Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, December 15, 2008

Skype Phishing Pages Serving Exploits and Malware - Part Two

›
Dear malware spreader, here we meet again. It's been a while since I last wrote to you, half an year ago to be precise . Since I first m...

Localized Social Engineering on Demand

›
If I were to come across this service last year, I'd be very surprised. But coming across it in 2008 isn't surprising at all, and th...

Localized Social Engineering on Demand

›
If I were to come aross this service last year, I'd be very surprised. But coming across it in 2008 isn't surprising at all, and tha...
Thursday, December 11, 2008

Summarizing Zero Day's Posts for November

›
The following is a brief summary of all of my posts at Zero Day for November. You can also go through previous summaries for October , Sept...
Tuesday, December 09, 2008

The Koobface Gang Mixing Social Engineering Vectors

›
It's the Facebook message that came from one of your infected friends pointing you to an on purposely created bogus Bloglines blog servi...
Monday, December 08, 2008

Dissecting the Koobface Worm's December Campaign

›
The Koobface Facebook worm -- go through an assessment of a previous campaign -- is once again making its rounds across social networking...
Thursday, December 04, 2008

Zeus Crimeware as a Service Going Mainstream

›
Since 100% transparency doesn't exist in any given market no matter how networked and open its stakeholders are, Cybecrime-as-a-Service ...
Tuesday, December 02, 2008

Rock Phish-ing in December

›
Nothing can warm up the heart of a security researcher better than a batch of currently active Rock Phish domains, fast-fluxing by using U.S...

Yet Another Web Malware Exploitation Kit in the Wild

›
With business-minded malicious attackers embracing basic marketing practices like branding, it is becoming increasingly harder, if not point...
Thursday, November 27, 2008

A Diverse Portfolio of Fake Security Software - Part Fourteen

›
You didn't even think for a second that the supply of typosqutted domains serving packed and triple crypted to the point where the binar...
Tuesday, November 25, 2008

Localizing Cybercrime - Cultural Diversity on Demand Part Two

›
It's where you advertise your services, and how you position yourself that speak for your intentions, of course, "between the line...
Wednesday, November 19, 2008

The DDoS Attack Against Bobbear.co.uk

›
When you get the "privilege" of getting DDoS-ed by a high profile DDoS for hire service used primarily by cybercriminals attackin...

New Web Malware Exploitation Kit in the Wild

›
Oops, they keep doing it, again and again - trying to cash-in on the biased exclusiveness of web malware exploitation kits in general, which...
Tuesday, November 18, 2008

Will Code Malware for Financial Incentives

›
A couple of hundred dollars can indeed get you state of the art undetectable piece of malware with post-purchase service in the form of aut...
Thursday, November 13, 2008

Embassy of Brazil in India Compromised

›
Only an amateur or unethical competition would embedd malicious links at the Embassy of Brazil in India's site , referencing their onlin...

Dissecting the Latest Koobface Facebook Campaign

›
The latest Koobface malware campaign at Facebook , is once again exposing a diverse ecosystem worth assessing in times of active migration t...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.