Sample video demonstration of Dancho Danchev's OSINT and Threat Intelligence training in Bulgarian:
In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude
Monday, June 05, 2023
Dancho Danchev's OSINT Introduction Training Video Demonstration in Bulgarian - Part Two
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Dancho Danchev's OSINT Introduction Training Video Demonstration in Bulgarian - Part One
Sample video demonstration of Dancho Danchev's OSINT and Threat Intelligence training in Bulgarian:
In case you're interested in inquiring about individual or group OSINT or threat intelligence training for you or for your team feel free to drop me a line at dancho.danchev@hush.com
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Sunday, June 04, 2023
Dancho Danchev's OSINT and Threat Intelligence Training Video Demonstration in Bulgarian - Part Two
Sample video demonstration of Dancho Danchev's OSINT and Threat Intelligence training in Bulgarian:
In case you're interested in inquiring about individual or group OSINT or threat intelligence training for you or for your team feel free to drop me a line at dancho.danchev@hush.com
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Dancho Danchev's OSINT and Threat Intelligence Training Video Demonstration in Bulgarian - Part One
I've decided to share with everyone a recently released YouTube video demonstration in Bulgarian on the topic of OSINT and threat intelligence training.
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Friday, June 02, 2023
Assessing the Current State of Cyber and Cyber Military Deception Concepts Online - Part One
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
A Brief Overview of U.S Cyber Command's Global Cyberspace Operations Synchronization (GCOS) Concept - Or Can We Make The Difference Between Real-Time and Synchronization in Cyberspace?
Real-time communications have to do with pushing the very boundaries of an individual or an organization sticking to common good where in most of the cases the common good can get someone in trouble.
I'll now proceed and give you a pretty decent of something that I'm unknowingly extremely good at and a process and a concept excluding the fact that it's not a process at all in case you can't or don't really know or bother to implement it but rather remains a bit of a commercial and a bit of a sophisticated practice known as military and cyberspace deception and cladestine and special cyber operations type of activity where the ultimate goal would be to eventually make people and folks laugh one way or another based on what can be truly achieved here.
Let's take a moment and give you a brief example on the process. Military and cyberspace deception and clandestine and special cyber operations activity as a concept has been around since the early days where I originally began preaching on the use of "People's Information Warfare" by Chinese hacktivists where the ultimate goal would be to crowdsource the actual bandwidth for a particular campaign to the massess and actually to sometimes unaware end users and organizations which believe it or not takes and it better doesn't to another direct namely the MakeLoveNotSpam project initiative dating back to 2004.
"Setting the globe" based type of scenario is a bit childish explanation of what global segments of synchronization really means compared to real-time cyberspace operations and what should be really considered here is the true nature of what real time really means in the global context of cyberspace operations.
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
The Ransomware "Epidemic" - Or How To Strike Back?
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Saturday, May 20, 2023
Exposing The "Denis Gennadievich Kulkov" a.k.a Kreenjo/Nordex/Nordexin/Try2Check Cybercriminal Enterprise - An Analysis
including the following two ICQ numbers 855377 and 555724 and let's don't forget his personal email address accounts obtained using public sources which are polkas@bk.ru nordexin@ya.ru
and it doesn't get any better than this as we've got a pretty good and informative domain portfolio registered by the same individual based on public information sharing the same domain registration details such as for instance hxxp://worldissuer[.]biz which actually are:
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Exposing Hacking Team GhostSec - An Analysis
In this post I'll profile Hacking Team GhostSec and I'll provide all the relevant and necessary IoCs (Indicators of Compromise) including all the relevant personally identifiable information in terms of assisting U.S Law Enforcement and the U.S Intelligence Community on its way to properly track down and monitor and prosecute the cybercriminals behind these campaigns.
Personal Photos:
Related IoCs and personally identifiable information for GhostSec:
Official Web Site URL: hxxp://opiceisis.strangled.net
Official Web Site URL: hxxp://81.4.124.11/index.php
Official Web Site URL: hxxp://pst.klgrth.io
Official Group's Twitter account: hxxp://twitter.com/ghost_s3curity
Official Group's Telegram account: hxxp://t.me/GhostSecc
Official Group's Medium account: hxxp://medium.com/@OfficialGhostSec
Official Group's Web Site URL: hxxp://ghostsec-team.org
Official Group's Web Site URL: hxxp://ghostsecret-team.blogspot.com
Official Group's Email Address Account: ghostsecteam.org@gmail.com
Stay tuned!
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Monday, May 08, 2023
Happy Holidays From The (Not) Republic of Bulgaria - An Analysis - Part Five
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Sunday, May 07, 2023
Hacker Database
I would like to take the time and effort and let you know about my latest project which is called Hacker Database. Obtain access here.
Sample screenshots:
Sample visualizations produced using the database in GraphML format:
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Wednesday, May 03, 2023
How Do Cybercriminals Manage Compromised Hosts Using Desktop Management Applications? - An Analysis
Sample screenshots include:
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Tuesday, May 02, 2023
Who's Behind the Butterfly Bot/DCI Bot/DownTroj/Aspergillus Botnet Malicious Software?
Emails known to have been involved in the campaign include:
iserdo@gmail.com
toadmin@1337crew.info
wg.fatal@gmail.com
emailedgov.hacN@gmail.com
admin@1337crew.info
jernej_5@hotmail.com
usediserdo@gmail.com
toiserdo@gmail.com
schlist90210@gmail.com
Waisted.time@hotmail.com
addressnetNairo@hotmail.com
betweennetNairo@hotmail.com
hamlet1917@hotmail.com
addresshamlet1917@hotmail.com
withhamlet1917@hotmail.com
floxter@hotmail.com
ice@iceman.in
addressleniqi.mentor@siol.net
leniqi.mentor@siol.net
accountiserdo@gmail.com
addressicemangjN@hotmail.com
Sample screenshot:
Sample screenshot of Voc Cash:
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com











































