Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, September 04, 2008

Summarizing Zero Day's Posts for August

›
Here's a concise summary of all of my posts at Zero Day for August. If interested, consider going through July's summary , subscrib...
Wednesday, September 03, 2008

The Commoditization of Anti Debugging Features in RATs

›
Is it a Remote Administration Tool (RAT) or is it malware ? That's the rhetorical question , since RATs are not supposed to have built...

Copycat Web Malware Exploitation Kits are Faddish

›
For the cheap cybercriminals not wanting to invest a couple of thousand dollars into purchasing a cutting edge web malware exploitation kit ...
Tuesday, September 02, 2008

A Diverse Portfolio of Fake Security Software - Part Five

›
The "campaign managers" behind these fake security software propositions are not just starting to take park them at up to three d...
Friday, August 29, 2008

Exposing India’s CAPTCHA Solving Economy

›
"Are you a Human?" - once asked the CAPTCHA, and the question got answered by, well, a human, thousands of them to be precise. Spe...
Thursday, August 28, 2008

Fake Security Software Domains Serving Exploits

›
Psychological imagination, "think cybercriminals" mentality or scenario building intelligence, seem to always produce the results ...
Wednesday, August 27, 2008

Facebook Malware Campaigns Rotating Tactics

›
Trust is vital, and coming up with ways to multiply the trust factor is crucial for a successful malware campaign spreading across social ne...
Tuesday, August 26, 2008

Fake Porn Sites Serving Malware - Part Three

›
This summary is not available. Please click here to view the post.

Automatic Email Harvesting 2.0

›
Just when you think that email harvesting matured into user names harvesting in a true Web 2.0 style with the recently uncovered harvested...
Monday, August 25, 2008

A Diverse Portfolio of Fake Security Software - Part Four

›
Thanks to the affiliate based business model that's driving the increase of fake security software and rogue codecs serving domains, the...
Friday, August 22, 2008

Web Based Botnet Command and Control Kit 2.0

›
The average web based command and control kit for a botnet consisting of single user, single campaign functions only, has just lost its char...
Thursday, August 21, 2008

Fake Celebrity Video Sites Serving Malware - Part Two

›
Malicious parties remain busy crunching out domain portfolios of legitimately looking celebrity video sites. The very same templates used on...
Wednesday, August 20, 2008

A Diverse Portfolio of Fake Security Software - Part Three

›
One would assume that once you've managed to trick leading advertising providers into accepting your malicious flash ads inside their ne...

DIY Botnet Kit Promising Eternal Updates

›
Among the main differences between a professional botnet command and control kit, and one that's been originally released for free, is t...
Tuesday, August 19, 2008

A Diverse Portfolio of Fake Security Software - Part Two

›
With scammers continuing to introduce new typosquatted domains promoting well known brands of rogue security software that is most often fou...
Monday, August 18, 2008

Compromised Cpanel Accounts For Sale

›
Is the once popular in the second quarter of 2007, embedded malware tactic on the verge of irrelevance, and if so, what has contributed to ...

Banker Malware Targeting Brazilian Banks in the Wild

›
Despite the ongoing customerization of malware, and the malware coding for hire customer tailored services, certain malware authors still be...
Thursday, August 14, 2008

Guerilla Marketing for a Conspiracy Site

›
An image is worth a thousand words they say, especially when it's creative enough to count as a decent guerrilla marketing campaign for ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.