Exposing the Pay Per Install Underground Business Model – Historical OSINT - An Analysis - 2008 - Part Two

0
April 27, 2021

In my previous analysis on the pay per install underground market business model I elaborated more on the actual business model using a variety of images which I've collected over the years to showcase the business model sticking to the usual "an image is worth a thousand words" methodology.

In this post I've decided to continue the series and offer an additional exclusive peek inside the cybercrime ecosystem pay per install underground market business model including to discuss in-depth the tactics techniques and procedures of the cybercriminals behind these campaigns.

Sample screenshots of various pay per install business franchises throughout the years in particular circa 2008:















































Stay tuned!
Continue reading →

Dancho Danchev' Blog - New Version of Android-Based Mobile Application Available! Grab a copy today!

0
April 25, 2021
Dear blog readers,

This is Dancho and I wanted to let everyone know that I've just updated the mobile application for my personal blog to include additional features including my personal blog my Twitter account including my Medium account including Box.sk's Wordpress blog where I'm currently running a high-profile hacking and security project including my Flickr account where I intend to begin posting daily series of cybercrime research photos part of my research including my featured "Exposing Koobface - The World's Largest Botnet" including featured products which you can buy including services which you can inquire about in case you're interested in workibg with me as an independent contractor including a built-in Box.sk search engine for hackers which is Astalavista.box.sk flagship search engine for hackers with over 3M processed and updated in real-time hacking and security resources.

Here are some related screenshots of the application:
Stay tuned!






Continue reading →

Russia's SVR Launches "SecureDrop" Similar National Security Threats Soliciting Web Site on the Dark Web - An Analysis

0
April 25, 2021

Big stuff! Russia's SVR has recently launched a Dark Web onion Web site similar to SecureDrop for the purpose of enticing citizens and individuals into submitting information regarding threats facing Russia. Users are enticed into visiting the Dark Web onion Web site including to use a publicly accessible PGP for the purpose of submitting information relevant to Nation Security Threats facing Russia.

Primary Russia SVR Dark Web Onion URL:
hxxp://svrgovru24yd42e6mmrnohzs37hb35yqeulvmvkc76e3drb75gs4qrid.onion

Primary Russia SVR Public PGP Key:
-----BEGIN PGP PUBLIC KEY BLOCK-----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==
=5vim
-----END PGP PUBLIC KEY BLOCK-----

Stay tuned!
Continue reading →

Joining Team WhoisXML API!

0
April 21, 2021
Dear blog readers,

This is Dancho and I've decided to let everyone know that I've just joined forces with Team WhoisXML API on my way to fight and disrupt cybercrime globally for the position of DNS Threat Researcher and that I would be releasing a variety of upcoming research articles including white papers and case studies on a variety of topics including the use of Maltego in combination with WhoisXML API integration for the purpose of cybercrime research and threat intelligence gathering.

Two of my most recent reports include:
- Profiling the bulletproof hosting infrastructure behind an online E-Shop for stolen credit cards information

Stay tuned!
Continue reading →

Dancho Danchev's Blog - Mobile Android-Based Google Play Application Available!

0
April 19, 2021

Dear blog readers,

This is Dancho and I wanted to let everyone know that I've released a mobile Android-device compatible Google Play application for my personal blog where I intend to reach out to more readers and acquire a new type of audience. Grab a copy today!

Stay tuned!
Continue reading →

Recommended Song of the Day!

0
April 14, 2021

Dear blog readers,

I've decided to continue posting and recommended relevant and high-profile songs of the day with the idea to empower you to stay on the top of your game and to empower and offer a new listening experience for your work. 

Stay tuned!

Continue reading →

Dancho Danchev's Second Edition of Cybercrime Forum Data Set for 2021 - Direct Download Available! Request Copy Today!

0
April 14, 2021

Dear blog readers,

This is Dancho and I wanted to let everyone know that I've just released the second edition of the original "Cybercrime Forum Data Set for 2019" this time including an additional set of full offline copies of over a dozen of publicly accessible cybercrime-friendly forum communities with the idea to distribute the Data Set to the academic community including vendors and organizations and researchers including U.S Law Enforcement and the U.S Intelligence Community part of my currently ongoing Law Enforcement and OSINT operation "Uncle George".

Users interested in receiving a direct download link (19GB) of the second edition of the Cybercrime Forum Data Set for 2021 which now includes full offline copies of over 111 publicly accessible cybercrime-friendly forum communities should approach me at dancho.danchev@hush.com and I would be happy to offer a direct download link for you and your organizations.

Sample cybercrime-friendly forum communities included in the Data Set include:
evilhack.ru.rar
gerki.pw.rar
ProLogic.rar
SEOForum.rar
c-cracking.org.rar
Whitehat.vn.rar
neadekvat.ru.rar
www.opensc.ws.rar
gofuckbiz.com.rar
Darkode.rar
hackademics.fr.rar
darkmoney.de.rar
xaker.name.rar
Xakep.bg.rar
sysadmins.ru.rar
PhreakerPro.rar
Master-X.rar
Chf.rar
Darkmarket.la.rar
Webmasters.ru.rar
reversing.cc.rar
monopoly.ms.rar
Exelab.rar
blacktip.top.rar
ghostmarket.net.rar
DomenForum.rar
Antichat.ru.rar
Hack-Port.rar
ProxyBase.rar
replace.org.ua.rar
Eviloctal.rar
Xakepok.rar
WWH-Club.rar
Szuwi.rar
GoFuckBiz.rar
www.forohack.com.rar
Promarket.rar
pay-per-install.org.rar
LinkFeed.rar
TotalBlackhat.rar
Mr11-11mr.7olm.org.rar
iFud.rar
Piratebuhta.pw.rar
BPCForum.rar
ForumSEO.rar
Cracked.to.rar
Forum.Zloy.bz.rar
ProCrd.rar
Crack-Forum.rar
alligator.cash.rar
Mmpg.ru.rar
MaulTalk.rar
ForumSape.rar
SEOCafe.rar
dwh.su.rar
BigFozzy.rar
Gla.vn.rar
Zismo.rar
it-24h.com.rar
Forum-UINSell.rar
carderplanet.rar
4HatDay.rar
Toolbabase.se.rar
ubotstudio.com.rar
aHack.rar
Linuxac.org.rar
imhatimi.org.rar
Svuit.vn.rar
Free-hack.rar
xaknet.org.rar
www.ryan1918.com.rar
Darkmoney.rar
shadowcrew-2.rar
Hackersoft.rar
BlackhatWorld.rar
Nullnoss.org.rar
365Exe.rar
Aljyyosh.rar
forum.cybsecgroup.com.rar
Hackingboard.rar
Szenebox.rar
Cardvilla.rar
iHonker.rar
SkyFraud.rar
H4kurd.com.rar
moneymaker.hk.rar
CNSec.rar
Cyberizm.rar
Turkhackteam.rar
forum.reverse4you.org.rar
CNHonker.rar
security-teams.net.rar
itsobr.com.rar
Spyhackerz.rar
ArmadaBoard.rar
iransec.net.rar
xaker26.info.rar
11Wang.rar
Hackings.rar

Sample directory listing for the "Cybercrime Forum Data Set for 2021":









Stay tuned!
Continue reading →

Recommended High-Profile Daily Military Technology Video!

0
April 07, 2021

Dear blog readers,

Continuing the "Travel Without Moving" blog post series where I used to feature a high-profile publicly accessible satellite imagery for a variety of high-profile locations throughout the years I've decided to share a highly recommended video which is basically a THAAD demonstration video which you should watch and enjoy in case you're interested in learning more about modern military technology.

Stay tuned!

Continue reading →

Dancho Danchev's Blog - Proprietary MISP (Malware Information Sharing Platform) Instance Running - Request Access Today!

0
April 07, 2021

Dear blog readers,

This is Dancho. I wanted to let everyone know that I've recently started running a proprietary MISP (Malware Information Sharing Platform) instance where I distribute and share most of my proprietary research with a variety of third-parties including connected instances or users who have API access to my research which is now also available in STIX/TAXII including MISP format where you or your organization can request API access to my proprietary threat intelligence feed for research or commercial purposes by approaching me at dancho.danchev@hush.com

Sample categories which I cover in my daily batch of proprietary threat intelligence research include:

  • Targeted Malware Analysis - An Analysis
  • In-the-Wild Malware Analysis - An Analysis
  • Targeted Phishing Analysis - An Analysis
  • Malicious URL Analysis - An Analysis
  • Targeted Mobile Malware Analysis - An Analysis
  • APT Coverage - New Campaign
  • Fraudulent Infrastructure - An Analysis
  • Online Fraud Campaign - An Analysis
  • Historical OSINT Campaign - An Analysis
  • Russian Business Network coverage
  • Koobface Botnet coverage
  • Kneber Botnet coverage
  • Hundreds of IOCs (Indicators of Compromise)
  • Tactics Techniques and Procedures In-Depth Coverage
  • Malicious and fraudulent infrastructure mapped and exposed
  • Malicious and fraudulent Blackhat SEO coverage
  • Malicious spam and phishing campaigns
  • Malicious and fraudulent scareware campaigns
  • Malicious and fraudulent money mule recruitment scams
  • Malicious and fraudulent reshipping mule recruitment scams
  • Web based mass attack compromise fraudulent and malicious campaigns
  • Malicious and fraudulent client-side exploits serving campaigns

Sample screenshots of the research posted at my proprietary MISP (Malware Information Sharing Platform) instance:



Stay tuned!

Continue reading →

Recommended High-Profile Psytrance Song of the Day!

0
April 06, 2021

Dear blog readers,

This is Dancho. I wanted to take and effort and present a newly launched series of blog posts called "Psytrance Song of the Day" where I intend to share with you some of the high-profile and currently circulating psytrance songs with the idea to help you reach out to a new set of music including to empower you with a new set of music choice for your listening and enrichment experience.

Stay tuned!

Continue reading →

Dancho Danchev's Cybercrime Forum Data Set for 2019 - Request a Copy Today!

0
April 06, 2021

Dear blog readers,

I've recently updated my original "Cybercrime Forum Data Set for 2019" to include an additional dozen of publicly accessible cybercrime-frindly forum communities which are ready for processing and enrichment. With the original Data Set now 16GB and basically including full offline copies of some of the most prolific publicly accessible cybercrime-friendly forum communities which basically consists of 1M of raw Web sites ready for processing and enrichment users interested in obtaining access to the original Cybercrime Forum Data Set for 2019 for research and enrichment purposes including to participate in my currently ongoing Law Enforcement and OSINT Operation called "Uncle George" should approach me at dancho.danchev@hush.com in order to obtain access to the Data Set for research purposes.

Sample graphics which I've recently produced part of the currently ongoing Law Enforcement and OSINT Operation called "Uncle George":


Sample publicly accessible cybercrime-friendly forum communities included in the original Data Set include:

evilhack.ru.rar
gerki.pw.rar
ProLogic.rar
SEOForum.rar
c-cracking.org.rar
Whitehat.vn.rar
neadekvat.ru.rar
www.opensc.ws.rar
gofuckbiz.com.rar
Darkode.rar
hackademics.fr.rar
darkmoney.de.rar
xaker.name.rar
Xakep.bg.rar
sysadmins.ru.rar
PhreakerPro.rar
Master-X.rar
Chf.rar
Darkmarket.la.rar
Webmasters.ru.rar
reversing.cc.rar
monopoly.ms.rar
Exelab.rar
blacktip.top.rar
ghostmarket.net.rar
DomenForum.rar
Antichat.ru.rar
Hack-Port.rar
ProxyBase.rar
replace.org.ua.rar
Eviloctal.rar
Xakepok.rar
WWH-Club.rar
Szuwi.rar
GoFuckBiz.rar
www.forohack.com.rar
Promarket.rar
pay-per-install.org.rar
LinkFeed.rar
TotalBlackhat.rar
Mr11-11mr.7olm.org.rar
iFud.rar
Piratebuhta.pw.rar
BPCForum.rar
ForumSEO.rar
Cracked.to.rar
Forum.Zloy.bz.rar
ProCrd.rar
Crack-Forum.rar
alligator.cash.rar
Mmpg.ru.rar
MaulTalk.rar
ForumSape.rar
SEOCafe.rar
dwh.su.rar
BigFozzy.rar
Gla.vn.rar
Zismo.rar
it-24h.com.rar
Forum-UINSell.rar
carderplanet.rar
4HatDay.rar
Toolbabase.se.rar
ubotstudio.com.rar
aHack.rar
Linuxac.org.rar
imhatimi.org.rar
Svuit.vn.rar
Free-hack.rar
xaknet.org.rar
www.ryan1918.com.rar
Darkmoney.rar
shadowcrew-2.rar
Hackersoft.rar
BlackhatWorld.rar
Nullnoss.org.rar
365Exe.rar
Aljyyosh.rar
forum.cybsecgroup.com.rar
Hackingboard.rar
Szenebox.rar
Cardvilla.rar
iHonker.rar
SkyFraud.rar
H4kurd.com.rar
moneymaker.hk.rar
CNSec.rar
Cyberizm.rar
Turkhackteam.rar
forum.reverse4you.org.rar
CNHonker.rar
security-teams.net.rar
itsobr.com.rar
Spyhackerz.rar
ArmadaBoard.rar
iransec.net.rar
xaker26.info.rar
11Wang.rar
Hackings.rar

Stay tuned!

Continue reading →