Historical OSINT - An Analysis of the South Korean/U.S DDoS Attacks Circa 2009

0
July 09, 2021

 During the last couple of days, I was getting harder to resist not publishing some of literally moronic commentary on the DDos attacks, thankfully not made

by people I know in person or virtually. From the "we know they did it but we don't have data to prove it", to the very latest and most disturbing commment

by a U.S intelligence


Why disturbing? Because that's exactly what the person -- controversial to the common wisdom you don't need a team to launch this old school amateur-ish http

request flooder -- 

Key summary points:

- if such a small botnet with such a noisy and amateur-ish request flooder can shutdown the U.S FCC for days, I wonder what would have happened to the rest

of the sites in the target list if the size of the botnet and sophistication of DDoS techniques improved


Let me continue in this line of thought - or they secretly brainwash the Teletubies and infiltirate he hearts and minds of children across the globe, a future

generation of pro-North Korean youngerts. Or they could secretly become a Russian Business Network franchise, now try sending an abuse notice to the non-existent

North Korean ISPs. They could, 



The Web is abuzz with news reports regarding the ongoing DDoS (distributed denial of service attack)


The attacks which originally took off in the 4th of July weekend, target 26 Sourth Korean and American government sites and financial institutions.




The W32.Dozer comes in the form of an email attachment


Upon execution the trojan attempts to download the list of targets from three apparently compromised servers based in Germany, the U.S and Austria.



213.23.243.210 - Mannesmann Arcor Telecommunications AG & Co

216.199.83.203 - FDN.com 

213.33.116.41 - Telekom Austria Aktiengesellschaft


75.151.32.182


92.63.2.118

75.151.32.182

202.14.70.116

201.116.58.131

200.6.218.194

163.19.209.22

122.155.5.196

newrozfm.com

text string “get/China/DNS

The word china within the malware code, the

http://www.virustotal.com/analisis/7dee2bd4e317d12c9a2923d0531526822cfd37eabfd7aecc74258bb4f2d3a643-1247001891

http://www.virustotal.com/analisis/1d1814e2096d0ec88bde0c0c5122f1d07d10ca743ec5d1a3c94a227d288f05a7-1246990042

http://www.virustotal.com/analisis/7c6c89b7a7c31bcb492a581dfb6c52d09dffca9107b8fd25991c708a0069625f-1246990249

http://www.virustotal.com/analisis/f9feee6ebbc3dc0d35eea8bf00fc96cf075d59588621b0132b423a4bbf4427d4-1247006555

Continue reading →

Thanks, But no Thanks!

0
July 06, 2021

Dear blog readers,

Following a series of successful data mining and OSINT enrichment successes in the face of OSINT and Law Enforcement operation called "Uncle George" including my recent attempt to take down approximately 3,000 ransomware emails which was quite a success including the recent and ongoing publication of various compilations of currently active high-profile cybercriminal email addresses and XMPP/Jabber accounts I had the privilege to get several of my blog posts censored and basically taken offline courtesy of Google which is actually good news in the face of the basic news that I'm currently sitting have been and will continue to be sitting on a treasure trove of threat intelligence and cyber attack attribution information on current and emerging cyber threats including to get actual legal threats from various individuals who appear to have been busy closing down their Twitter and Facebook accounts including LinkedIn accounts meaning quite a success for the actual data mining and technical collection process where the ultimate goal here would be to assist U.S Law Enforcement and the U.S Intelligence Community on its way to track down and prosecute the cybercriminals.

Who wants to rock the boat with me? Request an invite-only reader access today! Sharing is caring.

Are you a long-time reader of this blog? Are you basically fascinated by the richness and the informative content on current and emerging cyber threats? Do you want to get a private invite-only reader access to keep me motivated? Sharing is caring. Consider sending an introduction message to dancho.danchev@hush.com including your current position and motivation for reading this blog how has it helped you including a copy of your CV for the purpose of getting invite-only private access that would greatly motivate me to produce high-quality and never published content before in an invite-only fashion.






Therefore after approximately 12 years of active one-man operation running one of the security industry's leading security publications which is my personal blog which I originally launched in December, 2005 when I was working on https://astalavista.com while I was studying in the Netherlands I've decided that the time has come to find an alternative medium to communicate the treasure trove of threat intelligence and OSINT information that I'm currently sitting on and have been sitting on throughout the past decade with the idea to show and present the crown jewels of my research to basically any sort of vetted and trusted client who's interested in my research and proven methodology for fighting and disrupting the bad guys in a systematic and efficient way throughout the past decade.

It's been a privilege and an honor to serve everyone's needs for approximately 12 years as an independent contractor running this blog where I've actually had the chance to meet and actually get to know some of the security industry's leading companies and actual folks working within the security industry and it will continue to be a privilege and an honor to know and work with them in the future.



What's next? Always feel free to approach me at my dancho.danchev@hush.com where you can direct your "keep up the good work" "keep it cool" and "keep up the good spirit" including to actually inquire about my expertise and how I can jump on board on your cybercrime research and threat intelligence including OSINT research and analysis project in terms of fighting cybercrime.











Awesome. 
Check this out in terms of my disappearance and possible kidnapping courtesy of Bulgaria's Law Enforcement in the form of an illegal arrest using a stolen ID from my place and actual home molestation courtesy of local police officers who basically escorted me and held me in another town for a period of couple of months.




















Related resources:
https://twitter.com/ykolev
https://twitter.com/dansbg
https://twitter.com/bo_go
https://twitter.com/tstsvetanov/status/6051397340
https://web.archive.org/web/20091130172926/https://twitter.com/dansbg
https://web.archive.org/web/20100818222802/http://twitter.com/boiko
https://web.archive.org/web/20090523162911/http://twitter.com/sergeystanishev
https://web.archive.org/web/20091110153835/http://twitter.com/bo_go
https://twitter.com/georgeparvanov/status/93951503504654336
https://search.wikileaks.org/?query=yavor+kolev&exact_phrase=&any_of=&exclude_words=&document_date_start=&document_date_end=&released_date_start=&released_date_end=&include_external_sources=True&new_search=True&order_by=most_relevant#results
https://ddanchev.blogspot.com/2020/07/dancho-danchevs-disappearance-2010.html
https://ddanchev.blogspot.com/2019/11/dancho-danchevs-disappearance-2010.html
https://ddanchev.blogspot.com/2021/02/dancho-danchevs-disappearance-2010.html
https://ddanchev.blogspot.com/2019/04/dancho-danchevs-2010-disappearance.html
https://ddanchev.blogspot.com/2021/03/dancho-danchevs-disappearance-2010.html
https://ddanchev.blogspot.com/2020/12/how-i-got-robbed-and-beaten-and.html

God bless and let's don't forget about the rest!
Continue reading →

My Memoir - Accepting Research Questions!

0
July 05, 2021

Dear blog readers,

I wanted to share with everyone the fact that I've started working on a high-profile personal memoir which basically encompasses a period of over 20 years in the field of computer and information security including the infamous Web 2.0 transition including my current career success and experienced in the world of security blogging cybercrime research and threat intelligence gathering up to present day.

I also wanted to let you know that there will be a lot of bonus content including never-published before personal account type of research activity and the true story that took place throughout the 90's in the world of hacking and computer security where I was a teenage hacker enthusiast today's leading expert in the field of security blogging cybercrime research and threat intelligence gathering.

My request? I'm currently accepting research and interview questions from my blog readers which I could properly answer and present in the form of book chapters where necessary in terms of my experience as a teenage hacker enthusiast including my current position as a leading expert in the field of cybercrime research and threat intelligence gathering.

Here are some sample research questions which you could direct to me for the purpose of assisting me on my way to write and finish the memoir.

Continue reading →