Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, July 15, 2009

Dissecting Koobface Worm's Twitter Campaign

›
My " fan club " is at it again - abusing Web 2.0 in an automated fashion. A new Koobface variant, modified by a Cyrillic-aware cy...
Wednesday, July 08, 2009

Transmitter.C Mobile Malware in the Wild

›
A currently spreading mobile malware known as Transmitter.C ( sexySpace.sisx; MD5: 3e9b026a92583c77e7360cd2206fbfcd), has brandjacked a le...
Tuesday, July 07, 2009

Legitimate Software Typosquatted in SMS Micro-Payment Scam

›
Operating since 2008 , the fraudulent tactics applied by Soletto Group, S.A also known as Netlink Network Corp , greatly remind of those a...

The Multitasking Fast-Flux Botnet that Wants to Bank With You

›
From a Chase phishing campaign, to a bogus Microsoft update , and an exploit serving spam campaign using a "Who Killed Michael Jackson?...
Friday, July 03, 2009

A Diverse Portfolio of Fake Security Software - Part Twenty Two

›
Part twenty two of the diverse portfolio of fake security software series will summarize the typosquatted scareware serving domains currentl...
Wednesday, July 01, 2009

Summarizing Zero Day's Posts for June

›
The following is a brief summary of all of my posts at ZDNet's Zero Day for June. You can also go through previous summaries for May , ...
Thursday, June 25, 2009

Ethiopian Embassy in Washington D.C Serving Malware - Part Two

›
Can a lightning strike the same place twice? In the world of cybercrime, there's no such thing as a coincidence especially when it comes...
Wednesday, June 24, 2009

A Peek Inside the Managed Blackhat SEO Ecosystem

›
Ever wondered how are thousands of bogus accounts across multiple Web services, automatically generated with built-in monetization channels ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.