring Phishing Pages to Scam One Another

›
There seems to be no such thing as a free phishing page these days, with phishers scamming one another at an alarming rate according to a re...

Pinch Vulnerable to Remotely Exploitable Flaw

›
In the very same way a cybercrime analyst is reverse engineering and sandboxing a particular piece of malware in order to get a better under...
Tuesday, August 05, 2008

Compromised Web Servers Serving Fake Flash Players

›
The tactic of abusing web servers whose vulnerable web applications allow a malicious attacker to locally host a malicious campaign is nothi...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.