Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Friday, September 26, 2008

Hijacking a Spam Campaign's Click-through Rate

›
This spammer is DomainKeys verified , a natural observation considering that the spam compaign which I discussed last Wednesday is using bo...
Thursday, September 25, 2008

250k of Harvested Hotmail Emails Go For?

›
$50 in this particular case, however, keeping in mind that the email harvester is anything but ethical, this very same database will be sold...
Wednesday, September 24, 2008

A Diverse Portfolio of Fake Security Software - Part Six

›
Thanks to misconfigured traffic management kits, not taking advantage of all the built-in features that could have made a research a little ...

Two Copycat Web Malware Exploitation Kits in the Wild

›
We're slowly entering into "can you find the ten similarities" stage in respect to web malware exploitation kits, and their co...
Wednesday, September 17, 2008

Spam Campaign Abusing Yahoo's Services

›
Think spammers.Yahoo.com trusts Yahoo.com, consequently, a spam campaign that using bogus Yahoo.com email accounts, and spamming only Yahoo ...
Tuesday, September 16, 2008

EstDomains and Intercage VS Cybercrime

›
Surreal, especially when you get to read that EstDomains has " ruthlessly suspended over five thousand domains only for last week ...
Monday, September 15, 2008

Skype Spamming Tool in the Wild - Part Two

›
The less technologically sophisticated lone cybercriminals have always enjoyed the benefits of stand alone DIY applications. From DIY exploi...

Adult Network of 1448 Domains Compromised

›
With millions of malware infected PCs participating in a botnet, the probability that a high profile end user whose domain portfolio consist...
Wednesday, September 10, 2008

Summarizing August's Threatscape

›
Following the previous summaries of June's and July's threatscape based on all the research published during the month, it's t...
Thursday, September 04, 2008

Summarizing Zero Day's Posts for August

›
Here's a concise summary of all of my posts at Zero Day for August. If interested, consider going through July's summary , subscrib...
Wednesday, September 03, 2008

The Commoditization of Anti Debugging Features in RATs

›
Is it a Remote Administration Tool (RAT) or is it malware ? That's the rhetorical question , since RATs are not supposed to have built...

Copycat Web Malware Exploitation Kits are Faddish

›
For the cheap cybercriminals not wanting to invest a couple of thousand dollars into purchasing a cutting edge web malware exploitation kit ...
Tuesday, September 02, 2008

A Diverse Portfolio of Fake Security Software - Part Five

›
The "campaign managers" behind these fake security software propositions are not just starting to take park them at up to three d...
Friday, August 29, 2008

Exposing India’s CAPTCHA Solving Economy

›
"Are you a Human?" - once asked the CAPTCHA, and the question got answered by, well, a human, thousands of them to be precise. Spe...
Thursday, August 28, 2008

Fake Security Software Domains Serving Exploits

›
Psychological imagination, "think cybercriminals" mentality or scenario building intelligence, seem to always produce the results ...
Wednesday, August 27, 2008

Facebook Malware Campaigns Rotating Tactics

›
Trust is vital, and coming up with ways to multiply the trust factor is crucial for a successful malware campaign spreading across social ne...
Tuesday, August 26, 2008

Fake Porn Sites Serving Malware - Part Three

›
This summary is not available. Please click here to view the post.
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.