Dear blog readers,
Surprise, surprise. After a decent period of time while I was busy working on several high-profile personal projects I can finally let everyone know that I've just joined forces with team Box.sk the original owner of the infamous astalavista.box.sk search engine for cracks and serials and that I've launched a high-profile blog on the Box.sk domain including several high profile upcoming Hacking Security and Privacy projects.
How you can help? Bookmark the blog today and consider giving me a hand with building a high-profile Newsletter of friends and colleagues and blog readers by subscribing here.
Stay tuned!
In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude
Wednesday, January 08, 2020
Subscribe today!
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Friday, December 27, 2019
Exposing High Tech Brazil Hack Team Mass Web Site Defacement Group - An OSINT Analysis
It's been a while since I've last posted on quality update further detailing the inner workings of a high-profile and prominent Web Site Defacement group that has managed to successfully compromise thousands of Web sites internationally that also includes Bulgaria's National Security Agency (DANS) - hxxp://dans.org Web site.
In this post I'll provide actionable intelligence including personally identifiable information on the people and the gang behind the campaign including an in-depth analysis of their tactics techniques and procedures including personal photos and social media accounts of the infamous High Tech Brazil Hack Team whose responsible for having successfully defaced over 5,000 legitimate Web Sites internationally.
Team Members Include:
- crazyduck - Real Name: Fabian de Souza Peralazzo
- otrasher - Email: Otrasher@live.com - Social Media Account - https://twitter.com/b1tchx_
- l34NDR0
- wicked
- live
- Smoker
Sample Photos of High Tech Brazil Hack Team Team Members:
Twitter Social Media Accounts known to have participate in the campaign:
https://twitter.com/xFellipeCT
https://twitter.com/Kouback_TR_
https://twitter.com/b1tchx_
https://twitter.com/synchr0n1ze
https://twitter.com/aceeeeeeeer
https://twitter.com/HADESUnsekurity
https://twitter.com/slayer_owner
https://twitter.com/Whiskpentest
https://twitter.com/LulzSecRoot
https://twitter.com/unknown_br
https://twitter.com/Atena_Unknown
https://twitter.com/MandrivaL
Personally Identifiable Information on High Tech Brazil Hack Team Team Members:
Facebook Account Profile: https://www.facebook.com/brunoaqnp ; https://www.facebook.com/brunao.maglia
Related Facebook Account Profiles: https://www.facebook.com/paulasouzzaa; https://www.facebook.com/francine.maglia - https://www.facebook.com/caio.favaratogalvao - https://www.facebook.com/keli.favarato - https://www.facebook.com/fabiano.galvao.18
Personal Photos: http://imgur.com/zdRoh33 - http://imgur.com/mQfN8jk,49aNcs6,dCQYCgc,XPtKSAB ; http://imgur.com/eKWbZDn,lOiHr7A,HKu5Jw8; http://imgur.com/eKWbZDn,lOiHr7A,HKu5Jw8
Facebook Account Profile: https://facebook.com/gustavo.gemen
Related photos:
http://imgur.com/hZDJSNb,PXjcBsR
http://imgur.com/V6YuIBs,B6CgXKo
http://imgur.com/8wmqbGg,ZKUjM1Q,vKECfQf
http://imgur.com/GTliRuI,GLtvIZl,vfyAhuu
Related URLs:
https://www.youtube.com/channel/UCBgeuuT9sdFOOkFoGnt1p6w
https://koubacktr.wordpress.com/
I'll be soon posting an additional set of details on the High Tech Brazil Hack Team and I'll be definitely looking forward to sharing the necessary details with the Security Industry and Law Enforcement in an attempt to track down and prosecute the individuals behind these campaigns.
Stay tuned!
In this post I'll provide actionable intelligence including personally identifiable information on the people and the gang behind the campaign including an in-depth analysis of their tactics techniques and procedures including personal photos and social media accounts of the infamous High Tech Brazil Hack Team whose responsible for having successfully defaced over 5,000 legitimate Web Sites internationally.
Team Members Include:
- crazyduck - Real Name: Fabian de Souza Peralazzo
- otrasher - Email: Otrasher@live.com - Social Media Account - https://twitter.com/b1tchx_
- l34NDR0
- wicked
- live
- Smoker
Sample Photos of High Tech Brazil Hack Team Team Members:
Twitter Social Media Accounts known to have participate in the campaign:
https://twitter.com/xFellipeCT
https://twitter.com/Kouback_TR_
https://twitter.com/b1tchx_
https://twitter.com/synchr0n1ze
https://twitter.com/aceeeeeeeer
https://twitter.com/HADESUnsekurity
https://twitter.com/slayer_owner
https://twitter.com/Whiskpentest
https://twitter.com/LulzSecRoot
https://twitter.com/unknown_br
https://twitter.com/Atena_Unknown
https://twitter.com/MandrivaL
Personally Identifiable Information on High Tech Brazil Hack Team Team Members:
- synchr0n1ze
Facebook Account Profile: https://www.facebook.com/brunoaqnp ; https://www.facebook.com/brunao.maglia
Related Facebook Account Profiles: https://www.facebook.com/paulasouzzaa; https://www.facebook.com/francine.maglia - https://www.facebook.com/caio.favaratogalvao - https://www.facebook.com/keli.favarato - https://www.facebook.com/fabiano.galvao.18
- aceeeeeeeer
Personal Photos: http://imgur.com/zdRoh33 - http://imgur.com/mQfN8jk,49aNcs6,dCQYCgc,XPtKSAB ; http://imgur.com/eKWbZDn,lOiHr7A,HKu5Jw8; http://imgur.com/eKWbZDn,lOiHr7A,HKu5Jw8
Facebook Account Profile: https://facebook.com/gustavo.gemen
Related photos:
http://imgur.com/hZDJSNb,PXjcBsR
http://imgur.com/V6YuIBs,B6CgXKo
http://imgur.com/8wmqbGg,ZKUjM1Q,vKECfQf
http://imgur.com/GTliRuI,GLtvIZl,vfyAhuu
Related URLs:
https://www.youtube.com/channel/UCBgeuuT9sdFOOkFoGnt1p6w
https://koubacktr.wordpress.com/
I'll be soon posting an additional set of details on the High Tech Brazil Hack Team and I'll be definitely looking forward to sharing the necessary details with the Security Industry and Law Enforcement in an attempt to track down and prosecute the individuals behind these campaigns.
Stay tuned!
Tags:
Cybercrime,
Data Breach,
High Tech Brazil Hack Team,
Information Security,
Mass Web Site Defacement,
OSINT,
Security,
Threat Intelligence,
Web Site Defacement
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Monday, December 23, 2019
Happy Holidays!
Dear blog readers,
It's been a pleasure and an honor to serve your needs since December, 2005 when I've officially opened this blog while working as a Managing Director for Astalavista.com - The Underground and I sincerely hope that you'll continue to find my research informative and quality enough to further recommend my personal blog to friends and colleagues including to possibly approach me in terms of seeking additional information regarding a particular blog post or to actually "say hi" and "keep up the good fight" type of message.
My 2020 primary contact points include:
Personal Email - ddanchev@cryptogroup.net
Social Media Accounts - Twitter, LinkedIn, Facebook, Angellist, YouTube, Medium
IM and Skype ID: dancho_danchev_
Web properties that I'm currently running include - Offensive Warfare 2.0 and Unit-123.org
XMPP/OMEMO ID for Real-Time Conversation: 90184@armadillophone.com which is basically compatible with ChatSecure Conversations and Dino - feel free to install any of these applications in case you're not using them already and feel free to "say hi".
Happy holidays and thanks a lot for everyone who's been keeping in touch and keeping up the good fight!
Stay tuned!
It's been a pleasure and an honor to serve your needs since December, 2005 when I've officially opened this blog while working as a Managing Director for Astalavista.com - The Underground and I sincerely hope that you'll continue to find my research informative and quality enough to further recommend my personal blog to friends and colleagues including to possibly approach me in terms of seeking additional information regarding a particular blog post or to actually "say hi" and "keep up the good fight" type of message.
My 2020 primary contact points include:
Personal Email - ddanchev@cryptogroup.net
Social Media Accounts - Twitter, LinkedIn, Facebook, Angellist, YouTube, Medium
IM and Skype ID: dancho_danchev_
Web properties that I'm currently running include - Offensive Warfare 2.0 and Unit-123.org
XMPP/OMEMO ID for Real-Time Conversation: 90184@armadillophone.com which is basically compatible with ChatSecure Conversations and Dino - feel free to install any of these applications in case you're not using them already and feel free to "say hi".
Happy holidays and thanks a lot for everyone who's been keeping in touch and keeping up the good fight!
Stay tuned!
Tags:
Botnet,
Cyber Espionage,
Cyber Jihad,
Cyber Warfare,
Information Security,
Information Warfare,
Malicious Software,
Security
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Thursday, December 12, 2019
Announcing Law Enforcement and OSINT Intelligence Operation "Uncle George" - Join Me Today! - Part Two
Dear blog readers,
I wanted to let you know that I've been spending more time doing active Security Industry outreach in terms of the 2019 Cybercrime Forum Data Set and that I've already started working with several vendors in terms of possible OSINT enrichment and actual processing of the data.
Perfect timing to say thanks to Ilya Timchenko and McAfee for actually reaching out and managing to process the following artifacts from the actual Data Set which I've decided to publicly share with everyone who reaches out and expresses interest in working with me on the Data Set with the idea to possibly assist the Security Community and Law Enforcement in terms of tracking down the individuals behind these campaigns and actually shutting them down.
Possible Personally Identifiable Artifacts Found in the Actual Data Set Include:
I'll be posting an updated set of analysis and data regarding the currently ongoing Law Enforcement and OSINT Intelligence Operation "Uncle George" anytime soon.
Approach me at ddanchev@cryptogroup.net in case you're interested in working with me on this project or want to obtain access to the actual Data Set for possible OSINT enrichment and research purposes.
Stay tuned!
I wanted to let you know that I've been spending more time doing active Security Industry outreach in terms of the 2019 Cybercrime Forum Data Set and that I've already started working with several vendors in terms of possible OSINT enrichment and actual processing of the data.
Perfect timing to say thanks to Ilya Timchenko and McAfee for actually reaching out and managing to process the following artifacts from the actual Data Set which I've decided to publicly share with everyone who reaches out and expresses interest in working with me on the Data Set with the idea to possibly assist the Security Community and Law Enforcement in terms of tracking down the individuals behind these campaigns and actually shutting them down.
Possible Personally Identifiable Artifacts Found in the Actual Data Set Include:
- Cybercriminal Cryptocurrency Addressess
- Cybercriminal Emails
- Cybercriminal ICQ Numbers
- Cybercriminal Phone Numbers
- Cybercriminal QQ IDs
- Cybercriminal Telegram IDs/Telegram IDs
- Cybercriminal Dark Web Onion Addresses
- Cybercriminal Viber Accounts
- Cybercriminal VK Accounts
- Cybercriminal XMPP Accounts
I'll be posting an updated set of analysis and data regarding the currently ongoing Law Enforcement and OSINT Intelligence Operation "Uncle George" anytime soon.
Approach me at ddanchev@cryptogroup.net in case you're interested in working with me on this project or want to obtain access to the actual Data Set for possible OSINT enrichment and research purposes.
Stay tuned!
Tags:
Botnet,
Cyber Espionage,
Cybercrime,
Information Security,
Law Enforcement,
Malicious Software,
McAfee,
Operation Uncle George,
OSINT,
Security,
Threat Intelligence
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Announcing New Hacking Security and Hacktivism-Themed Online Forum Community! Join me Today!
Dear blog readers,
I've recently launched an extremely popular and comprehensive Hacking and Security possibly Hacktivism-Themed Online Forum Community called "Security is Futile" using the extremely popular PlushForums Platform consisting of over 193 Hacking and Security Topic Categories.
The initial idea behind launching the community is to spread data information and knowledge and to provoke discussion into various hot Hacking and Security topics including to solicit high-profile VIP Hacker and Security Experts to actually join the community and contribute with content.
Official "Security is Futile!" Hacking and Security Forum Community URL:
https://forums.offensive-warfare.com
Stay tuned!
Tags:
Cyber Warfare,
Hacking Forum,
Information Security,
Information Security Forum,
Information Warfare,
PlushForums,
Security,
Security Forum
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Wednesday, December 04, 2019
g0t Bitcoin? - Part Two
Dear blog readers,I wanted to let you know that I've recently changed to a permanent Dark Web Onion address - for my Cybertronics - Virtual Reality Social Network for Hackers and Security Experts where I'm currently soliciting Bitcoin donations for the purpose of launching the project in January, 2020.
Got Bitcoin? Consider visiting the Dark Web Onion and making a donation today and stay tuned for the upcoming updates and actual launch of the project in January, 2020 - http://lkzihepprlhxtvbutjedoazbsqd4avmifhpjms3zuq7itceiu4qajwad.onion/
Stay tuned!
Tags:
Cybertronics,
Dark Web,
Dark Web Onion,
Information Security,
Security,
Virtual Reality,
Virtual Reality Social Network,
Virtual World
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Comments (Atom)












































