Wednesday, January 08, 2020

Subscribe today!

Dear blog readers,

Surprise, surprise. After a decent period of time while I was busy working on several high-profile personal projects I can finally let everyone know that I've just joined forces with team Box.sk the original owner of the infamous astalavista.box.sk search engine for cracks and serials and that I've launched a high-profile blog on the Box.sk domain including several high profile upcoming Hacking Security and Privacy projects.

How you can help? Bookmark the blog today and consider giving me a hand with building a high-profile Newsletter of friends and colleagues and blog readers by subscribing here.

Stay tuned!

Friday, December 27, 2019

Exposing High Tech Brazil Hack Team Mass Web Site Defacement Group - An OSINT Analysis

It's been a while since I've last posted on quality update further detailing the inner workings of a high-profile and prominent Web Site Defacement group that has managed to successfully compromise thousands of Web sites internationally that also includes Bulgaria's National Security Agency (DANS) - hxxp://dans.org Web site.

In this post I'll provide actionable intelligence including personally identifiable information on the people and the gang behind the campaign including an in-depth analysis of their tactics techniques and procedures including personal photos and social media accounts of the infamous High Tech Brazil Hack Team whose responsible for having successfully defaced over 5,000 legitimate Web Sites internationally.

Team Members Include:
- crazyduck - Real Name: Fabian de Souza Peralazzo
- otrasher - Email: Otrasher@live.com - Social Media Account - https://twitter.com/b1tchx_
- l34NDR0
- wicked
- live
- Smoker

Sample Photos of High Tech Brazil Hack Team Team Members:









































Twitter Social Media Accounts known to have participate in the campaign:
https://twitter.com/xFellipeCT
https://twitter.com/Kouback_TR_
https://twitter.com/b1tchx_
https://twitter.com/synchr0n1ze
https://twitter.com/aceeeeeeeer
https://twitter.com/HADESUnsekurity
https://twitter.com/slayer_owner
https://twitter.com/Whiskpentest
https://twitter.com/LulzSecRoot
https://twitter.com/unknown_br
https://twitter.com/Atena_Unknown
https://twitter.com/MandrivaL

Personally Identifiable Information on High Tech Brazil Hack Team Team Members:
  • synchr0n1ze
Real Name: Bruno Maglia

Facebook Account Profile: https://www.facebook.com/brunoaqnp ; https://www.facebook.com/brunao.maglia

Related Facebook Account Profiles: https://www.facebook.com/paulasouzzaa; https://www.facebook.com/francine.maglia - https://www.facebook.com/caio.favaratogalvao - https://www.facebook.com/keli.favarato - https://www.facebook.com/fabiano.galvao.18
  • aceeeeeeeer
Real Name: Gustavo Gemen
Personal Photos: http://imgur.com/zdRoh33 - http://imgur.com/mQfN8jk,49aNcs6,dCQYCgc,XPtKSAB ; http://imgur.com/eKWbZDn,lOiHr7A,HKu5Jw8; http://imgur.com/eKWbZDn,lOiHr7A,HKu5Jw8

Facebook Account Profile: https://facebook.com/gustavo.gemen

Related photos:
http://imgur.com/hZDJSNb,PXjcBsR
http://imgur.com/V6YuIBs,B6CgXKo
http://imgur.com/8wmqbGg,ZKUjM1Q,vKECfQf
http://imgur.com/GTliRuI,GLtvIZl,vfyAhuu

Related URLs:
https://www.youtube.com/channel/UCBgeuuT9sdFOOkFoGnt1p6w
https://koubacktr.wordpress.com/

I'll be soon posting an additional set of details on the High Tech Brazil Hack Team and I'll be definitely looking forward to sharing the necessary details with the Security Industry and Law Enforcement in an attempt to track down and prosecute the individuals behind these campaigns.

Stay tuned!

Monday, December 23, 2019

Happy Holidays!

Dear blog readers,

It's been a pleasure and an honor to serve your needs since December, 2005 when I've officially opened this blog while working as a Managing Director for Astalavista.com - The Underground and I sincerely hope that you'll continue to find my research informative and quality enough to further recommend my personal blog to friends and colleagues including to possibly approach me in terms of seeking additional information regarding a particular blog post or to actually "say hi" and "keep up the good fight" type of message.

My 2020 primary contact points include:

Personal Email - ddanchev@cryptogroup.net
Social Media Accounts - Twitter, LinkedIn, Facebook, Angellist, YouTube, Medium
IM and Skype ID: dancho_danchev_
Web properties that I'm currently running include - Offensive Warfare 2.0 and Unit-123.org
XMPP/OMEMO ID for Real-Time Conversation: 90184@armadillophone.com which is basically compatible with ChatSecure Conversations and Dino - feel free to install any of these applications in case you're not using them already and feel free to "say hi".

Happy holidays and thanks a lot for everyone who's been keeping in touch and keeping up the good fight!

Stay tuned!

Thursday, December 12, 2019

Announcing Law Enforcement and OSINT Intelligence Operation "Uncle George" - Join Me Today! - Part Two

Dear blog readers,

I wanted to let you know that I've been spending more time doing active Security Industry outreach in terms of the 2019 Cybercrime Forum Data Set and that I've already started working with several vendors in terms of possible OSINT enrichment and actual processing of the data.

Perfect timing to say thanks to Ilya Timchenko and McAfee for actually reaching out and managing to process the following artifacts from the actual Data Set which I've decided to publicly share with everyone who reaches out and expresses interest in working with me on the Data Set with the idea to possibly assist the Security Community and Law Enforcement in terms of tracking down the individuals behind these campaigns and actually shutting them down.

Possible Personally Identifiable Artifacts Found in the Actual Data Set Include:
Including the following massive update courtesy of me including all the publicly obtainable Email Addresses obtained from the 2019 Cybercrime Forum Data Set including all the publicly obtainable IP Addresses obtained from the 2019 Cybercrime Forum Data Set which appear to be mostly Socks4/Socks5 and publicly accessible compromised hosts used for "island-hopping" tactics.

I'll be posting an updated set of analysis and data regarding the currently ongoing Law Enforcement and OSINT Intelligence Operation "Uncle George" anytime soon.

Approach me at ddanchev@cryptogroup.net in case you're interested in working with me on this project or want to obtain access to the actual Data Set for possible OSINT enrichment and research purposes.

Stay tuned!

Announcing New Hacking Security and Hacktivism-Themed Online Forum Community! Join me Today!

 
Dear blog readers,

I've recently launched an extremely popular and comprehensive Hacking and Security possibly Hacktivism-Themed Online Forum Community called "Security is Futile" using the extremely popular PlushForums Platform consisting of over 193 Hacking and Security Topic Categories.

The initial idea behind launching the community is to spread data information and knowledge and to provoke discussion into various hot Hacking and Security topics including to solicit high-profile VIP Hacker and Security Experts to actually join the community and contribute with content.

Official "Security is Futile!" Hacking and Security Forum Community URL:
https://forums.offensive-warfare.com

Stay tuned!

Wednesday, December 04, 2019

g0t Bitcoin? - Part Two

Dear blog readers,

I wanted to let you know that I've recently changed to a permanent Dark Web Onion address - for my Cybertronics - Virtual Reality Social Network for Hackers and Security Experts where I'm currently soliciting Bitcoin donations for the purpose of launching the project in January, 2020.

Got Bitcoin? Consider visiting the Dark Web Onion and making a donation today and stay tuned for the upcoming updates and actual launch of the project in January, 2020 - http://lkzihepprlhxtvbutjedoazbsqd4avmifhpjms3zuq7itceiu4qajwad.onion/

Stay tuned!