Dear blog readers,
It's been a pleasure and an honor to serve your needs since December, 2005 when I've officially opened this blog while working as a Managing Director for Astalavista.com - The Underground and I sincerely hope that you'll continue to find my research informative and quality enough to further recommend my personal blog to friends and colleagues including to possibly approach me in terms of seeking additional information regarding a particular blog post or to actually "say hi" and "keep up the good fight" type of message.
My 2020 primary contact points include:
Personal Email - ddanchev@cryptogroup.net
Social Media Accounts - Twitter, LinkedIn, Facebook, Angellist, YouTube, Medium
IM and Skype ID: dancho_danchev_
Web properties that I'm currently running include - Offensive Warfare 2.0 and Unit-123.org
XMPP/OMEMO ID for Real-Time Conversation: 90184@armadillophone.com which is basically compatible with ChatSecure Conversations and Dino - feel free to install any of these applications in case you're not using them already and feel free to "say hi".
Happy holidays and thanks a lot for everyone who's been keeping in touch and keeping up the good fight!
Stay tuned!
In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude
Monday, December 23, 2019
Happy Holidays!
Tags:
Botnet,
Cyber Espionage,
Cyber Jihad,
Cyber Warfare,
Information Security,
Information Warfare,
Malicious Software,
Security
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Thursday, December 12, 2019
Announcing Law Enforcement and OSINT Intelligence Operation "Uncle George" - Join Me Today! - Part Two
Dear blog readers,
I wanted to let you know that I've been spending more time doing active Security Industry outreach in terms of the 2019 Cybercrime Forum Data Set and that I've already started working with several vendors in terms of possible OSINT enrichment and actual processing of the data.
Perfect timing to say thanks to Ilya Timchenko and McAfee for actually reaching out and managing to process the following artifacts from the actual Data Set which I've decided to publicly share with everyone who reaches out and expresses interest in working with me on the Data Set with the idea to possibly assist the Security Community and Law Enforcement in terms of tracking down the individuals behind these campaigns and actually shutting them down.
Possible Personally Identifiable Artifacts Found in the Actual Data Set Include:
I'll be posting an updated set of analysis and data regarding the currently ongoing Law Enforcement and OSINT Intelligence Operation "Uncle George" anytime soon.
Approach me at ddanchev@cryptogroup.net in case you're interested in working with me on this project or want to obtain access to the actual Data Set for possible OSINT enrichment and research purposes.
Stay tuned!
I wanted to let you know that I've been spending more time doing active Security Industry outreach in terms of the 2019 Cybercrime Forum Data Set and that I've already started working with several vendors in terms of possible OSINT enrichment and actual processing of the data.
Perfect timing to say thanks to Ilya Timchenko and McAfee for actually reaching out and managing to process the following artifacts from the actual Data Set which I've decided to publicly share with everyone who reaches out and expresses interest in working with me on the Data Set with the idea to possibly assist the Security Community and Law Enforcement in terms of tracking down the individuals behind these campaigns and actually shutting them down.
Possible Personally Identifiable Artifacts Found in the Actual Data Set Include:
- Cybercriminal Cryptocurrency Addressess
- Cybercriminal Emails
- Cybercriminal ICQ Numbers
- Cybercriminal Phone Numbers
- Cybercriminal QQ IDs
- Cybercriminal Telegram IDs/Telegram IDs
- Cybercriminal Dark Web Onion Addresses
- Cybercriminal Viber Accounts
- Cybercriminal VK Accounts
- Cybercriminal XMPP Accounts
I'll be posting an updated set of analysis and data regarding the currently ongoing Law Enforcement and OSINT Intelligence Operation "Uncle George" anytime soon.
Approach me at ddanchev@cryptogroup.net in case you're interested in working with me on this project or want to obtain access to the actual Data Set for possible OSINT enrichment and research purposes.
Stay tuned!
Tags:
Botnet,
Cyber Espionage,
Cybercrime,
Information Security,
Law Enforcement,
Malicious Software,
McAfee,
Operation Uncle George,
OSINT,
Security,
Threat Intelligence
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Announcing New Hacking Security and Hacktivism-Themed Online Forum Community! Join me Today!
Dear blog readers,
I've recently launched an extremely popular and comprehensive Hacking and Security possibly Hacktivism-Themed Online Forum Community called "Security is Futile" using the extremely popular PlushForums Platform consisting of over 193 Hacking and Security Topic Categories.
The initial idea behind launching the community is to spread data information and knowledge and to provoke discussion into various hot Hacking and Security topics including to solicit high-profile VIP Hacker and Security Experts to actually join the community and contribute with content.
Official "Security is Futile!" Hacking and Security Forum Community URL:
https://forums.offensive-warfare.com
Stay tuned!
Tags:
Cyber Warfare,
Hacking Forum,
Information Security,
Information Security Forum,
Information Warfare,
PlushForums,
Security,
Security Forum
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Wednesday, December 04, 2019
g0t Bitcoin? - Part Two
Dear blog readers,I wanted to let you know that I've recently changed to a permanent Dark Web Onion address - for my Cybertronics - Virtual Reality Social Network for Hackers and Security Experts where I'm currently soliciting Bitcoin donations for the purpose of launching the project in January, 2020.
Got Bitcoin? Consider visiting the Dark Web Onion and making a donation today and stay tuned for the upcoming updates and actual launch of the project in January, 2020 - http://lkzihepprlhxtvbutjedoazbsqd4avmifhpjms3zuq7itceiu4qajwad.onion/
Stay tuned!
Tags:
Cybertronics,
Dark Web,
Dark Web Onion,
Information Security,
Security,
Virtual Reality,
Virtual Reality Social Network,
Virtual World
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Monday, December 02, 2019
Join me on Medium!
Dear blog readers,
I wanted to let everyone know that I've recently joined Medium and that I intend to post a variety of editorial type of articles on a daily basis including the fact that I was recently featured as a Top Writer in Privacy.
Missing the editorial? Consider going through my old ZDNet Zero Day Blog content archive including the following recently published editorial type of articles on Medium:
I wanted to let everyone know that I've recently joined Medium and that I intend to post a variety of editorial type of articles on a daily basis including the fact that I was recently featured as a Top Writer in Privacy.
Missing the editorial? Consider going through my old ZDNet Zero Day Blog content archive including the following recently published editorial type of articles on Medium:
- Assessing U.S Military Cyber Operational Capabilities to Counter Pro-ISIS Internet Infrastructure
- My Involvement in the Top Secret GCHQ “Lovely Horse” Program and the Existence of the Karma Police
- Kaspersky’s Antivirus Products the NSA and U.S National Security — An Analysis
- Assessment of U.S Intelligence Community Cyber Surveillance Programs and Tradecraft — Part One
- How the NSA utilized Iranian Cyber Proxies To Participate in the BOUNDLESS INFORMANT Program?
- Exposing GCHQ’s Top Secret “GORDIAN KNOT” Cyber Defense Sensor Program — An Analysis
- Exposing GCHQ’s URL-Shortening Service and Its Involvement in Iran’s 2009 Election Protests
Tags:
CIA,
Eavesdropping,
GCHQ,
Information Security,
Intelligence Community,
NSA,
Privacy,
Security,
Surveillance,
Wiretapping
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Dancho Danchev's Twitter Account - 2010 - Direct Download Link - Historical OSINT
Dear blog readers,Takes you back doesn't it? I've decided to share with you a direct download link of my old Twitter account for you to download and go through and to say big thanks to everyone who's been keeping in touch with me throughout 2008-2013 including actual research work and related research inquiries.
Consider going through the archive and catching up with some of my research circa 2010-2014 and approach me - ddanchev@cryptogroup.net with your feedback or just to say hi in case you remember some of the research which I used to publish back then.
Stay tuned!
Tags:
Cyber Warfare,
Cybercrime,
Information Security,
Information Warfare,
Malicious Software,
Security,
Threat Intelligence,
Twitter
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Official World Hacker Global Domination Group (WHGDG) Dark Web Onion Launch!
Dear blog readers,
I've been spending more time on the Dark Web these days including the active launching of a second Dark Web Onion and the official launch of the World Hacker Global Domination Group (WHGDG) which is basically a Call for Papers Call for Participation and Call for Innovation request on behalf of me for the purpose of reaching out to the U.S Intelligence Community as an independent contractor for the purpose of presenting and eventually getting funding for a variety of commercial cyber security and hacking including Threat Intelligence and Offensive Cyber Warfare Projects including the active recruitment of new members.
Check out the Official Dark Web Onion:
http://nexvibpe4xszfx4cp2jldkdyhnjnah5qnckoagoiry3vpyv5eheh55id.onion/ and don't forget to visit Cybertronics - Virtual Reality Social Network for Hackers and Cyber Security Experts Bitcoin-accepting Project - http://ca7brwpxmnbssdoh4dfoijyr7zwetob74x3berlvmeekhmkt7zcjdjqd.onion/ and donate today!
How you can participate?
Enjoy!
I've been spending more time on the Dark Web these days including the active launching of a second Dark Web Onion and the official launch of the World Hacker Global Domination Group (WHGDG) which is basically a Call for Papers Call for Participation and Call for Innovation request on behalf of me for the purpose of reaching out to the U.S Intelligence Community as an independent contractor for the purpose of presenting and eventually getting funding for a variety of commercial cyber security and hacking including Threat Intelligence and Offensive Cyber Warfare Projects including the active recruitment of new members.
Check out the Official Dark Web Onion:
http://nexvibpe4xszfx4cp2jldkdyhnjnah5qnckoagoiry3vpyv5eheh55id.onion/ and don't forget to visit Cybertronics - Virtual Reality Social Network for Hackers and Cyber Security Experts Bitcoin-accepting Project - http://ca7brwpxmnbssdoh4dfoijyr7zwetob74x3berlvmeekhmkt7zcjdjqd.onion/ and donate today!
How you can participate?
- Visit the Dark Web Onion and go through the Call for Participation Call for Papers and Call for Innovation and approach me at ddanchev@cryptogroup.net in case you believe that you can contribute with knowledge data and expertise including the technical "know-how" to participate in any of the Key Points mentioned in the Dark Web Onion
Enjoy!
Tags:
Cyber Attack,
Cyber Espionage,
Cyber Terrorism,
Dark Web,
Information Security,
Information Warfare,
Security,
WHGDG,
World Hacker Global Domination Group
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
New Cybertronics - VR for Hackers and Security Experts Dark Web Onion Address
Dear blog readers,
I wanted to let everyone know that I've recently changed the official Dark Web Onion address for my Cybertronics - VR for Hackers and Security Experts Project including the actual Bitcoin donation address.
G0t Bitcoin? Consider going through the project proposal today - http://lkzihepprlhxtvbutjedoazbsqd4avmifhpjms3zuq7itceiu4qajwad.onion/ including to make a possible Bitcoin donation using the following Bitcoin Address: 3J8Jt7XCBGtCL6XRLTWhKfRQBmhhqGs4aP
I wanted to say a big thanks to everyone who approached me in terms of the project including to actually make a donation. The official schedule release is scheduled for January, 2020 and I'll make sure to keep everyone posted on current and future project updates.
Stay tuned!
I wanted to let everyone know that I've recently changed the official Dark Web Onion address for my Cybertronics - VR for Hackers and Security Experts Project including the actual Bitcoin donation address.
G0t Bitcoin? Consider going through the project proposal today - http://lkzihepprlhxtvbutjedoazbsqd4avmifhpjms3zuq7itceiu4qajwad.onion/ including to make a possible Bitcoin donation using the following Bitcoin Address: 3J8Jt7XCBGtCL6XRLTWhKfRQBmhhqGs4aP
I wanted to say a big thanks to everyone who approached me in terms of the project including to actually make a donation. The official schedule release is scheduled for January, 2020 and I'll make sure to keep everyone posted on current and future project updates.
Stay tuned!
Tags:
Cybertronics,
Dark Web,
Information Security,
Security,
Virtual Reality,
Virtual Reality Social Network,
Virtual World
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Saturday, November 02, 2019
Exposing Russia's Most Wanted Cybercriminals - An OSINT Analysis
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Dancho Danchev's Primary Contact Points - 2019
Dear blog readers, in this post I'll provide and feature my primary contact points for 2019 in order for you to approach me regarding possible research feedback research requests job career opportunities and possible event presentations.
Users interested in approaching me regarding a possible participation in classified or sensitive projects including possible job career opportunities and Threat Data access requests can approach me at - dancho.danchev@hush.com
Looking forward to hearing from you!
Enjoy!
Users interested in approaching me regarding a possible participation in classified or sensitive projects including possible job career opportunities and Threat Data access requests can approach me at - dancho.danchev@hush.com
Looking forward to hearing from you!
Enjoy!
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
New Commercial Security Research OSINT Cybercrime Research and Threat Intelligence Gathering Services Portfolio Available On Demand!
Dear blog readers,
I wanted to let everyone know of a currently active commercial portfolio of services that I'm publicly offering for the purpose of reaching out to colleagues and friends including companies vendors and organizations who might be interested in working with me for the purpose of obtaining access to never-published before Security Research analysis reports briefs podcasts and various other commercially obtainable virtual and cyber assets that you and your organization can take advantage of.
Approach me at - dancho.danchev@hush.com today to discuss!
Key Commercial Services that I'm currently offering include:
Including the following commercial services available on Patreon Community:
I wanted to let everyone know of a currently active commercial portfolio of services that I'm publicly offering for the purpose of reaching out to colleagues and friends including companies vendors and organizations who might be interested in working with me for the purpose of obtaining access to never-published before Security Research analysis reports briefs podcasts and various other commercially obtainable virtual and cyber assets that you and your organization can take advantage of.
Approach me at - dancho.danchev@hush.com today to discuss!
Key Commercial Services that I'm currently offering include:
Including the following commercial services available on Patreon Community:
- Real-Time Security Consultation
- Security Newsletter
- Cybercrime Blog Post
- Security Podcast
- Malware Analysis
- Threat Intelligence Analysis
- Security Workshop
- OSINT Analysis
- Geopolitical Analysis
- Threat Actor Profiling
- National Security Analysis
- Cyber Jihad Analysis
- Dark Web Intelligence and OSINT Analysis
- Security Presentation
- Cyber Security Business Development
- Red Team Penetration Testing Assessment
- Blue Team Penetration Testing Assessment
- Target of Opportunity Targeting
- Cybercrime Forum Monitoring
- Underground Chatter Monitoring
- Network Deception Consultation
- Military Scenario Building
- Cyber Warfare Scenario Building
- OSINT Enrichment and Data Mining
- Cyber Warfare Program Estimation
- Weapons System Analysis
- Cyber SIGINT and Cyber Assets Discovery
Tags:
Cyber Attack,
Cyber Espionage,
Cyber Jihad,
Cyber Warfare,
Cybercrime,
Information Security,
Information Warfare,
Malicious Software,
Security
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Wednesday, October 16, 2019
Announcing Law Enforcement and OSINT Intelligence Operation "Uncle George" - Join Me Today!
This summary is not available. Please
click here to view the post.
Tags:
Cyber Attack,
Cyber Espionage,
Cyber Terrorism,
Cyber Warfare,
Cybercrime,
Information Security,
Operation Uncle George,
OSINT,
Security,
Technical Collection,
Threat Intelligence
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Friday, September 20, 2019
Historical OSINT - Gmail's CAPTCHA Under Fire
http://www.castlecops.com/t192663-http_69_61_99_66_3_php.html
http://www.robtex.com/cnet/208.72.168.html
http://www.secureworks.com/research/threats/ozdok/?threat=ozdok
aaauaa.info - same netblock
faq.890m.com
208.72.168.140 8181
http://threatexpert.com/reports.aspx?find=208.72.168.40
208.72.168.40 on port 533
http://threatexpert.com/reports.aspx?find=208.72.168
208.72.168.40/404.txt
208.72.168.40/cr.dat
Result: 22/28 (78.58%) Trojan.Proxy.Saturn.F
File size: 36864 bytes
MD5: 49e23bdba56e0a52578341181b4faf7b
SHA1: 50fb2726dec1efb15723d93db8dce1a60df676a5
208.72.169.54
208.72.169.55
208.72.169.15
208.72.168.52
208.72.168.97
208.72.169.15
208.72.168.164
208.72.168.76
centerkras-tv.tv
iloveeverybody.kz
iloveeverybody.tj
lansetcommunication.info
lansetcommunication.biz
lanset2007.com
centerkras-tv.name
centerkras-tv.info
centerkras-tv.biz
vaznyjdomen.info
http://vaznyjdomen.info/affcgi/online.fcgi?20199:0
http://vaznyjdomen.info/gallery20199/xpsystem/rxs.ini.php
http://lyalyabum.info/affcgi/online.fcgi?20199:0
http://lyalyabum.info/gallery20199/xpsystem/rxs.ini.php
http://lohotronschik.info/affcgi/online.fcgi?20199:0
http://lohotronschik.info/gallery20199/xpsystem/rxs.ini.php
http://lyalyabum.info/affcgi/try.fcgi?20199
http://vaznyjdomen.info/affiliate/interface3.php?userid=20199
http://vaznyjdomen.info/affiliate/interface3.php?userid=20199
http://vaznyjdomen.info/affcgi/online.fcgi?20199:1
http://vaznyjdomen.info/xxmm.exe
http://lyalyabum.info/affcgi/online.fcgi?20199:1
http://lyalyabum.info/xxmm.exe
http://lohotronschik.info/affcgi/online.fcgi?20199:1
http://lohotronschik.info/xxmm.exe
http://www.robtex.com/cnet/208.72.168.html
http://www.secureworks.com/research/threats/ozdok/?threat=ozdok
aaauaa.info - same netblock
faq.890m.com
208.72.168.140 8181
http://threatexpert.com/reports.aspx?find=208.72.168.40
208.72.168.40 on port 533
http://threatexpert.com/reports.aspx?find=208.72.168
208.72.168.40/404.txt
208.72.168.40/cr.dat
Result: 22/28 (78.58%) Trojan.Proxy.Saturn.F
File size: 36864 bytes
MD5: 49e23bdba56e0a52578341181b4faf7b
SHA1: 50fb2726dec1efb15723d93db8dce1a60df676a5
208.72.169.54
208.72.169.55
208.72.169.15
208.72.168.52
208.72.168.97
208.72.169.15
208.72.168.164
208.72.168.76
centerkras-tv.tv
iloveeverybody.kz
iloveeverybody.tj
lansetcommunication.info
lansetcommunication.biz
lanset2007.com
centerkras-tv.name
centerkras-tv.info
centerkras-tv.biz
vaznyjdomen.info
http://vaznyjdomen.info/affcgi/online.fcgi?20199:0
http://vaznyjdomen.info/gallery20199/xpsystem/rxs.ini.php
http://lyalyabum.info/affcgi/online.fcgi?20199:0
http://lyalyabum.info/gallery20199/xpsystem/rxs.ini.php
http://lohotronschik.info/affcgi/online.fcgi?20199:0
http://lohotronschik.info/gallery20199/xpsystem/rxs.ini.php
http://lyalyabum.info/affcgi/try.fcgi?20199
http://vaznyjdomen.info/affiliate/interface3.php?userid=20199
http://vaznyjdomen.info/affiliate/interface3.php?userid=20199
http://vaznyjdomen.info/affcgi/online.fcgi?20199:1
http://vaznyjdomen.info/xxmm.exe
http://lyalyabum.info/affcgi/online.fcgi?20199:1
http://lyalyabum.info/xxmm.exe
http://lohotronschik.info/affcgi/online.fcgi?20199:1
http://lohotronschik.info/xxmm.exe
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Historical OSINT - Dancho Danchev's Media and News Coverage - 2008-2013
Dear blog readers I wanted to take the time and effort and summarize all the currently related news media articles referencing me and my research throughout the period - 2008-2013 and wanted to express my gratitude to everyone who approached me seeking my assistance in an upcoming news article including those who participated in the search for me circa 2010 and I wanted to let everyone know that users interested in approaching me regarding potential news stories including conference presentations and possible threat intell requests can approach me at disruptive.individuals@gmail.comStay tuned!
Research and News Articles covering my research and referencing me throughout - 2008:
- Russian hacker 'militia' mobilizes to attack Georgia
- Fraudsters Target Facebook With Phishing Scam
- Fake Microsoft e-mail contains Trojan virus
- Hackers expand massive IFRAME attack to prime sites
- Hackers infiltrate Google searches
- Hackers expand massive IFrame attack to prime sites
- Hackers knocked Comcast.net offline
- Adobe investigates Flash Player attacks
- High-tech bank robbers phone it in
- Attackers booby-trap searches at top Web sites
- Carpet bombing networks in cyberspace
- Storm worm e-mail says U.S. attacked Iran
- India's underground CAPTCHA-breaking economy
- Domain Name Record Altered to Hack Comcast.net
- Google searchers could end up with a new type of bug
- Ongoing IFrame attack proving difficult to kill
- Hackers expand massive IFRAME attack to prime sites
- Danchev: The small pack Web malware exploitation kit
- Danchev: Massive SQL injection the Chinese way
- CAPTCHAs are dead - new research from Dancho Danchev confirms it
- Hackers infiltrate Google searches
- Massive faux-CNN spam blitz uses legit sites to deliver fake Flash
- Faked CNN spam blitz pushes fake Flash
- Danchev: Anti-fraud site DDOS attack
- Sony PlayStation site victim of SQL-injection attack
- Fake CNN Alert Still Spreading Malware
- Look Ma, I'm on CIA.gov
- Green Dam exploit in the wild
- “In gaz we trust”: a fake Russian energy company facilitating cybercrime
- Don’t pay your ransom via SMS
- NYT scareware scam linked to click fraud botnet
- Danchev: A crimeware developer's to-do list
- Danchev rained on my scareware campaign
- Is “aggregate-and-forget” the future of cyber-extortion?
- NYT scareware scam linked to click fraud botnet
- Microsoft declares war on 'scareware'
- Don’t pay your ransom via SMS
- Twitter warms up malware filter
- What's really the safest Web Browser?
- With Unrest in Iran, Cyber-attacks Begin
- Zeus bot found using Amazon's EC2 as C&C server
- Firefox add-on encrypts sessions with Facebook, Twitter
- Watch out for malware with those pretty Mac screensavers
- Months-old Skype vulnerability exploited in the wild
- Danchev: Money mule recruiters
- Cybercrime's bulletproof hosting exposed
- Malware Threatens to Sue BitTorrent Downloaders
- Firefox add-on encrypts sessions with Facebook, Twitter
- Chuck Norris Botnet Karate-chops Routers Hard
Research and News Articles covering my research and referencing me throughout - 2011:
- Kaspersky disputes McAfee's Shady Rat report
- Has EV-SSL Growth Been Slow?
- Report: Vishing Attack Targets Skype Users
Research and News Articles covering my research and referencing me throughout - 2012:
- Fake UPS notices deliver malware
- ZeuS/Zbot Trojan Spread Through Rogue US Airways Email
- New Skype malware threat reported: Poison Ivy
- Five Koobface botnet suspects named by New York Times
- Virtual jihad: How real is the threat?
- Is the death knell sounding for traditional antivirus?
- Can the Nuclear exploit kit dethrone Blackhole?
- Experts split over regulation for bounty-hunting bug sniffers
- Spammers Using Fake YouTube Notifications to Peddle Drugs
- Adele Bests Adderall As Affiliate Spammers Offer Music Downloads
- Bulgarian sleuth unveils botnet operators
- Fake PayPal Emails Distributing Malware
- Web Gang Operating in the Open
- ZeuS/Zbot Trojan Spread Through Rogue US Airways Email
- Buy 500 hacked Twitter accounts for less than a pint
- NBC.com Hacked, Infected With Citadel Trojan
Research and News Articles covering my research and referencing me throughout - 2013:
- How Much Does A Botnet Cost?
- Automated YouTube account generator offered to cyber crooks
- Upgraded Modular Malware Platform Released in Black Market
- Deconstructing the Al-Qassam Cyber Fighters Assault on US Banks
- NBC hack infects visitors in 'drive by' cyberattack
- Bitcoins are being traded for hack tools
- New DIY Google Dorks Based Hacking Tool Released
- Hacking The TDoS Attack
- Mass website hacking tool alerts to dangers of Google dorks
- Cybercrime service automates creation of fake scanned IDs
- Spammers unleash DIY phone number slurping web tool
- Spam email contains malware, not Apple gift card
- APT1, that scary cyber-Cold War gang: Not even China's best
- Mass website hacking tool alerts to dangers of Google dorks
- C&C PHP script for staging DDoS attacks sold on underground forums
- Russian Malware-as-a-Service Offers Up Server Rentals for $240 a Pop
- Java exploit kit sells for $40 per day
- Buggy DIY botnet tool leaks in black market
- New DIY Google Dorks Based Hacking Tool Released
- Botnets for rent, criminal services sold in the underground market
- Spam email contains malware, not Apple gift card
Tags:
Botnet,
Cyber Attack,
Cyber Espionage,
Cybercrime,
Information Security,
Malicious Software,
Security
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Comments (Atom)




