Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Sunday, October 21, 2018

Historical OSINT - Massive Blackhat SEO Campaign Spotted in the Wild

›
It's 2008 and I recently came across to a pretty decent portfolio of rogue and fraudulent malicious scareware-serving domains successful...
Saturday, October 20, 2018

Historical OSINT - Massive Scareware Dropping Campaign Spotted in the Wild

›
It's 2008 and I've recently spotted a currently circulating malicious and fraudulent scareware-serving malicious domain portfolio wh...

HIstorical OSINT - Latvian ISPs, Scareware, and the Koobface Gang Connection

›
It's 2010 and we've recently stumbled upon yet another malicious and fraudulent campaign courtesy of the Koobface gang actively serv...

Historical OSINT - Massive Blackhat SEO Campaign Courtesy of the Koobface Gang Spotted in the Wild

›
It's 2010 and I've recently stumbled upon yet another massive blackhat SEO campaign courtesy of the Koobface gang successfully expos...

HIstorical OSINT - PhishTube Twitter Broadcast Impersonated Scareware Serving Twitter Accounts Circulating

›
This summary is not available. Please click here to view the post.

Historical OSINT - Hundreds of Bogus Bebo Accounts Serving Malware

›
It's 2010 and I've recently intercepted a wide-spread Bebo malicious malware-serving campaign successfully enticing users into inter...

Historical OSINT - Chinese Government Sites Serving Malware

›
It's 2008 and I'm stumbling upon yet another decent portfolio of compromised malware-serving Chinese government Web sites. In this p...

Historical OSINT - Calling Zeus Home

›
Remember ZeuS? The infamous crimeware-in-the-middle exploitation kit? In this post I'll provide historical OSINT on various ZeuS-themed ...

Historical OSINT - A Diverse Portfolio of Fake Security Software

›
In this post I'll profile a currently circulating circa 2008 malicious and fraudulent scareware-serving campaign successfully enticing u...
Friday, October 19, 2018

Historical OSINT - Gumblar Botnet Infects Thousands of Sites Serves Adobe Flash Exploits

›
According to security researchers the Gumblar botnet is making a comeback successfully affecting thousands of users globally potentially c...

Historical OSINT - iPowerWeb Hacked Hundreds of Web Sites Affected

›
In 2008 it became evident that a widespread malware-embedded attack took place successfully affecting hundreds of iPowerWeb customers potent...
Thursday, September 20, 2018

Introducing Threat Data - The World's Most Comprehensive Threats Database

›
Dear blog readers, I wanted to take the time and effort and introduce you to Threat Data - the World's Most Comprehensive Threats Data...
Sunday, August 12, 2018

Dancho Danchev's 2010 Disappearance - An Elaboration - Part Two

›
Thursday, August 02, 2018

Historical OSINT - Turkey's Chamber of Commerce Serving Malware

›
oi06.cn elfah.net/h.js
Monday, July 30, 2018

Historical OSINT - Newly Launched Koobface Themed Campaign Spotted in the Wild

›
Related malicious URLs known to have participated in the campaign: hxxp://qjcleaner.eu/hitin.php?affid=02979 Once executed a sample malw...
Saturday, July 28, 2018

Historical OSINT - Summarizing 2 Years of Webroot's Threat Blog Posts Research

›
It's been several years since I last posted a quality update at the industry's leading threat-intelligence gathering Webroot's...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.