Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, December 04, 2008

Zeus Crimeware as a Service Going Mainstream

›
Since 100% transparency doesn't exist in any given market no matter how networked and open its stakeholders are, Cybecrime-as-a-Service ...
Tuesday, December 02, 2008

Rock Phish-ing in December

›
Nothing can warm up the heart of a security researcher better than a batch of currently active Rock Phish domains, fast-fluxing by using U.S...

Yet Another Web Malware Exploitation Kit in the Wild

›
With business-minded malicious attackers embracing basic marketing practices like branding, it is becoming increasingly harder, if not point...
Thursday, November 27, 2008

A Diverse Portfolio of Fake Security Software - Part Fourteen

›
You didn't even think for a second that the supply of typosqutted domains serving packed and triple crypted to the point where the binar...
Tuesday, November 25, 2008

Localizing Cybercrime - Cultural Diversity on Demand Part Two

›
It's where you advertise your services, and how you position yourself that speak for your intentions, of course, "between the line...
Wednesday, November 19, 2008

The DDoS Attack Against Bobbear.co.uk

›
When you get the "privilege" of getting DDoS-ed by a high profile DDoS for hire service used primarily by cybercriminals attackin...

New Web Malware Exploitation Kit in the Wild

›
Oops, they keep doing it, again and again - trying to cash-in on the biased exclusiveness of web malware exploitation kits in general, which...
Tuesday, November 18, 2008

Will Code Malware for Financial Incentives

›
A couple of hundred dollars can indeed get you state of the art undetectable piece of malware with post-purchase service in the form of aut...
Thursday, November 13, 2008

Embassy of Brazil in India Compromised

›
Only an amateur or unethical competition would embedd malicious links at the Embassy of Brazil in India's site , referencing their onlin...

Dissecting the Latest Koobface Facebook Campaign

›
The latest Koobface malware campaign at Facebook , is once again exposing a diverse ecosystem worth assessing in times of active migration t...
Wednesday, November 12, 2008

A Diverse Portfolio of Fake Security Software - Part Thirteen

›
What is the difference between a reactive and proactive threat intell? A reactive threat intell is assessing a campaign, individual, a group...

More Compromised Portfolios of Legitimate Domains for Sale

›
The ongoing supply of access to compromised portfolios consisting of hundreds, sometimes thousands of legitimate domains , is continuing t...

DIY Skype Malware Spreading Tool in the Wild

›
Who needs to build hit lists by harvesting user names when a usability feature allows you to expose millions of users to your latest socia...
Monday, November 10, 2008

Zeus Crimeware Kit Gets a Carding Layout

›
With cybercriminals clearly expressing their nostalgia for several notorious and already shut down credit card fraud communities, they seem ...
Thursday, November 06, 2008

DIY Phishing Pages With Command and Control Interfaces

›
The day when DIY phishing pages start coming with manuals is the day when consciously or subconsciously a phisher is lowering down the entry...
Tuesday, November 04, 2008

Summarizing Zero Day's Posts for October

›
Here's a brief summary of all of my posts at Zero Day for October. You can also go through previous summaries for September , August a...
Monday, November 03, 2008

A Diverse Portfolio of Fake Security Software - Part Twelve

›
These very latest rogue security software domains have been in circulation -- blackhat SEO, SQL injections, traffic redirection scripts -- s...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.