Exposing China's "Thousand Talents Program" - An OSINT Analysis

April 29, 2021
China's "Thousand Talents Program" is known to be the country's one of the main sources for attempting to steal and lure foreign scientists into falling victim into a vast network of scientific research activities for foreign countries which in reality can fall victim to active counter-intelligence and intellectual and technological "know-how" exchange and stealing for the purpose of exchanging financial incentives.

In this post I'll discuss in-depth China's "Thousand Talents Program" and provide actionable intelligence on the actual recruitment practices.


Sample Shanghai Jiao Tong University Application Form:












Sample personal emails known to be currently recruiting for China's "Thousand Talents Program":
wangenvwanghy@nankai.edu.cn
liuliuweiwei@nankai.edu.cn
yangjiangyinan@nankai.edu.cn
nkyangjun@163.com
jiaotedacollege@nankai.edu.cn
xielsxyrs@nankai.edu.cn
dingxdzhang@nankai.edu.cn
haohaoyongwei@nankai.edu.cn
lanecojobs@nankai.edu.cn

Stay tuned!
Continue reading →

My Response to Ransomware! - An Analysis

0
April 29, 2021

Dear blog readers,

Worry about ransomware and its epidemic growth next to the hype of cryptoviral extortion which I originally predicted in my "Malware - Future Trends" paper circa 2006? Keep reading.

Part of an ongoing effort on my behalf using Technical Collection and continuing my series of posts exposing the activities of ransomware gangs I managed to take offline approximately 3,000 email addresses belonging to ransomware gangs and lone individuals using ransomware in direct cooperation with Protonmail and Tutanota's Abuse Departments.

Stay tuned!
Continue reading →

Astalavista.box.sk - Accepting Advertisers!

0
April 28, 2021
Dear blog readers,

As many of you know I've been officially running a high-profile security and hacking project on the original Astalavista.box.sk including the launch management and maintenance of one of the Web's most popular and high-traffic volume search engine for hackers and security experts where we're currently accepting advertisers and offering a pretty good advertising inventory in terms of traffic while we're offering a permanent banner and a text link for those who are interested.

Are you interested in advertising at one of the Web's most popular and high-traffic visited Web site for hackers and security experts since 1994 up to present day? Drop me a line at dancho.danchev@hush.com to discuss.
Continue reading →

Who Wants to Advertise?

0
April 28, 2021
Dear blog readers,

Since December, 2005 my personal blog is one of the security industry's most popular and high traffic visited security publications with hundreds of high-profile visitors on a daily basis.

I'm currently offering and accepting serious advertising offers for permanent banner and a text link placement on my blog from vendors oflr organizations in this space where I can offer a pretty decent and good advertising inventory in terms of traffic and we can sign a monthly or yearly traffic acquisition and brand exposure agreement for your vendor or organization.

Are you interested? Drop me a line at dancho.danchev@hush.com to discuss.




Continue reading →

Dancho Danchev's Cybercrime Forum Data Set for 2021 - An Update

0
April 28, 2021
Dear blog readers. This is Dancho and I've decided to issue an update in terms of my previous post and say big thanks to everyone who expressed interest in my Cybercrime Forum Data Set for 2021. I'm currently busy catching up and sending direct download links to everyone who expressed interest in obtaining it for research purposes.

Stay tuned!
Continue reading →

Podcast With me for WhoisXML API!

0
April 27, 2021

 

Dear blog readers,

I wanted to let everyone know that my first podcast recording with WhoisXML API where I currently work as a DNS Threat Researcher is currently live here.

Enjoy!

Continue reading →

My First Research Paper for WhoisXML API is now Live!

0
April 27, 2021

Dear blog readers,

This is Dancho and I wanted to let everyone know that my first research paper for WhoisXML API is now live here. Long story short it's an investigation of a bulletproof hosting provider that's currently hosting an E-Shop for stolen credit cards information.

Stay tuned!
Continue reading →

Exposing the Pay Per Install Underground Business Model – Historical OSINT - An Analysis - 2008 - Part Two

0
April 27, 2021

In my previous analysis on the pay per install underground market business model I elaborated more on the actual business model using a variety of images which I've collected over the years to showcase the business model sticking to the usual "an image is worth a thousand words" methodology.

In this post I've decided to continue the series and offer an additional exclusive peek inside the cybercrime ecosystem pay per install underground market business model including to discuss in-depth the tactics techniques and procedures of the cybercriminals behind these campaigns.

Sample screenshots of various pay per install business franchises throughout the years in particular circa 2008:















































Stay tuned!
Continue reading →