Dancho Danchev's 2010 Disappearance - An Elaboration - Part Two

April 04, 2019

UPDATE: I can be reached at dancho.danchev@hush.com or at +359 87 68 93 890 in case of an emergency.

UPDATE: It appears that recently a car belonging to local police department (hxxp://troyan-police.compolice_troyan@abv.bg) was stopped somewhere around my place with the lights turned on with the idea to provoke a possible local police visit.

UPDATE: It appears that my place was visited for a second time by local police officers (hxxp://troyan-police.compolice_troyan@abv.bg) with third-party doctors (http://mbal-troyan.com; mbal_troyan@abv.bg) for the purpose of apparently injecting me and a document for the injection was signed by someone that I know.

UPDATE: It appears that someone managed to twist my arm and therefore pressed a pressure on my eye without my knowledge with random people attempting to communicate with me behind a wall.

UPDATE: It appears that prior to my presentation at InfoSec 2012 someone managed to place a plaque on the wall in Earl's Court and therefore I experienced a pressure on my head while making a presentation.

UPDATE: It appears that prior to my presentation visit in Lyon in 2010 someone managed to wound my mouth with something that can be described as wall interference.

UPDATE: It appears that someone managed to open my eye and therefore I'm currently experiencing a pressure behind a wall with random people attempting to communicate with me.

UPDATE: It appears that I'm currently persistently experiencing a pressure on my mouth including something in the lines of a toxic chemical on my nose.

UPDATE: It appears that someone managed to map my place including my head and body using rubber and is persistently trying to communicate with me.

UPDATE: In case you're interested in contacting me in terms of my law enforcement issues and potential kidnapping and harassment attempts including possible interview requests - feel free to approach me at dancho.danchev@hush.com as I'm currently busy looking for a full time cybercrime researcher security blogger and threat intelligence analyst type of position.

I would be also definitely looking forward to sharing some of my sensitive projects including related work in various other sensitive areas with the idea to end the ongoing IP (Intellectual Property) robbery courtesy of a variety of industry-leading companies and individuals. Has the time come to work hard and set them straight? It appears so. Feel free to approach me at dancho.danchev@hush.com





You can use the following PGP key to approach me regarding possible career opportunities regarding possible involvement in related sensitive projects at dancho.danchev@hush.com or just to say hi request Threat Data access including a sample or a possible trial or make a comment regarding my current and historical OSINT research including possible references to my 2010 disappearance including various cybercrime underground chatter referencing me and my research including disappearance and possible kidnapping including possible GCHQ Lovely Horse references and related resources and comments.

Sample Information Security and Information Warfare cartoon circa 2008:

Second Sample Information Security and Information Warfare cartoon circa 2008:


UPDATE: It appears that someone managed to somehow place a basketball ball on my head chin and eye and therefore I'm currently experiencing a pressure on my eye and my face with people attempting to communicate with me.

UPDATE: It appears that someone is attempting to communicate with me using pressure pressed on my stomach.

UPDATE: It appears that someone is pressing a doll on a wall and is attempting to communicate with me including an increased pressure in my place.

UPDATE: It appears that different people are attempting to communicate with me behind a wall using a basketball ball interfering with the pressure in my place.

UPDATE: It appears that the robot has been persistently sprayed with homo-sexual spray including a possible female spray leading to a persistent harassment and torture currently affecting my life-being work-relationships and intellectual property.

UPDATE: It appears that someone managed to placed a box on the top of the robot for a period of several years successfully blinding me and restraining me from remote work activity.


In a related news story regarding my experience and expertise in the field it appears that the GCHQ has been actively monitoring me on Twitter including active traffic monitoring in a 2012 Intelligence Community program labeled - Lovely Horse that's basically a Palantir implementation of OSINT practices regarding a certain Twitter account. The purpose? Active traffic and content monitoring for the purpose of robbing me out of sensitive research and related research data which leads me to believe that I've been successfully contributing to a massive treasure trove IP (Intellectual Property) theft and robbery courtesy of the GCHQ and the NSA for a significant period of time.


- Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise
- LOVELY HORSE: GCHQ Program Monitored Hacker/InfoSec Community on Social Media
GCHQ's 'Lovely Horse' tool helped spooks monitor hackers online
GCHQ created 'Lovely Horse' to keep track of top hackers' and security specialists' blogs and tweets
Spy Agencies Rely on Hackers for Stolen Data and Monitoring Security Experts for Expertise
GCHQ Create Their Own Tweetdeck To Track People of Interest
GCHQ siphoned off info stolen by hackers for its own ends
Some hackers are unknowingly gathering intel for the NSA

It's also becoming increasingly evident that I'm also a participant in several other Intelligence Community Programs that appear to have successfully attempted to rob and steal my "know-how" leading me to pursue a possible closed-community data and research sharing or to request invite-only access to related research and data. Remember HBGary? It appears that every then and now a security company tries to re-position the industry by offering targeted and proprietary Threat Intelligence to a variety of sources successfully undermining a variety of community-offered and presented actionable Threat Intelligence.


While it's an honor to receive a competing proposition it should be noted that the majority of my research is public excluding several community-driven sensitive projects that I spend my time working on. It appears that the time has come for me to take my research to a whole new level which led me to pursue my own career patch within the Intelligence Community by successfully launching Disruptive Individuals including the Obmonix - Cybercrime and Cyber Jihad Fighting Platform including the eventual launch of the invite-only Threat Data - The World's Most Comprehensive Threat Database including a possible career opportunity with the industry-leading Webroot including a short-term venture with GroupSense including a possible SCMagazine 2011 nomination for my Twitter activity including the upcoming launch of Astalavista Security Group 2.0 - my primary working location throughout the 90's with a currently active crowdfunding campaign.


While I continue to be a firm believer that sharing and communicating actionable Threat Intelligence to a variety of source is the appropriate way to proceed and process a variety of cybercrime-related campaigns and malicious activity I believe that the time has come for me to take my research to a whole new level prompting me to seek a new career opportunity as the World's leading cybercrime researcher security blogger and threat intelligence analyst.


The majority of sources referenced in the original research basically represent the majority of my RSS feeds circa 2006 and it's becoming increasingly interesting perhaps even funny to figure out that the majority of my OSINT techniques including active WHOIS monitoring and research are widely accepted and discussed within the Intelligence Community.


What prompted the GCHQ to issue an active traffic and Twitter account monitoring campaign? Keep reading - back in the day throughout the period of 2008-2013 I used to actively monitor and profile various high-profile nation-state malicious and fraudulent campaigns including the infamous Koobface botnet -- listed to the original MP3 interview -- which I extensively profiled and managed to practically take down including the active exposing of its core botnet master including the active exposure of client-side exploits being served through the Koobface botnet through what appears to be a partnership between the Koobface botnet master and a well known cybercriminal - Exmanoize a well known author of a well known Web malware exploitation kit including the receiving of malware-infected host embedded messages in response to my "10 things you didn't know about the Koobface gang" including what appears to be a direct redirection of Facebook to my personal blog including yet another message left by the Koobface gang, including a variety of typosquatted C&C server domains registered to my name including extensive Russian Business Network coverage at the time.

Sample Koobface Botnet Infographic courtesy of CyberCamp 2016:


It's also worth mentioning that at the time the U.S Treasury Department was also redirecting to my Blogger profile including the active HOST file modification courtesy of a well known money-mule recruitment campaign.

Consider going through the following set of resources and news articles throughout 2008-2013 which can best describe the Threat Intelligence Scene the way I know it and the way I'm positive it should be.

Research and News Articles covering my research and referencing me throughout - 2008:
Research and News Articles covering my research and referencing me throughout - 2009:
Research and News Articles covering my research and referencing me throughout - 2012:
Research and News Articles covering my research and referencing me throughout - 2013:

UPDATE: It appears that someone placed a remote robot at local police department capable of recording my life including my life-being leading to a ruined career work relationships and intellectual property.

UPDATE: It appears that an unknown group of people is attempting to communicate with me using a transmitter on my mouth using plastic paper in their mouth.

UPDATE: It appears that someone is permanently trying to hide my eyes using plastic paper apparently using a transmitter that's been apparently placed on my mouth. It also appears that the person behind the transperant is attempting to move closely thereby ruining my equipment and life-being.

UPDATE: It appears that the transperant is operated by someone relying on lenses including bottles to map and touch-point related activities of an individual in place following persistent harassment and life-being manipulation.


In a related news article - "ZDNet Security Blogger Goes Missing in Bulgaria" covering my disappearance I came across to a juicy comment referencing the work of a well-known artist which leads me to research a little bit further leading me to the following CD/Vinyl label - "Blue Sabbath Black Cheer / Griefer ‎– We Hate You / Dancho Danchev Suck My Dick" courtesy of the the following individual.


Take into consideration the following brief post regarding the associated individual:

"It's 2010 and I'm stumbling upon a defaced image of my head shot (circa 2006). I never actually bothered about what others say, even when they insist that I'm maliciously enjoying the fact that I profile, expose, and disrupt cybercrime campaigns when there's no time for enjoyment, as the stakes are too high.

The defaced headshot is part of the released back in 2010 album "We Hate You/Dancho Danchev S*ck my D*ck" by the Blue Sabbath Griefer group.



So who's behind this "black PR" campaign? Who's the mysterious Photoshop-er? It's a Canadian music artist called Ron Brogden, who spends his spare time coding for hire, when he's not photoshoping my headshots.

Hatred-friendly domain name reconnaissance:
deterrent.net - 95.142.172.70 - Email: slave@codegrunt.com
Domain owner: Ron Brogden, Secondary emai: moron@industrial.org
Music Label Address: P.O. Box 8021; Victoria, BC, Canada; V8W 3R7
Home address: 647 Speed Avenue, Victoria, British Columbia, V8Z 1A5
Phone: +1.250-360-0372; +1.250-381-0088

Responding to the same IP are also the following domains operated by Ron:
codegrunt.com
deterrent.net
industrial.org
nuckflix.com"



In terms of my 2010 disappearance I also recently came across to the following screenshots courtesy of the cybercrime-friendly forum Darkode courtesy of an individual known as Xylitol discussing my disappearance including a possible Hitman Request charging at $10,000. Unfortunately, the screenshots were taken using the name of Nassef with whom Xylitol shared his accounting details with me including the taking of the screenshots.







UPDATE: It appears that my 2010's disappearance is slowly turning into a modest kidnapping attempt on behalf of Bulgarian law enforcement in constitution with DANS (State Agency for National Security) who appear to have been operating a long-turn operation to ruin my reputation intellectual property and work relationships successfully holding me a hostage for a period of seven years following a long-run kidnapping and harassment attempts leading to a ruined career intellectual property violation and work relationships.

Operating a remotely-operated gas pomp with azbest targeted at my place Bulgarian law enforcement in constitution with DANS (State Agency for National Security) appear to have successfully tracked down and manipulated my life-being following a successful set of long-run kidnapping and harassment attempts leading to a successfully ruined career intellectual property violation and work relationships.

It appears that Bulgarian law enforcement in constitution with DANS (State Agency for National Security) have placed remote stickers on my place and have managed to successfully map my place leading to a successful illegal entry courtesy of an unknown person followed by another unknown person supposedly a colleague followed by an illegal entry courtesy of unknown police officers who took my ID an escorted me to a local institution without explaining the reason for holding me hostage there.

It appears that the group is operating a transperant using feelings to map and touch point related activities of the individuals in place following a successful kidnapping and harassment attempt leading to illegal entry and possible kidnapping attempt. It appears that Bulgarian law enforcement in constitution with DANS (State Agency for National Security) have managed to place a plastic sticker in my mouth leading to a successful monitoring and tracking including the use of a transperant leading to a successful kidnapping and harassment attempt leading to a ruined career intellectual property violation and work relationships.

UPDATE: Great News: Missing Cybersecurity Expert Dancho Danchev Is No Longer Missing, We need help with the strange disappearance of Dancho Danchev, Security Researcher, Cybercrime Foe Goes Missing, Dancho Danchev: Missing cybersecurity expert, Cybercrime Blogger Vanishes After Finding Tracking Device In His Bathroom, Zero Day blogger Dancho Danchev: he's back, The Strange Disappearance of Dancho Danchev, We need help with the strange disappearance of Dancho Danchev, Mystery Surrounds Cyber Security Blogger Dancho Danchev’s Whereabouts, Update on Dancho Danchev, ZDNet Security Blogger Mysteriously Disappears, ZDNet Blogger Disappears Mysteriously In Bulgaria, ZDNet Blogger Disappears Under Mysterious Circumstances


UPDATE: Prior, to, my, stay, in, another, town, I, was, contacted, by, Riva Richmond, (riva@rivarichmond.com), and, set, up, a, meeting, to, discuss, a, potential, New York Times, article.


UPDATE: Prior, to, my, stay, at, this, particular, apartment, I, contacted, Nart Villeneuve, (n.villeneuve@secdev.ca), seeking, assistance, signaling, potential, trouble.

UPDATE: Prior, to, my, stay, at, a, local, institution (dpblovech@abv.bg), for, a, period, of, three, months, the, same, person, Kamen Kovachev (Kamen Tzura) (tsyrov@abv.bg), was, released, by, another, person, known, as, Nesho Sheygunov (https://www.facebook.com/nesho.sheygunov).

UPDATE: While, my, stay, at, a, local, institution (dpblovech@abv.bg), for, a, period, of, three, months, another, person, that, I, know, Kamen Kovachev (Kamen Tzura) (tsyrov@abv.bg), was, taken, to, the, room, where, I, was, confined, and, I, spent, a, night, in, the, corridor.


UPDATE: While, I, was, taken, to, a, local, institution (dpblovech@abv.bg), for, a, period, of, three, months, I, had, my, phone, taken, and, I, was, confined.

UPDATE: While, I, was, taken, out, of, my, place, to, an, unknown, car, the, fuel, was, charged, to, someone, that, I, know.

UPDATE: Prior, to, my, stay, at, a, local, institution (dpblovech@abv.bg), I, was, offered, to, take, vitamins.


UPDATE: My, place, was, recently, visited, by, unknown, men, taking, me, to, local, police, department (hxxp://troyan-police.com; police_troyan@abv.bg), and, asking, me, to, write, that, my, equipment, was, interfering, with, that, of, local, police, department.

UPDATE: It, appears, that, someone, has, taken, the, time, and, effort, to, take, a, t-shirt, of, mine.

UPDATE: Prior, to, my, visit, at, a, local, hotel, (hxxp://central-hotel.com/en; central@central-hotel.com), some, of, my, clothes, were, missing.


UPDATE: It, appears, that, my, place, was, recently, supposedly, visited, by, Plamen, Dakov (hxxp://universalstroi.com), Hristo, Radionov (hxxp://universalstroi.com; hxxp://www.facebook.com/hristo.radionov), and, Ivailo, Dochkov (hxxp://www.facebook.com/ivodivo), who, left, money, for, me.

UPDATE: Prior, to, my, attendance, in, a, local, institution (dpblovech@abv.bg), Ivailo, Dochkov (hxxp://www.facebook.com/ivodivo), tried, to, meet, me.


UPDATE: Prior, to, my, attendance, at, this, particular, apartment, I, was, invited, by, Briana Papa (Briana@crenshawcomm.com), to, visit, Prague, on, behalf, of, Avast! Software, where, I, met, with, Vince Steckler (steckler@avast.com), and, Miloslav, Korenko (korenko@avast.com), where, I, met, with, Lucian Constantin (hxxp://twitter.com/lconstantin).

Prior, to, my, attendance, at, this, apartment, I, was, also, invited, to, another, event, held, at, INTERPOL, by, Steve Santorelli
(steve.santorelli@gmail.com), which, I, successfully, attended, and, presented, at, where, I, also, met, with, Krassimir Tzvetanov (krassi@krassi.biz).

Something, else, worth, pointing, out, is, that, my, place, is, visited, by, an, unknown, woman, known, as, Boriana Mihovska, an, unknown, man, known, as, Leonid, an, unknown, person, known, as, Tzvetan Georgiev (hxxp://www.youtube.com/user/laron640; tzvetan.leonid@gmail.com); (hxxp://plus.google.com/107108766077365473231), and, an, unknown, person, known, as, Dobrin Danchev (hxxp://www.facebook.com/dobrin.danchev); (hxxp://www.sibir.bg/parachut), and, another, unknown, person, known, as, Ina, Dancheva (http://otkrovenia.com/bg/profile/innadancheva).

The, most, recent, visit, to, my, place, was, by, a, person, known, as, Vasil, Stanev, from DANS (dans@dans.bg), who, was, supposedly, asking, me, to, take, a, job, and, consequently, asked, me, to, attend, a, doctor, session.

Dear, blog, readers, I, feel, it's, about, time, I, post, an, honest, response, regarding, my, disappearance, in, 2010, with, the, purpose, of, information, my, readers, on, my, current, situation, and, to, continue, posting, and, contributing, valuable, threat, intelligence, to, the, security, community.

In, 2010, I, moved, to, an, apartment, located, in, another, town, and, apparently, my, apartment, have, been, vandalized, including, persistent, harassment, by, my, neighbors, including, a, possible, illegal, entry, courtesy, of, the, person, responsible, for, hiring, the, apartment (Kalin Petrov; kalin_petrov@hotmail.com).

After, a, persistent, chase, down, and, harassment, courtesy, of, the, person, responsible, for, hiring, the, apartment, I, received, a, notice, to, leave, and, had, my, apartment, visited, by, the, person, responsible, for, hiring, including, another, man, including, another, man, that, was, supposedly, supposed, to, take, care, of, my, belongings.


Prior, to, my, accommodation, I, was, contacted, by, Pauline, Roberts (pauline.roberts@ic.fbi.gov), who, recommended, me, to, Yavor, Kolev (javor.kolev@gmail.com), and, Albena, Spasova (albaadvisors@gmail.com), from, Bulgarian, local, authorities, followed, by, a, series, of, communication.

Prior, to, returning, to, my, place, in, 2011, my, house, was, vandalized, by, three, police, officers (hxxp://troyan-police.compolice_troyan@abv.bg), from, the, local, police, department, who, entered, my, house, in, particular, my, bedroom, and, unpolitely, asked, my, to, dress, while, showing, me, a, copy, of, my, personal, ID, that, I, haven't, presented, and, taking, me, to, an, unknown, car, without, explaining, the, reason, for, taking, me.







Sample Email communication between me, Pauline Roberts, Javor Kolev and Albena Spasova circa 2010:

Original message sent by Pauline Roberts - 2010


Second email received from Pauline Roberts - 2010


Original message received by Albena Spasova - 2010



Original response issued to Pauline Roberts, Javor Kolev, and Albena Spasova - 2010


Original response issued to Pauline Roberts, Javor Kolev, and Albena Spasova - 2010 - Part Two

 Original message received by Albena Spasova - 2010



 Original response issued by Javor Kolev - 2010



Original response issued to Javor Kolev - 2010


 Original response issued by Javor Kolev - 2010 - Part Two



 Original response issued to Javor Kolev - 2010 - Part Two


Original response issued by Javor Kolev - 2010 - Part Three


Original response issued to Javor Kolev - 2010


Original response issued by Javor Kolev - 2010 - Part Four



 Original response issued to Javor Kolev - 2010





Original response issued by Javor Kolev - 2010 - Part Five



Original response issued to Javor Kolev - 2010


Original response issued by Javor Kolev - 2010 - Part Six



A, few, hours, later, I, find, myself, located, in, an, institution (dpblovech@abv.bg), for, a, period, of, three, months, without, anyone, explaining, the, reason, for, holding, me, there.

Upon, entering, I, had, my, phone, taken, without, having, received, any, sort, of, explanation, for, taking, me, and, holding, me, there.

UPDATE: My most recent visit to local police department was to announce a possible food-poisoning and I was told not to live in my place.

Given, this, circumstances, I, feel, that, it, has, become, highly, unproductive, to, continue, my, work, and, therefore, I'm, currently, seeking, a, permanent, relocation, including, a, possible, full, time, career, opportunity, in, the, field, of, cybercrime, research, security, blogger, or, threat, intelligence, analyst.

In case you're aware of someone looking to hire full-time threat intelligence analyst cybercrime researcher or a security blogger feel free to approach me at dancho.danchev@hush.com Continue reading →

Announcing Offensive Warfare 2.0 - Official Hacking and Security Community Launch

March 22, 2019
Dear blog readers, I wanted to let everyone know that I've recently launched a public hacking and cyber security community repository offering Security Directory Downloads Podcasts and Security Videos directory including a countless number of hacking and security resources including a possible hacking and security discussion including community-based services and products - to keep the spirit of the Scene and the Security Industry - the way we know it.

How to obtain access?
- consider approaching me at dancho.danchev@hush.com for the purpose of requesting an invite

How you can contribute?
- feel free to approach your colleagues and friends including social network in terms of spreading the word about the portal and the community
- consider registering making an introduction and starting to contribute with content
- approach me directly at - dancho.danchev@hush.com with your questions and possible feature and content suggestion

Looking forward to receiving your response including any additional questions or comments including suggestions that you might have in terms of the project.

Stay tuned! Continue reading →

Historical OSINT - "I Know Who DDoS-ed Georgia and Bobbear.co.uk Last Summer"

February 07, 2019
Appreciate my rhetoric. In this post I'll provide actionable intelligence on a key DDoS for hire service that was primarily used in the Russia vs Georgia Cyber Attacks circa 2009 including the DDoS attack against Bobbear.co.uk.

Related actionable intelligence on the campaign:
hxxp://setx.in - Email: info@antiddos.eu - setx.mail@gmail.com - hxxp://httpdoc.info - hxxp://fakamaza.info. The last one with the email address "team@russia-vs-georgia.org" in the WHOIS info.

Related malicious URLs known to have participated in the campaign:
hxxp://cxim.inattack.ru/www7/www/auth.php

Related malicious URLs known to have participated in the campaign:
hxxp://h278666y.net/main/load.exe
hxxp://h278666y.net/www/auth.php

Related malicious MD5s known to have participated in the campaign:
MD5: 34413180d372a9e66d0d59baf0244b8f
MD5: 42e4bbd47d322ec563c86c636c3f10b9
MD5: ed36b42fac65236a868e707ee540c015
MD5: c9fa1c95ab4ec1c1d46abe5445fb41e4

hxxp://cxim.inattack.ru/www3/www/
hxxp://i.clusteron.ru/bstatus.php

Related malicious URLs known to have participated in the campaign:
hxxp://svdrom.cn

Related malicious URLs known to have participated in the campaign:
hxxp://203.117.111.52/www7/www/getcfg.php

Related malicious domains known to have participated in the campaign:
hxxp://cxim.inattack.ru/www2/www/stat.php
hxxp://cxim.inattack.ru/www3/www/stat.php
hxxp://cxim.inattack.ru/www4/www/stat.php
hxxp://cxim.inattack.ru/www5/www/stat.php
hxxp://cxim.inattack.ru/www6/www/stat.php
hxxp://finito.fi.funpic.org/black/stat.php
hxxp://logartos.org/forum/stat.php - 195.24.78.242
hxxp://weberror.cn/be1/stat.php
hxxp://prosto.pizdos.net/_lol/stat.php
hxxp://h278666y.net/www/stat.php - 72.233.60.254 Continue reading →

Historical OSINT - Sub7 Crew Releases New Version on 11th Anniversary of The RAT

February 07, 2019
It's 2010 and I've recently came across to the following announcement at Sub7's Main Forum - the most ubiquitous trojan horse also known as Remote Access Tool circa the 90's on the upcoming release of a new version.

"People can buy unique FUD servers in the shop and custom clients can also be written to help you admin PC's remotely with your own features. These are selling well so be sure to grab your own custom version while we are offering them at this price. Please be advised there is currently a waiting list for this."

Sample detection rate:
borlndmm.dll - Result: 0/42 (0%)
EditServer.exe - Result: 10/42 (23.81%)
Server.exe - Result: 18/41 (43.91%)
- SubSeven.exe - Result: 16/41 (39.03%)

Should The Scene the way we know it re-appear the way we know it? It appears that every then and now a new cybercrime-friendly tool is trying to materialize taking us back to what used to be The Scene circa the 90's. Continue reading →

Historical OSINT - Profiling a Portfolio of Fake Visa Application Scam Domains

February 07, 2019
It's been a while since I last posted a quality update profiling a versatile currently circulating malicious and fraudulent spam campaign profiling and highlighting the fraudulent and malicious activities of the cybercriminals behind the campaign.

In this post I'll profile a currently circulating Fake Visa Application fraudulent campaign enticing users into submitting their personal details for the purpose of obtaining a fake and rogue visa.

Related emails known to have participated in the campaign:
vizagold2010@mail.ru
qwerty_ok@bigmir.net
vizacom10@bigmir.net
Abrakadabra011@yandex.ua
alexboy40@meta.ua
vizacom09@bigmir.net
bestagancy@rambler.ru
vizagold2010@mail.ru
vizagold2010@gmail.com
vizacom01@ua.fm
Vizacom01@gmail.com
Vizacom01@ukr.net
Vizacom01@qip.ru
visas_com@ukr.net
Visas.com2010@gmail.com
infinite-visas@rambler.ru
unforeseen2010@hotmail.com
shengen_visas@ukr.net
shengenvisas@gmail.com
shengenvisas@rambler.ru
shengenvisas@bigmir.net

Stay tuned for an updated set of malicious and fraudulent Fake Visa Application domain portfolio to be published anytime soon. Continue reading →

Historical OSINT - A Peek Inside The Georgia Government's Web Site Compromise Malware Serving Campaign - 2010

February 07, 2019
Remember the massive Russia vs Georgia cyber attack circa 2009? It seems that the time has come for me to dig a little bit deeper and provide actionable intelligence on one of the actors that seem to have participated in the campaign including a sample Pro-Georgian type of Cyber Militia that apparently attempted to "risk-forward" the responsibility for waging Cyberwar to third-parties including Russian and Anti-Georgia supporters.

How come? In this post I'll provide actionable intelligence on what appears to be a currently active Brazilian supporter of the Cyber Attacks that took place circa 2009 with the idea to discuss in-depth the tools and motivation for launching the campaign of the cybercriminals behind it.

Sample malicious URL known to have participated in the campaign:
hxxp://geocities.ws/thezart/

It's 2010 and I'm coming across to a malicious and fraudulent file repository that can be best described as a key actor that managed to participate perhaps even orchestrate the Russia vs Georgia cyber attacks circa 2009. Who is this individual? How did he manage to contribute to the Russian vs Georgia cyber attacks? Did he rely on active outsourcing or was he hired to perform the orchestrated DDoS for hire attacks that took place back then? Keep reading.

It appears that a Brazilian user known as The Zart managed to participated in the Russia vs Georgia cyber attacks circa 2009 relying on a variety of tools and techniques known as:

- DNS Amplification Attacks
- Web Site Defacement Tools
- Targeted Spreading of Vulnerable Legitimate Web Sites
- Automated Web-Site Exploitation - Long Tail of The Malicious Web

which basically resulted in a self-mobilized militia that actually participated and launched the Russia vs Georgia cyber attacks circa 2009.

Related posts:
The Russia vs Georgia Cyber Attack
Who's Behind the Georgia Cyber Attacks?
DDoS Attack Graphs from Russia vs Georgia's Cyberattacks
Real-Time OSINT vs Historical OSINT in Russia/Georgia Cyberattacks Continue reading →

Historical OSINT - Profiling a Rogue and Malicious Domain Portfolio of OEM-Pirated Software

February 07, 2019
In a cybercrime-ecosystem dominated by fraudulent and malicious releases cybercriminals continue relying on fraudulent and potentially-malicious affiliate-based type of revenue-sharing schemes for the purpose of serving fraudulent and malicious software to thousands of unsuspecting users including OEM-powered pirated software to millions of users globally.

In this post I'll profile a currently active fraudulent and malicious domain portfolio of OEM-powered pirated-software serving fraudulent and malicious domains.

Related domains known to have participated in the campaign:
hxxp://store-software-7.com - Email: altsrv@gmail.com
hxxp://oem-store-software-7.com - Email: altsrv@gmail.com
hxxp://store-digital-software-7.com - Email: altsrv@gmail.com
hxxp://oem-digital-software-7.com - Email: altsrv@gmail.com
hxxp://shop-digital-software-7.com - Email: altsrv@gmail.com
hxxp://buy-shop-software-7.com - Email: altsrv@gmail.com
hxxp://buyshop-software-7.com - Email: altsrv@gmail.com
hxxp://store-buy-software-7.com - Email: altsrv@gmail.com
hxxp://digital-shopsoftware-7.com - Email: altsrv@gmail.com
hxxp://buy-shopsoftware-7.com - Email: altsrv@gmail.com
hxxp://digitalbuysoftware-7.com - Email: altsrv@gmail.com
hxxp://software-digital-store-7.com - Email: altsrv@gmail.com
hxxp://buy-shop-digital-7.com - Email: altsrv@gmail.com
hxxp://buyshop-digital-7.com - Email: altsrv@gmail.com
hxxp://buy-soft-digital-7.com - Email: altsrv@gmail.com
hxxp://soft-buy-digital-7.com - Email: altsrv@gmail.com
hxxp://softbuy-digital-7.com - Email: altsrv@gmail.com
hxxp://softwaredigital-7.com - Email: altsrv@gmail.com
hxxp://buy-softdigital-7.com - Email: altsrv@gmail.com
hxxp://softbuydigital-7.com - Email: altsrv@gmail.com
hxxp://storesoftware-oem-7.com - Email: altsrv@gmail.com
hxxp://digitalsoftware-oem-7.com - Email: altsrv@gmail.com
hxxp://store-oem-7.com - Email: altsrv@gmail.com
hxxp://soft-buy-oem-7.com - Email: altsrv@gmail.com
hxxp://digital-storeoem-7.com - Email: altsrv@gmail.com
hxxp://digitaloem-7.com - Email: altsrv@gmail.com
hxxp://digital-buyoem-7.com - Email: altsrv@gmail.com
hxxp://digitalbuy-shop-7.com - Email: altsrv@gmail.com
hxxp://buyoem-soft-7.com - Email: altsrv@gmail.com
hxxp://digital-buy-soft-7.com - Email: altsrv@gmail.com
hxxp://digitalbuy-soft-7.com - Email: altsrv@gmail.com
hxxp://digital-buysoft-7.com - Email: altsrv@gmail.com
hxxp://digitalbuysoft-7.com - Email: altsrv@gmail.com
hxxp://shopsoftware-buy-7.com - Email: altsrv@gmail.com
hxxp://software-store-buy-7.com - Email: altsrv@gmail.com
hxxp://digitalshop-buy-7.com - Email: altsrv@gmail.com
hxxp://digital-soft-buy-7.com - Email: altsrv@gmail.com
hxxp://digitalsoft-buy-7.com - Email: altsrv@gmail.com
hxxp://software-digitalbuy-7.com - Email: altsrv@gmail.com
hxxp://oem-digitalbuy-7.com - Email: altsrv@gmail.com
hxxp://softdigitalbuy-7.com - Email: altsrv@gmail.com
hxxp://digital-softbuy-7.com - Email: altsrv@gmail.com
hxxp://digitalsoftbuy-7.com - Email: altsrv@gmail.com
hxxp://digitaltributary.com - Email: altsrv@gmail.com
hxxp://oemstore-software-7.ru - Email: mikepanin1990@gmail.com
hxxp://digital-buy-software-7.ru - Email: mikepanin1990@gmail.com
hxxp://shop-buy-software-7.ru - Email: mikepanin1990@gmail.com
hxxp://buydigitalsoftware-7.ru - Email: mikepanin1990@gmail.com
hxxp://digital-buysoftware-7.ru - Email: mikepanin1990@gmail.com
hxxp://buysoftware-store-7.ru - Email: mikepanin1990@gmail.com
hxxp://software-buy-store-7.ru - Email: mikepanin1990@gmail.com
hxxp://buysoftwarestore-7.ru - Email: mikepanin1990@gmail.com
hxxp://oem-digitalstore-7.ru - Email: mikepanin1990@gmail.com
hxxp://software-oemstore-7.ru - Email: mikepanin1990@gmail.com
hxxp://store-digital-7.ru - Email: mikepanin1990@gmail.com
hxxp://storeoem-digital-7.ru - Email: mikepanin1990@gmail.com
hxxp://oembuy-digital-7.ru - Email: mikepanin1990@gmail.com
hxxp://shop-softwaredigital-7.ru - Email: mikepanin1990@gmail.com
hxxp://softwarebuydigital-7.ru - Email: mikepanin1990@gmail.com
hxxp://store-software-oem-7.ru - Email: mikepanin1990@gmail.com
hxxp://buy-software-oem-7.ru - Email: mikepanin1990@gmail.com
hxxp://software-digital-oem-7.ru - Email: mikepanin1990@gmail.com
hxxp://storedigital-oem-7.ru - Email: mikepanin1990@gmail.com
hxxp://softwareoem-7.ru - Email: mikepanin1990@gmail.com
hxxp://digitalsoftwareoem-7.ru - Email: mikepanin1990@gmail.com
hxxp://softwarestoreoem-7.ru - Email: mikepanin1990@gmail.com
hxxp://buysoftwareshop-7.ru - Email: mikepanin1990@gmail.com
hxxp://software-digitalshop-7.ru - Email: mikepanin1990@gmail.com

With software piracy continuing to increase and proliferate it shouldn't be surprising that rogue and fraudulent affiliate-based type of networks will continue to make impact globally potentially exposing millions of user to a variety of risks including malicious software.

Stay tuned for an updated set of fraudulent and malicious piracy-themed portfolio of domains to be published anytime soon. Continue reading →

Historical OSINT - Profiling a Typosquatted Facebook and Twitter Impersonating Fraudulent and Malicious Domains Portfolio

February 07, 2019
With cybercriminals continuing to populate the cybercrime ecosystem with hundreds of malicious released including a variety of typosquatted domains it shouldn't be surprising that hundreds of thousands of users continue falling victim to fraudulent and malicious malware and exploits serving schemes.

In this post I'll profile a currently active fraudulent and malicious typosquatted domain portfolio successfully impersonating Facebook and Twitter for the purpose of enticing users into interacting with the rogue and malicious domains.

Related domains known to have participated in the campaign:
hxxp://sm-url.info
hxxp://sm-urls.info
hxxp://smurls.info
hxxp://smirl.info
hxxp://smalladdr.info
hxxp://sm-irl.info
hxxp://tnylnk.info
hxxp://tnysite.info
hxxp://smalink.info
hxxp://profilelink.info
hxxp://muypix.info
hxxp://profilehoster.info
hxxp://quiklynk.info
hxxp://tnyur.info
hxxp://skurls.info
hxxp://smrls.info
hxxp://smulrs.info
hxxp://snurls.info
hxxp://link-out.info
hxxp://make-small.info
hxxp://make-tiny.info
hxxp://makesmall.info
hxxp://maketiny.info
hxxp://maketny.info
hxxp://mehprofile.info
hxxp://muhprofile.info
hxxp://quickprofile.info
hxxp://quiklink.info
hxxp://quikprofile.info
hxxp://small-url.info
hxxp://smalllink.info
hxxp://tinyout.info
hxxp://go-out.info
hxxp://out-link.info
hxxp://tny-url.info
hxxp://posta-link.info
hxxp://tiny-out.info
hxxp://private-pics.info
hxxp://private-pix.info
hxxp://coool-pics.info
hxxp://sxypics.info
hxxp://sxypix.info
hxxp://my-link-out.info
hxxp://my-lynk.info
hxxp://go-to-my-pix.info
hxxp://my-profile-lnk.info
hxxp://smaller-link.info
hxxp://smaller-urls.info
hxxp://pics-url.info
hxxp://pix-url.info
hxxp://quick-pix.info
hxxp://quick-profile.info
hxxp://pics-links.info
hxxp://pix-links.info
hxxp://check-my-pics.info
hxxp://check-my-profile.info
hxxp://check-my-link.info
hxxp://click-links.info
hxxp://my-photo-profile.info
hxxp://photo-profile.info
hxxp://my-video-profile.info
hxxp://video-profile.info
hxxp://hotvideoprofile.info
hxxp://my-videos-profile.info
hxxp://myphotoprofile.info
hxxp://mypictureprofile.info
hxxp://mysexyphotos.info
hxxp://mysexypix.info
hxxp://mysexyvideos.info
hxxp://mysexyvids.info
hxxp://mysxyphotos.info
hxxp://mysxypics.info
hxxp://mysxypictures.info
hxxp://mysxyprofile.info
hxxp://mysxyvideos.info
hxxp://mysxyvids.info
hxxp://myvideoprofile.info
hxxp://myvideosprofile.info
hxxp://profile-link.info
hxxp://sxyprofiles.info
hxxp://myhotphotos.info
hxxp://myhotpictures.info
hxxp://myhotprofile.info
hxxp://myhotvideos.info
hxxp://myhotvids.info
hxxp://my-photos-r-cool.info
hxxp://my-profile-page.info
hxxp://my-cool-profile.info
hxxp://my-photo-spot.info
hxxp://my-profile-spot.info
hxxp://my-video-spot.info
hxxp://myphotopages.info
hxxp://myprofilepages.info
hxxp://photo-pages.info
hxxp://profile-pages.info
hxxp://videoz-profile.info
hxxp://myphoto-gallery.info
hxxp://myphoto-spot.info
hxxp://myvideo-spot.info
hxxp://myvideospot.info
hxxp://show-my-pictures.info
hxxp://show-my-videos.info
hxxp://show-my-vids.info
hxxp://show-off-pics.info
hxxp://show-off-vids.info
hxxp://show-your-photos.info
hxxp://check-my-page.info
hxxp://show-my-picx.info
hxxp://show-my-vidds.info
hxxp://my-profile-site.info
hxxp://profile-sites.info
hxxp://profile-space.info
hxxp://view-my-profile.info
hxxp://view-profile.info
hxxp://profile-link2.info
hxxp://profile-link3.info
hxxp://profile-link4.info
hxxp://profile-link5.info
hxxp://profile-link6.info
hxxp://profile-link7.info
hxxp://profile-link8.info
hxxp://twitpic-1.info
hxxp://twitpic-2.info
hxxp://twitpic-3.info
hxxp://twitpic-4.info
hxxp://my-pictures-domain.info
hxxp://photo-profile-sites.info
hxxp://picture-profile-site.info
hxxp://picture-profile-sites.info
hxxp://picture-profiles.info
hxxp://video-profile-site.info
hxxp://video-profile-sites.info
hxxp://myprofile-site.info
hxxp://photo-gallery-sites.info
hxxp://photogallery-site.info
hxxp://photogallery-sites.info
hxxp://theprofileiste.info
hxxp://photo-galleries-1.info
hxxp://photo-galleries-10.info
hxxp://photo-galleries-2.info
hxxp://photo-galleries-3.info
hxxp://photo-galleries-4.info
hxxp://photo-galleries-5.info
hxxp://photo-galleries-6.info
hxxp://photo-galleries-7.info
hxxp://photo-galleries-8.info
hxxp://photo-galleries-9.info
hxxp://unrated-profiles-1.info
hxxp://unrated-profiles-10.info
hxxp://unrated-profiles-2.info
hxxp://unrated-profiles-3.info
hxxp://unrated-profiles-4.info
hxxp://unrated-profiles-5.info
hxxp://unrated-profiles-6.info
hxxp://unrated-profiles-7.info
hxxp://unrated-profiles-8.info
hxxp://unrated-profiles-9.info
hxxp://unrated-profile-1.info
hxxp://unrated-profile-10.info
hxxp://unrated-profile-2.info
hxxp://unrated-profile-3.info
hxxp://unrated-profile-4.info
hxxp://unrated-profile-5.info
hxxp://unrated-profile-6.info
hxxp://unrated-profile-7.info
hxxp://unrated-profile-8.info
hxxp://unrated-profile-9.info
hxxp://r-rated-photos-1.info
hxxp://r-rated-photos-10.info
hxxp://r-rated-photos-2.info
hxxp://r-rated-photos-3.info
hxxp://r-rated-photos-4.info
hxxp://r-rated-photos-5.info
hxxp://r-rated-photos-7.info
hxxp://r-rated-photos-8.info
hxxp://r-rated-photos-9.info
hxxp://r-rated-profile-1.info
hxxp://r-rated-profile-10.info
hxxp://r-rated-profile-2.info
hxxp://r-rated-profile-3.info
hxxp://r-rated-profile-4.info
hxxp://r-rated-profile-5.info
hxxp://r-rated-profile-6.info
hxxp://r-rated-profile-7.info
hxxp://r-rated-profile-8.info
hxxp://r-rated-profile-9.info
hxxp://unrated-gallery-1.info
hxxp://unrated-gallery-10.info
hxxp://unrated-gallery-2.info
hxxp://unrated-gallery-3.info
hxxp://unrated-gallery-4.info
hxxp://unrated-gallery-5.info
hxxp://unrated-gallery-6.info
hxxp://unrated-gallery-7.info
hxxp://unrated-gallery-8.info
hxxp://unrated-gallery-9.info
hxxp://profile-unrated-1.info
hxxp://profile-unrated-10.info
hxxp://profile-unrated-2.info
hxxp://profile-unrated-3.info
hxxp://profile-unrated-4.info
hxxp://profile-unrated-5.info
hxxp://profile-unrated-6.info
hxxp://profile-unrated-7.info
hxxp://profile-unrated-8.info
hxxp://profile-unrated-9.info
hxxp://iprosa.com
hxxp://sm-urls.com
hxxp://snkirl.com
hxxp://tnulk.com
hxxp://smulx.com
hxxp://tnysnorl.com
hxxp://supalnk.com
hxxp://tnyweb.com
hxxp://smlnk.com
hxxp://profilehoster.com
hxxp://make-small.com
hxxp://my-link-out.com
hxxp://url-out.com
hxxp://profile-out.com
hxxp://tiny-out.com
hxxp://posta-link.com
hxxp://coool-pics.com
hxxp://twitpics-1.com
hxxp://twitpics-4.com
hxxp://twitpics-2.com
hxxp://twitpics-3.com
hxxp://profile-video-gallery.com
hxxp://fb-photo-gallery.com
hxxp://fb-gallery.com
hxxp://profile-photo-gallery.com
hxxp://profilegallerysite.com
hxxp://profilepicturesite.com
hxxp://my-profile-gallery.com
hxxp://profile-gallery.com
hxxp://profile-galleries.com
hxxp://her-profile-pictures.com
hxxp://her-picture-sites.com
hxxp://her-photo-site.com
hxxp://gallery-link.com
hxxp://her-photo-sites.com
hxxp://her-profile-photos.com
hxxp://her-profile-out.com
hxxp://her-profiles.com
hxxp://her-picture-site.com
hxxp://photosites-now.com
hxxp://photos-for-fb.com
hxxp://photosforfb.com
hxxp://photo-galleries-onilne.com

Stay tuned for an updated set of typosquatted malicious and fraudulent domains impersonating popular brands to be published anytime soon. Continue reading →

Historical OSINT - Able Express Courier Service Re-Shipping Mule Recruitment Scam Spotted in the Wild

February 07, 2019
I've recently intercepted a currently circulating malicious and fraudulent spam campaign successfully impersonating "Able Express Courier Service" to utilize a re-shipping mule recruitment scam potentially targeting tens of thousands of unsuspecting users globally.

Sample malicious URL known to have participated in the campaign:
hxxp://ablecs.biz - 104.31.82.184 - Email: phyllisjhurst@grr.la

Sample Mailing Address:
PO Box 34459
Bartlett, TN 38184-0459
United States
+1 (888) 597-5808

The service is positioning itself as "Able Express Courier Service has been providing forwarding services for more than three years now. Our staff consists of experienced professionals who regularly get certified and verified for competency. Over the years, Test Compant inc has delivered packages to a variety of places and gained many major business partners all around the world."

Sample Screenshots of the Malicious and Fraudulent Service:








Stay tuned for an additional set of details regarding re-shipping money mule recruitment scams to be publishe anytime soon.
Continue reading →

Historical OSINT - Global Postal Express Re-Shipping Mule Recruitment Scam Spotted in the Wild

February 07, 2019
Continuing the series of post detailing the activities of currently circulating malicious and fraudulent spam campaigns successfully targeting potential money mule recruiters I've recently came across to Global Postal Express which basically:

"We Provide best in service global logistics through our people by building lasting relationships with the commitment to prioritize our customer needs to generate financial results. Be the leader in the development of integrated logistics strategies by offering the highest levels of quality, reliability and exceptional customer service while strategically growing nationally and internationally."

Sample malicious URL known to have participated in the campaign:
hxxp://globalpostalexpress.net - Email: globalpostalexpressinc@gmail.com

Sample Mailing Address:
2549 Harris Ave, Sacramento,CA 95838, U.S.A
+1 (719) 838 2416

Sample Screenshots of the Service in Action:





Sample Screenshots of the Related Malicious Domains Known to Have Participated in the Campaign:




Related malicious URLs known to have to participated in the campaign:
hxxp://www.marannata.com
hxxp://wellburton.com
hxxp://stecoexpress.com
hxxp://mag-trading.com

Stay tuned for an additional set of details regarding re-shipping money mule recruitment domain portfolios anytime soon.
Continue reading →

Historical OSINT - Re-Shipping Money Mule Recruitment "Your Shipping Panel LLC" Scam Domain Portfolio Spotted in the Wild

February 07, 2019
The time has come to profile a recently intercepted and currently active malicious and fraudulent re-shipping money mule recruitment fraudulent campaign successfully enticing users into interacting with the rogue and bogus content potentially risk-forwarding the risk of the fraudulent transaction to the unsuspecting user.

Sample malicious URL:
hxxp://yourshippingpanel.com

Sample Mailing Address:
One World Trade Center, New York, NY, 10007, USA
+1 (606) 879-0046

Sample Company Description:
"Your Shipping Panel LLC" is successfully positioning the company "Founded in 1995, is a package delivery company with services to Eastern Europe as well as to all the countries of the former Soviet Union. Over the years, Your Shipping Panel LLC has grown into an industry leader by focusing on the goal of connecting customers in the United States with their families, friends and businesses in Eastern Europe. This also includes e-commerce between those countries. Today, Your Shipping Panel LLC has become a dominant force in package delivery with services to Ukraine, Russia, Belarus, Moldova, Uzbekistan, Kazakhstan, Kyrgyzstan, Georgia, Azerbaijan and Armenia. Our specialized transportation and logistics services to those countries lead the way as the most recognized brand in North America."

Sample Screenshots of The Related Web Sites Known to Have Been Involved in the Campaign:




Related domains known to have participated in the campaign:
hxxp://meestshipping.com
hxxp://www.bellwordcourier.site
hxxp://unitedmorganexpresslogistics.com
hxxp://fastexmega-delivery.com
hxxp://supremelight-globaldelivery.com
hxxp://mngcargocourier.com
hxxp://fastex-uk.com
hxxp://bequem-gh.com
hxxp://diamonddeliverys.com
hxxp://leadasialogistic.com
hxxp://diplomatcourierservices.com
hxxp://solacec.com

Stay tuned for an additional portfolio of re-shipping money mule recruitment scam domains to be published anytime soon. Continue reading →

The Current and Future Cyber Threat Landscape - 2019 - A Prediction and Current Trends Analysis

February 06, 2019

- old school hacktivism - the rise and the decline of the Web Site defacement hacktivism market segment can be greatly attributed to a variety of pro-hacking groups internationally that would inevitably continue to cause havoc and will continue to affect the infrastructure of major including boutique Web sites on a global scale

- URL shortening services
- compromised legitimate Web site
- opt-in activism
- ransomware
- monetization
- malicious economies of scale
- cyber warfare
- information warfare Continue reading →

Astalavista Security Group - Official Campaign Announcement

February 03, 2019
Dear blog readers, I wanted to let you know that I've recently launched a crowd-funding campaign on Indiegogo - "Astalavista Security 2.0 - A Hacker in Every Home" with the idea to raise the necessary funds for the upcoming launch of the World's Largest and Most Popular Information Security Portal.

UPDATE: I wanted to let everyone know that I've just posted the following updates regarding the upcoming launch of the portal. How you can help? Consider spreading the word further and possibly consider making a modest donation to keep up the campaign going.

Stay tuned for an additional set of campaign details to be published anytime soon including an in-depth information regarding the history of the Portal including the Scene the way we know it throughout the 90's. Stay tuned!

Remember Astalavista Security Group - The Underground? Basically it used to be my primary working place throughout the 90's and I wanted to say thanks to everyone who expressed their interest in the resurrection of the portal including possible feedback and personal donations.

Users interested in contributing with modest funds can always approach me at dancho.danchev@hush.com including the following Live Skype Conversation Link for the purpose of managing and operating the campaign including the upcoming launch of the portal.

Looking forward to receiving your feedback suggestions and general questions.

Stay tuned! Continue reading →

Undermining Underground Black Markets - An Analysis

January 31, 2019
Sometimes, too much rationalism is precisely the worst possible mode of thinking next to apathy, and as it usually happens, great and socially oriented visions never materialize due to their poor execution or wrongly perceived critical success factors.

A recently proposed model to disrupt the computer underground's black markets by impersonating the traders and undermining their reputations by making them look like "leechers" and "rippers", is applaudible, but futile at least in respect to the proposed undermining approaches against these communities :

""

The concepts discussed are like fighting child pornography by pretending to be a child pornographer who when supposedly exchanging child porn, sends back 70+ video footage - definitely outrageous.

How do you get inside an online child porn exchange ring? Theoretically, by demonstrating how sick you are by proving you a have collecting, and are "contributing" to the growth of the scene in order to prove you're

If you just think over the idea of disrupting the communications channels by which illegally obtained data gets transfered online, you'll end up with the realistic answer that all such attempts are futile, that's the nature of the Web, to stimulate communication and interaction in news gets that get discovered on a monthly basis.

Moreover, the way cyber jihadists are already embracing the Dark Web and hiding behind crawlers are not welcome here authentication based sites, underground markets for such goods have.

The tactics mentioned

Here's another interesting description of the people's information warfare concept :

"I don’t see in this a big tragedy,” said a respondent who used the name Lightwatch. “Western countries played not the smallest role in the fall of the Soviet Union. But the Russians have a very amusing feature — they are able to get up from their knees, under any conditions or under any circumstances. As for the West? “You are getting what you deserve.” Continue reading →