Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, April 30, 2009

419 Scam Artists Using NYTimes.com 'Email this' Feature

›
In times when more and more scammers/spammers are getting DomainKeys verified , others are finding adaptive ways to increase the probabilit...
Wednesday, April 29, 2009

Massive SQL Injections Through Search Engine's Reconnaissance - Part Two

›
From the lone Chinese SQL injectors empowered with point'n'click tools for massive SQL injection attacks , to the much more efficie...
Tuesday, April 28, 2009

Spamvertised Swine Flu Domains

›
The people behind the ongoing swine flu spam campaign have either missed their marketing lectures, haven't been to any at all, or are s...
Wednesday, April 22, 2009

Massive Blackhat SEO Campaign Serving Scareware

›
Over the past couple of days, I've been monitoring yet another massive blackhat SEO campaign consisting of the typical hundreds of thous...
Thursday, April 16, 2009

A CCDCOE Report on the Cyber Attacks Against Georgia

›
Following the coverage of my " Coordinated Russia vs Georgia cyber attack in progress " research in the Georgian government's ...

A Diverse Portfolio of Fake Security Software - Part Nineteen

›
You know things are getting out of hand when the scareware ecosystem scales to the point when typosquatted scareware domains offering remova...
Wednesday, April 15, 2009

Twitter Worm Mikeyy Keywords Hijacked to Serve Scareware

›
Not necessarily in real-time ( Syndicating Google Trends Keywords for Blackhat SEO ) but scareware/fake security software distributors quick...
Tuesday, April 14, 2009

Conficker's Scareware/Fake Security Software Business Model

›
It doesn't take a rocket scientist to conclude that sooner or later the people behind the Conficker botnet had to switch to monetizatio...
Wednesday, April 08, 2009

A Diverse Portfolio of Fake Security Software - Part Eighteen

›
With Microsoft's latest Security Intelligence Report indicating that scareware/fake security software continues growing , it's wort...

Inside a Zeus Crimeware Developer's To-Do List

›
Every then and now I get asked a similar question in regard to crimeware kits - which is the latest version of a particular crimeware/web ma...
Wednesday, April 01, 2009

Bogus LinkedIn Profiles Redirect to Malware and Rogue Security Software

›
From the automatically registered bogus LinkedIn profiles promoting pharmaceuticals campaign in February, to January's malware campaign...
Tuesday, March 31, 2009

Diverse Portfolio of Fake Security Software - Part Seventeen

›
The following are some of the currently active/about to go online rogue security software domains, and their associated payment gateways exp...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.