MENU
last data update: 1969/12/31, 16:00
Website loading time
during the test: 2.23 s
cable connection (average): 2.75 s
DSL connection (average): 3.27 s
modem (average): 30.81 s
HTTP headers
HTTP/1.0 200 OK
Content-Type: text/html; charset=UTF-8
Expires: Sat, 15 Oct 2011 20:48:05 GMT
Date: Sat, 15 Oct 2011 20:48:05 GMT
Cache-Control: private, max-age=0
Last-Modified: Sun, 09 Oct 2011 17:55:40 GMT
ETag: "dd3ddc93-408d-4918-a3fe-871a66ac39d8"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Information about DNS servers
ddanchev.blogspot.com | CNAME | blogspot.l.google.com | IN | 3600 |
Received from the first DNS server
Request to the server "ddanchev.blogspot.com"
You used the following DNS server:
DNS Name: ns4.monikerdns.net
DNS Server Address: 50.57.11.88#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 28056
flag: qr aa rd REQUEST: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 4
REQUEST SECTION:
ddanchev.blogspot.com. IN ANY
ANSWER SECTION:
ddanchev.blogspot.com. 600 IN A 208.73.210.48
AUTHORITY SECTION:
blogspot.com. 600 IN NS ns1.monikerdns.net.
blogspot.com. 600 IN NS ns4.monikerdns.net.
blogspot.com. 600 IN NS ns2.monikerdns.net.
blogspot.com. 600 IN NS ns3.monikerdns.net.
SECTION NOTES:
ns1.monikerdns.net. 28800 IN A 208.73.210.41
ns2.monikerdns.net. 28800 IN A 208.73.211.42
ns3.monikerdns.net. 28800 IN A 50.57.11.89
ns4.monikerdns.net. 28800 IN A 50.57.11.88
Received 205 bytes from address 50.57.11.88#53 in 43 ms
Received from the second DNS server
Request to the server "ddanchev.blogspot.com"
You used the following DNS server:
DNS Name: ns2.monikerdns.net
DNS Server Address: 208.73.211.42#53
DNS server aliases:
HEADER opcode: REQUEST, status: NOERROR, id: 9345
flag: qr aa rd REQUEST: 1, ANSWER: 1, AUTHORITY: 4, ADDITIONAL: 4
REQUEST SECTION:
ddanchev.blogspot.com. IN ANY
ANSWER SECTION:
ddanchev.blogspot.com. 600 IN A 208.73.210.48
AUTHORITY SECTION:
blogspot.com. 600 IN NS ns4.monikerdns.net.
blogspot.com. 600 IN NS ns1.monikerdns.net.
blogspot.com. 600 IN NS ns2.monikerdns.net.
blogspot.com. 600 IN NS ns3.monikerdns.net.
SECTION NOTES:
ns1.monikerdns.net. 28800 IN A 208.73.210.41
ns2.monikerdns.net. 28800 IN A 208.73.211.42
ns3.monikerdns.net. 28800 IN A 50.57.11.89
ns4.monikerdns.net. 28800 IN A 50.57.11.88
Received 205 bytes from address 208.73.211.42#53 in 78 ms
Subdomains (the first 50)
Typos (misspells)
sdanchev.blogspot.com xdanchev.blogspot.com cdanchev.blogspot.com fdanchev.blogspot.com rdanchev.blogspot.com edanchev.blogspot.com dsanchev.blogspot.com dxanchev.blogspot.com dcanchev.blogspot.com dfanchev.blogspot.com dranchev.blogspot.com deanchev.blogspot.com ddznchev.blogspot.com ddsnchev.blogspot.com ddwnchev.blogspot.com ddqnchev.blogspot.com ddabchev.blogspot.com ddamchev.blogspot.com ddajchev.blogspot.com ddahchev.blogspot.com ddanxhev.blogspot.com | ddanvhev.blogspot.com ddanfhev.blogspot.com ddandhev.blogspot.com ddancgev.blogspot.com ddancbev.blogspot.com ddancnev.blogspot.com ddancjev.blogspot.com ddancuev.blogspot.com ddancyev.blogspot.com ddanchwv.blogspot.com ddanchsv.blogspot.com ddanchdv.blogspot.com ddanchrv.blogspot.com ddanch4v.blogspot.com ddanch3v.blogspot.com ddanchec.blogspot.com ddancheb.blogspot.com ddancheg.blogspot.com ddanchef.blogspot.com danchev.blogspot.com danchev.blogspot.com | ddnchev.blogspot.com ddachev.blogspot.com ddanhev.blogspot.com ddancev.blogspot.com ddanchv.blogspot.com ddanche.blogspot.com ddanchev.blogspot.com dadnchev.blogspot.com ddnachev.blogspot.com ddacnhev.blogspot.com ddanhcev.blogspot.com ddancehv.blogspot.com ddanchve.blogspot.com dddanchev.blogspot.com dddanchev.blogspot.com ddaanchev.blogspot.com ddannchev.blogspot.com ddancchev.blogspot.com ddanchhev.blogspot.com ddancheev.blogspot.com ddanchevv.blogspot.com |
Location
IP: 209.85.175.132
continent: NA, country: United States (USA), city: Mountain View
Website value
rank in the traffic statistics:
There is not enough data to estimate website value.
Basic information
website build using CSS
code weight: 200.08 KB
text per all code ratio: 30 %
title: Dancho Danchev's Blog - Mind Streams of Information Security Knowledge
description:
keywords:
encoding: UTF-8
language: en
Website code analysis
one word phrases repeated minimum three times
Phrase | Quantity |
---|---|
and | 5 |
the | 4 |
of | 4 |
to | 3 |
two word phrases repeated minimum three times
three word phrases repeated minimum three times
B tags
Spamvertised message:
TrojanDownloader:Win32/Dofoil.D
falcononfly2006.ru/blog/task.php?bid=2bfc680038ba2be7&os=5-1-2600&uptime=0&rnd=150156
falcononfly2006.ru
diamondexchange2011.ruphilippinemoney2011.ruBedownloader2011.rudolcekomarenoro2011.ruforsalga102.rurunescapegpge2011.ruyomwarayom2001.ruphilippinemoney2011.rumoneymgmt2011.rumoneykeep2011.rufirewallmakeover.ruczechmoney2011.rucommunityspace2911.rubrazilianmoney2011.r
.
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
Spamvertised body:
Spamvertised attachments:
Detection rate:
onemoretimehi.ru/piety.exe
onemoretimehi.ru/ftp/g.php
piety.exe
onemoretimehi.ru/tops.exe
personal RSS feed
Zero Day's main feed
01.
02.
03.
04.
05.
06.
07.
08.
09.
10.
11.
12.
13.
14.
15.
spamvertised Uniform Traffic Tickets
FDIC Notification
_Uniform Traffic Tickets
Detection rates:
Gen:Trojan.Heur.FU.bqW@aK9ebrii
MD5 : 6361d4a40485345c18473f3c6b4b6609SHA1 : 50b09bb2e0044aa139a84c2e445a56f01d70c185SHA256: ca67a14bfed2a7bc2ac8be9c01cb17d5da12b75320b4bad4fe8d8a6759ad9725Ticket1.exe - Trojan-Downloader.Win32.Small.ccxz
sdkjgndfjnf.ru/pusk3.exe
rattsillis.com/ftp/g.php
rattsillis.com/pusk3.exe
DNS emulation of ns1.lemanbrostm.info
belidiskalom.com
lemanbrostm.info
Known MD5 modifications for pusk3.exe at rattsillis.com:
rattsillis.com/blood.exe
rattsillis.com/pusk.exe
rattsillis.com/pusk2.exe
Known MD5 modifications for pusk3.exe at sdkjgndfjnf.ru
sdkjgndfjnf.ru/blood.exe
sdkjgndfjnf.ru/pusk2.exe
sdkjgndfjnf.ru/pusk.exe
Detection rate for blood.exe:
Trojan-Spy.Win32.Zbot
_FDIC Notification
rattsillis.com
spamvertised ACH Payment Canceled campaign
Tracking Down Internet Terrorist Propaganda
Arabic Extremist Group Forum Messages' Characteristics
Cyber Terrorism Communications and Propaganda
A Cost-Benefit Analysis of Cyber Terrorism
Current State of Internet Jihad
Analysis of the Technical Mujahid - Issue One
Full List of Hezbollah's Internet Sites
Steganography and Cyber Terrorism Communications
Hezbollah's DNS Service Providers from 1998 to 2006
Mujahideen Secrets Encryption Tool
Analyses of Cyber Jihadist Forums and Blogs
Cyber Traps for Wannabe Jihadists
Inshallahshaheed - Come Out, Come Out Wherever You Are
GIMF Switching Blogs
GIMF Now Permanently Shut Down
GIMF - "We Will Remain"
Wisdom of the Anti Cyber Jihadist Crowd
Cyber Jihadist Blogs Switching Locations Again
Electronic Jihad v3.0 - What Cyber Jihad Isn't
Electronic Jihad's Targets List
Teaching Cyber Jihadists How to Hack
A Botnet of Infected Terrorists?
Infecting Terrorist Suspects with Malware
The Dark Web and Cyber Jihad
Cyber Jihadist Hacking Teams
Two Cyber Jihadist Blogs Now Offline
Characteristics of Islamist Websites
An Analysis of the Technical Mujahid - Issue Two
Terrorist Groups' Brand Identities
A List of Terrorists' Blogs
Jihadists' Anonymous Internet Surfing Preferences
Sampling Jihadists' IPs
Cyber Jihadists' and TOR
A Cyber Jihadist DoS Tool
Mujahideen Secrets 2 Encryption Tool Released
Terror on the Internet - Conflict of Interest
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
Keeping Money Mule Recruiters on a Short Leash series
ACWOODE-GROUP.COM
ACWOODE-GROUP.NET
ART-GAPSON.COM
CONDOR-LLC-UK.NET
CONDORLLC-UK.COM
DE-DVFGROUP.BE
ELENTY-CO.NET
ELENTY-LLC.COM
fabia-art.com
fine-artgroup.com
GAPSONART.NET
gmd-contracting.com
GURU-GROUP.CC
GURU-GROUP.NET
INTECHTODEX-GROUP.COM
ltd-scg.net
NARTEN-ART.COM
NARTENART.NET
panart-llc.com
REFINEMENT-ANTIQUE.COM
REFINEMENTUK-LTD.NET
SKYLINE-ANTIQUE.COM
SKYLINE-LTD.NET
techce-group.com
TODEX-GROUP.NET
triad-webs.com
AS24940
AS16265
AS26496
AS10297
NS1.MKNS.SU
NS2.MKNS.SU
NS3.MKNS.SU
NS1.MNAMEDL.SU
NS2.MNAMEDL.SU
NS3.MNAMEDL.SU
NS1.MLDNS.SU
NS2.MLDNS.SU
NS3.MLDNS.SU
NS1.NAMESUKNS.CC
NS2.NAMESUKNS.CC
NS3.NAMESUKNS.CC
NS1.NAMEUK.AT
NS2.NAMEUK.AT
NS3.NAMEUK.AT
NS1.UKDNSTART.NET
NS2.UKDNSTART.NET
NS3.UKDNSTART.NET
Related posts:
This post has been reproduced from Dancho Danchev's blog.
_Dragon Pack Web Malware Exploitation Kit
_Dragon Exploit Pack
_Katrin Exploit Pack
_Liberty Exploit Pack
_Bleeding Life Exploit Pack
ART-GROUPINTEGRETED.COM
ARTINTEGRATED-GROUP.NET
COMPLETE-ART-GROUP-LTD.COM
COMPLETE-ART-UK.NET
CONTEMP-USAINC.COM
CONTEMP-USGROUP.COM
DE-KADEGROUP.CC
DERWOODE-GROUP.CC
GLACIS-GROUPUK.NET
INTEGRATED-EUROPE-IT.NET
ITAGROUP-USA.NET
IT-ANALISYS.COM
ITANALYSISGROUP.NET
KADE-GROUPDE.NET
MASTERARTUSA.COM
quad-groupuk.cc
SCAR-BEIINC.COM
SMARTLLC-UK.COM
SMART-LLC-UK.NET
SPECIAL-ARTUK.COM
SUBLIMELTD.COM
NS1.DNSUS.SU
NS2.DNSUS.SU
NS3.DNSUS.SU
NS1.NAMEUSNS.SU
NS2.NAMEUSNS.SU
NS3.NAMEUSNS.SU
NS1.USDENNS.SU
NS2.USDENNS.SU
NS3.USDENNS.SU
NS1.DENDRUYOS.NET
NS2.DENDRUYOS.NET
NS3.DENDRUYOS.NET
NS1.DEDNSAUTH.NET
NS2.DEDNSAUTH.NET
NS3.DEDNSAUTH.NET
NS1.DELTOPOOR.AT
NS2.DELTOPOOR.AT
NS3.DELTOPOOR.AT
AS42708
AS29713
AS38913
ATLANTALTD-UK.CC
ATLANTA-LTD-UK.NET
3ATLANTA-UK.COM
BLITZNET-GROUPINC.CC
5DALI-STYLE.COM
DALISTYLE-GROUP.CC
DERWOODE-GROUP.COM
DERWOODE-GROUP.NET
GLACIS-GROUPLLC.COM
1GLACISGROUP-LLC.NET
IT-AMIRA.NET
ITAMIRA-DE.COM
ITSERV-DE.CO
IT-SERVICELTD.BE
KADE-GROUP.COM
MASTERART-GROUP.COM
MENDRYLTD.COM
MENZEL-GROUP.TV
MITISSANSERVICE-GROUP-LTD.CC
MITISSANSERVICEGROUP-LTD.COM
oregonltd-uk.cc
PARLEN-GROUPLLC.COM
PARLENGROUPLLC.NET
PARLEN-GROUP-USA.COM
QUAD-GROUPUK.CC
QUAD-IT-GROUP.COM
QUINTAGROUP.CC
QUINTA-GROUPUS.COM
QUINTA-LLC.NET
REXTECHINNOVATION.COM
REXTECHLTD.CC
REXTECHLTD-US.COM
SPECIAL-ART-LTD.COM
SPECIAL-ART-UK.CC
SUBLIME-LTD.NET
TARGETMARKETGROUP-LLC.CC
TAZPROGLTD-US.COM
VNSPROJECT-DE.CC
VORTEXLLC-UK.COM
VORTEX-LLC-UK.NET
Info on the loader:
Features of the loader:
Upcoming features:
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
developgroupinc.net
develop-inc.com
mercygroupnet.net
mercy-inc.com
solarisgroupinc.com
solarisgroupnet.net
jvc-inc.com
jvcgroupnet.net
ns1.kalipso19.cc
ns2.kalipso19.cc
ns3.kalipso19.cc
ns1.mamacholi.net
ns2.mamacholi.net
ns3.mamacholi.net
ns1.rjevski.com
ns2.rjevski.com
ns3.rjevski.com
ns1.runlesrun.cc
ns2.runlesrun.cc
ns3.runlesrun.cc
ns1.skotinko.net
ns2.skotinko.net
ns3.skotinko.net
ns1.solojumper.com
ns2.solojumper.com
ns3.solojumper.com
aimic-groupllc.at
ALTERNATIVEART-LTD.COM
alternative-art-ltd.net
artby-gorup.net
artby-group.biz
art-marketllc.cc
seen here
artsolveltdco.at
aspecs-group.cc
ASPECS-GROUP.CC
callisto-ltdco.net
collins-group.cc
collins-groupusa.com
COLLINS-GROUPUSA.COM
competitorgroup-ltd.com
COMPETITOR-UK-GROUP.NET
DERWART-GROUP.AT
derwart-group.com
drawmade-group.com
DURLEY-ARTAU.NET
DURLEY-ART-GROUP.CC
ephesgroup-llc.biz
EPHES-GROUPLLC.CC
ephes-groupllc.net
fourthgroup-ltd.cc
seen here
FOURTH-UKLTD.NET
generalabbrialgroup-ltd.net
GENERATION-TEAM.NET
groupinc-upland.biz
HELBY-GROUPLTD.BIZ
HELBY-GROUP-LTD.CC
koertig-gmbh.com
kresko-group.biz
LILAC-ANTIQUE.CC
MASTERPIECE-GROUP.CC
MASTERPIECE-GROUP.ORG
megatechservicegroup-ltd.cc
MEGATECHSERVICE-GROUP-LTD.COM
millennial-maingrop.net
mitissanservice-group-ltd.cc
mitissanservicegroup-ltd.com
neoline-groupco.cc
neoline-llc.net
qead-groupllc.net
QEAD-LLC.BIZ
RICHMOND-ART-GROUP.COM
RICHMOND-ART-UK.BIZ
sevg-groupnet.com
SEVG-GROUPNET.COM
sevg-incgr.net
SQUIT-GROUP-LLC.BIZ
SQUITGROUP-LLC.NET
targetmarketgroup-llc.cc
targetmarket-groupllc.net
tazprogltd-us.com
TONSLEY-ART.COM
tonsley-group-uk.net
WEST-VIEW-ART.CC
westview-art.net
ns1.pidnsku.org
ns3.us1copy.ws
ns2.us1copy.at
ns2.stelsgid.net
ns1.usolomio.cc
ns2.usetmegold.su
ns3.usiami.su
ns1.ukansnami.com
ns3.uknamo.com
ns2.dnsukrect.com
Psychological evaluation tests found within AS29713, basically every domain name has its associated binary:
U tags
I tags
Tax notice, There are arrears reckoned on your account over a period of 2010-2011 year. You will find all calculations according to your financial debt, enclosed. Sincerely, Internal Revenue Service
.
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
Dear Valued Client,We strongly believe that your account may have been compromised. Due to this, we cancelled the last ACH transactions:-(ID: 13104924)-(ID: 04804768)-(ID: 37527025)-(ID: 51633547)initiated from your bank account by you or any other person, who might have access to your account.Detailed report on initiated transactions and reasons for cancellation can be found in the attachment.
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
This post has been reproduced from Dancho Danchev's blog.
This is the small program that will send/retrieve info from/to the web panel , it is like the server part of a RAT. The loader is coded in C++. Size unpacked is ~100kb , compressed is very small and still stable. I choose C++ as the language for this project cause i code C++ since a long time but i never release some security soft, so as a friend said it is a shame to have a knowledge in C++ and don’t use it instead of Delphi all the time. Also C++ is faster and more stable than any other language.
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
Looking to buy art? Sell art? Alternative Art Ltd is the first choice for artists and buyers alike! Alternative Art Ltd is an effective tool for the artist and emerging artist to market and promote their art in a professional and inexpensive manner. We will market your art to the international community of art buyers. Whether you are looking to buy or sell original art, Alternative Art Ltd is the premier art site for those seeking to buy or sell original art online.
NO COMMISSIONS! Whether you are looking to buy art or sell art, our site is fully optimized to get results FAST! Alternative Art Ltd is the future of buying and selling original art online. Artists who choose to sell their original art will receive maximum marketing exposure. For artists, selling your art has never been easier, faster, or more cost-effective. We will help you sell your original art DIRECTLY to buyers worldwide with NO COMMISSIONS. Those wishing to buy art online are invited to browse our extensive online galleries of original art. Never before has it been this easy for a buyer to select high-quality original art online. We update daily with new original art from our artist members.
Alternative Art Ltd offers casual collectors and serious connoisseurs alike an amazing collection of original art pieces from the world over. You'll enjoy unparalleled customer care from a knowledgeable and friendly staff of experts. For artists, the inconvenience and high costs of traditional galleries are completely eliminated. Our team of experts puts the latest technology to work for you, putting your original art in front of millions of potential art buyers!
-> [+] hides already used local&remote UDP Port(s)
[+] Base price (Core) for 250$
DDoS(full) + Load module (extended) + Socks5 Deamon for 400$
images
file name | alternative text |
---|---|
IRS_Notice_malware.png | |
nacha_malware.png | My Photo |
ZDNet_Zero_Day_September.png | AddThis Feed Button |
Twitter.jpg | hit counter |
ny-ticket.jpg | |
fdic_malware.jpg | |
ZDNet_Zero_Day_August_2011.png | |
cyber_jihadist_communities.png | |
Money_Mule_Recruitment_August_2011_01.png | |
Money_Mule_Recruitment_August_2011_03.png | |
Money_Mule_Recruitment_August_2011.png | |
Money_Mule_Recruitment_August_2011_02.png | |
31372543.jpg | |
20413223.jpg | |
dmgscreen.jpg | |
Liberty_Exploit_Pack.gif | |
Bleeding_Life_Exploit_Pack.png | |
June_money_mule_recruitment_02.PNG | |
June_money_mule_recruitment_01.PNG | |
June_ZDNet_Zero_Day.png | |
a4808f8014d1e345559618b4e27c97f9.png | |
May_money_mule_recruitment_01.PNG | |
May_money_mule_recruitment_02.PNG | |
Vertex_Net_Loader_01.png | |
Vertex_Net_Loader_02.png | |
Vertex_Net_Loader_03.png | |
Vertex_Net_Loader_04.png | |
Vertex_Net_Loader_05.png | |
Vertex_Net_Loader_06.png | |
Vertex_Net_Loader_07.png | |
Vertex_Net_Loader_08.png | |
Historical_OSINT_money_mule_recruitment_scams.PNG | |
April_2011_money_mule_recrutiment_01.PNG | |
April_2011_money_mule_recrutiment_02.PNG | |
April_2011_money_mule_recrutiment.PNG | |
snap.png | |
snap_DDoS_Bot_01.PNG | |
Dancho_Danchev_photo_2010.jpg | |
icon18_wrench_allbkg.png | |
button2-rssfeed.png | |
DanchoDanchevOnSecurityAndNewMedia?bg=99CCFF&fg=444444&anim=1 | |
r9dt9uac.png |
headers
H1
H2
Sunday, October 09, 2011
Tuesday, October 04, 2011
Wednesday, September 28, 2011
Tuesday, September 27, 2011
Sunday, September 11, 2011
Monday, August 29, 2011
Monday, August 22, 2011
Thursday, July 07, 2011
Wednesday, June 08, 2011
Monday, May 30, 2011
Thursday, May 26, 2011
Wednesday, May 25, 2011
Tuesday, May 10, 2011
Monday, May 09, 2011
About Me
Add Feed to RSS Reader
FeedBurner FeedCount
Readers Online
Subscribe to this Blog
Blog Archive
Featured Publications/Articles
Infowar Blogosphere
Jiglu - Topical Tag Cloud
Random Infowar Videos
H3
Sunday, October 09, 2011
Tuesday, October 04, 2011
Wednesday, September 28, 2011
Tuesday, September 27, 2011
Sunday, September 11, 2011
Monday, August 29, 2011
Monday, August 22, 2011
Thursday, July 07, 2011
Wednesday, June 08, 2011
Monday, May 30, 2011
Thursday, May 26, 2011
Wednesday, May 25, 2011
Tuesday, May 10, 2011
Monday, May 09, 2011
About Me
Add Feed to RSS Reader
FeedBurner FeedCount
Readers Online
Subscribe to this Blog
Blog Archive
Featured Publications/Articles
Infowar Blogosphere
Jiglu - Topical Tag Cloud
Random Infowar Videos
H4
H5
H6
internal links
address | anchor text |
---|---|
http://ddanchev.blogspot.com/2011/10/spamvertised-irs-notice-serving-malware.html | Spamvertised "IRS notice" Serving Malware |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/10/spamvertised-irs-notice-serving-malware.html | Sunday, October 09, 2011 |
http://ddanchev.blogspot.com/2011/10/spamvertised-nacha-security.html | Spamvertised "NACHA security nitification" Serving Malware - Historical OSINT |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/10/spamvertised-nacha-security.html | Tuesday, October 04, 2011 |
http://ddanchev.blogspot.com/2011/10/summarizing-zdnets-zero-day-posts-for.html | Summarizing ZDNet's Zero Day Posts for September |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/10/summarizing-zdnets-zero-day-posts-for.html | Tuesday, October 04, 2011 |
http://ddanchev.blogspot.com/2011/09/spamvertised-uniform-traffic-ticket-and.html | Spamvertised 'Uniform Traffic Ticket' and 'FDIC Notifications' Serving Malware - Historical OSINT |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/09/spamvertised-uniform-traffic-ticket-and.html | Wednesday, September 28, 2011 |
http://ddanchev.blogspot.com/2011/09/summarizing-zdnets-zero-day-posts-for.html | Summarizing ZDNet's Zero Day Posts for August |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/09/summarizing-zdnets-zero-day-posts-for.html | Tuesday, September 27, 2011 |
http://ddanchev.blogspot.com/2011/09/summarizing-3-years-of-research-into.html | Summarizing 3 Years of Research Into Cyber Jihad |
http://ddanchev.blogspot.com/2006/06/tracking-down-internet-terrorist.html | Tracking Down Internet Terrorist Propaganda |
http://ddanchev.blogspot.com/2006/05/arabic-extremist-group-forum-messages.html | Arabic Extremist Group Forum Messages' Characteristics |
http://ddanchev.blogspot.com/2006/08/cyber-terrorism-communications-and_22.html | Cyber Terrorism Communications and Propaganda |
http://ddanchev.blogspot.com/2006/10/cost-benefit-analysis-of-cyber.html | A Cost-Benefit Analysis of Cyber Terrorism |
http://ddanchev.blogspot.com/2006/12/current-state-of-internet-jihad.html | Current State of Internet Jihad |
http://ddanchev.blogspot.com/2006/12/analysis-of-technical-mujahid-issue-one.html | Analysis of the Technical Mujahid - Issue One |
http://ddanchev.blogspot.com/2006/12/full-list-of-hezbollahs-internet-sites.html | Full List of Hezbollah's Internet Sites |
http://ddanchev.blogspot.com/2006/08/steganography-and-cyber-terrorism.html | Steganography and Cyber Terrorism Communications |
http://ddanchev.blogspot.com/2006/09/hezbollahs-dns-service-providers-from.html | Hezbollah's DNS Service Providers from 1998 to 2006 |
http://ddanchev.blogspot.com/2007/04/mujahideen-secrets-encryption-tool.html | Mujahideen Secrets Encryption Tool |
http://ddanchev.blogspot.com/2007/08/analyses-of-cyber-jihadist-forums-and.html | Analyses of Cyber Jihadist Forums and Blogs |
http://ddanchev.blogspot.com/2007/03/cyber-traps-for-wannabe-jihadists.html | Cyber Traps for Wannabe Jihadists |
http://ddanchev.blogspot.com/2007/12/inshallahshaheed-come-out-come-out.html | Inshallahshaheed - Come Out, Come Out Wherever You Are |
http://ddanchev.blogspot.com/2007/07/gimf-switching-blogs.html | GIMF Switching Blogs |
http://ddanchev.blogspot.com/2007/08/gimf-now-permanently-shut-down.html | GIMF Now Permanently Shut Down |
http://ddanchev.blogspot.com/2007/08/gimf-we-will-remain.html | GIMF - "We Will Remain" |
http://ddanchev.blogspot.com/2007/10/wisdom-of-anti-cyber-jihadist-crowd.html | Wisdom of the Anti Cyber Jihadist Crowd |
http://ddanchev.blogspot.com/2007/11/cyber-jihadist-blogs-switching.html | Cyber Jihadist Blogs Switching Locations Again |
http://ddanchev.blogspot.com/2007/11/electronic-jihad-v30-what-cyber-jihad.html | Electronic Jihad v3.0 - What Cyber Jihad Isn't |
http://ddanchev.blogspot.com/2007/11/electronic-jihads-targets-list.html | Electronic Jihad's Targets List |
http://ddanchev.blogspot.com/2007/11/teaching-cyber-jihadists-how-to-hack.html | Teaching Cyber Jihadists How to Hack |
http://ddanchev.blogspot.com/2007/11/botnet-of-infected-terrorists.html | A Botnet of Infected Terrorists? |
http://ddanchev.blogspot.com/2007/09/infecting-terrorist-suspects-with.html | Infecting Terrorist Suspects with Malware |
http://ddanchev.blogspot.com/2007/09/dark-web-and-cyber-jihad.html | The Dark Web and Cyber Jihad |
http://ddanchev.blogspot.com/2007/12/cyber-jihadist-hacking-teams.html | Cyber Jihadist Hacking Teams |
http://ddanchev.blogspot.com/2007/09/two-cyber-jihadist-blogs-now-offline.html | Two Cyber Jihadist Blogs Now Offline |
http://ddanchev.blogspot.com/2007/02/characteristics-of-islamist-websites.html | Characteristics of Islamist Websites |
http://ddanchev.blogspot.com/2007/03/cyber-traps-for-wannabe-jihadists.html | Cyber Traps for Wannabe Jihadists |
http://ddanchev.blogspot.com/2007/04/mujahideen-secrets-encryption-tool.html | Mujahideen Secrets Encryption Tool |
http://ddanchev.blogspot.com/2007/06/analysis-of-technical-mujahid-issue-two.html | An Analysis of the Technical Mujahid - Issue Two |
http://ddanchev.blogspot.com/2007/07/terrorist-groups-brand-identities.html | Terrorist Groups' Brand Identities |
http://ddanchev.blogspot.com/2007/06/list-of-terrorists-blogs.html | A List of Terrorists' Blogs |
http://ddanchev.blogspot.com/2007/05/jihadists-anonymous-internet-surfing.html | Jihadists' Anonymous Internet Surfing Preferences |
http://ddanchev.blogspot.com/2007/05/sampling-jihadists-ips.html | Sampling Jihadists' IPs |
http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html | Cyber Jihadists' and TOR |
http://ddanchev.blogspot.com/2007/08/cyber-jihadist-dos-tool.html | A Cyber Jihadist DoS Tool |
http://ddanchev.blogspot.com/2007/08/gimf-now-permanently-shut-down.html | GIMF Now Permanently Shut Down |
http://ddanchev.blogspot.com/2008/01/mujahideen-secrets-2-encryption-tool.html | Mujahideen Secrets 2 Encryption Tool Released |
http://ddanchev.blogspot.com/2008/03/terror-on-internet-conflict-of-interest.html | Terror on the Internet - Conflict of Interest |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/09/summarizing-3-years-of-research-into.html | Sunday, September 11, 2011 |
http://ddanchev.blogspot.com/2011/08/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Eleven |
http://ddanchev.blogspot.com/2011/07/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash series |
http://ddanchev.blogspot.com/2011/07/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Ten |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_30.html | Keeping Money Mule Recruiters on a Short Leash - Part Nine |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_25.html | Keeping Money Mule Recruiters on a Short Leash - Part Eight - Historical OSINT |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Seven |
http://ddanchev.blogspot.com/2011/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Six |
http://ddanchev.blogspot.com/2011/01/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Five |
http://ddanchev.blogspot.com/2010/04/dns-infrastructure-of-money-mule.html | The DNS Infrastructure of the Money Mule Recruitment Ecosystem |
http://ddanchev.blogspot.com/2010/04/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Four |
http://ddanchev.blogspot.com/2010/03/money-mule-recruitment-campaign-serving.html | Money Mule Recruitment Campaign Serving Client-Side Exploits |
http://ddanchev.blogspot.com/2010/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Three |
http://ddanchev.blogspot.com/2010/03/money-mule-recruiters-on-yahoos-web.html | Money Mule Recruiters on Yahoo!'s Web Hosting |
http://ddanchev.blogspot.com/2010/02/dissecting-ongoing-money-mule.html | Dissecting an Ongoing Money Mule Recruitment Campaign |
http://ddanchev.blogspot.com/2010/02/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Two |
http://ddanchev.blogspot.com/2009/12/keeping-reshipping-mule-recruiters-on.html | Keeping Reshipping Mule Recruiters on a Short Leash |
http://ddanchev.blogspot.com/2009/11/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash |
http://ddanchev.blogspot.com/2009/10/standardizing-money-mule-recruitment.html | Standardizing the Money Mule Recruitment Process |
http://ddanchev.blogspot.com/2009/05/inside-money-laundering-groups-spamming.html | Inside a Money Laundering Group's Spamming Operations |
http://ddanchev.blogspot.com/2008/07/money-mule-recruiters-use-asproxs-fast.html | Money Mule Recruiters use ASProx's Fast Fluxing Services |
http://ddanchev.blogspot.com/2008/10/money-mules-syndicate-actively.html | Money Mules Syndicate Actively Recruiting Since 2002 |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/08/keeping-money-mule-recruiters-on-short.html | Monday, August 29, 2011 |
http://ddanchev.blogspot.com/2011/08/peek-inside-web-malware-exploitation.html | A Peek Inside Web Malware Exploitation Kits |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/08/peek-inside-web-malware-exploitation.html | Monday, August 29, 2011 |
http://ddanchev.blogspot.com/2011/08/summarizing-zdnets-zero-day-posts-for.html | Summarizing ZDNet's Zero Day Posts for July |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/08/summarizing-zdnets-zero-day-posts-for.html | Monday, August 22, 2011 |
http://ddanchev.blogspot.com/2011/07/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Ten |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_30.html | Keeping Money Mule Recruiters on a Short Leash series |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_30.html | Keeping Money Mule Recruiters on a Short Leash - Part Nine |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_25.html | Keeping Money Mule Recruiters on a Short Leash - Part Eight - Historical OSINT |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Seven |
http://ddanchev.blogspot.com/2011/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Six |
http://ddanchev.blogspot.com/2011/01/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Five |
http://ddanchev.blogspot.com/2010/04/dns-infrastructure-of-money-mule.html | The DNS Infrastructure of the Money Mule Recruitment Ecosystem |
http://ddanchev.blogspot.com/2010/04/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Four |
http://ddanchev.blogspot.com/2010/03/money-mule-recruitment-campaign-serving.html | Money Mule Recruitment Campaign Serving Client-Side Exploits |
http://ddanchev.blogspot.com/2010/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Three |
http://ddanchev.blogspot.com/2010/03/money-mule-recruiters-on-yahoos-web.html | Money Mule Recruiters on Yahoo!'s Web Hosting |
http://ddanchev.blogspot.com/2010/02/dissecting-ongoing-money-mule.html | Dissecting an Ongoing Money Mule Recruitment Campaign |
http://ddanchev.blogspot.com/2010/02/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Two |
http://ddanchev.blogspot.com/2009/12/keeping-reshipping-mule-recruiters-on.html | Keeping Reshipping Mule Recruiters on a Short Leash |
http://ddanchev.blogspot.com/2009/11/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash |
http://ddanchev.blogspot.com/2009/10/standardizing-money-mule-recruitment.html | Standardizing the Money Mule Recruitment Process |
http://ddanchev.blogspot.com/2009/05/inside-money-laundering-groups-spamming.html | Inside a Money Laundering Group's Spamming Operations |
http://ddanchev.blogspot.com/2008/07/money-mule-recruiters-use-asproxs-fast.html | Money Mule Recruiters use ASProx's Fast Fluxing Services |
http://ddanchev.blogspot.com/2008/10/money-mules-syndicate-actively.html | Money Mules Syndicate Actively Recruiting Since 2002 |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/07/keeping-money-mule-recruiters-on-short.html | Thursday, July 07, 2011 |
http://ddanchev.blogspot.com/2011/07/summarizing-zdnets-zero-day-posts-for.html | Summarizing ZDNet's Zero Day Posts for June |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/07/summarizing-zdnets-zero-day-posts-for.html | Thursday, July 07, 2011 |
http://ddanchev.blogspot.com/2011/06/summarizing-zdnets-zero-day-posts-for.html | Summarizing ZDNet's Zero Day Posts for May |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/06/summarizing-zdnets-zero-day-posts-for.html | Wednesday, June 08, 2011 |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_30.html | Keeping Money Mule Recruiters on a Short Leash - Part Nine |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_25.html | Keeping Money Mule Recruiters on a Short Leash - Part Eight - Historical OSINT |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Seven |
http://ddanchev.blogspot.com/2011/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Six |
http://ddanchev.blogspot.com/2011/01/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Five |
http://ddanchev.blogspot.com/2010/04/dns-infrastructure-of-money-mule.html | The DNS Infrastructure of the Money Mule Recruitment Ecosystem |
http://ddanchev.blogspot.com/2010/04/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Four |
http://ddanchev.blogspot.com/2010/03/money-mule-recruitment-campaign-serving.html | Money Mule Recruitment Campaign Serving Client-Side Exploits |
http://ddanchev.blogspot.com/2010/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Three |
http://ddanchev.blogspot.com/2010/03/money-mule-recruiters-on-yahoos-web.html | Money Mule Recruiters on Yahoo!'s Web Hosting |
http://ddanchev.blogspot.com/2010/02/dissecting-ongoing-money-mule.html | Dissecting an Ongoing Money Mule Recruitment Campaign |
http://ddanchev.blogspot.com/2010/02/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Two |
http://ddanchev.blogspot.com/2009/12/keeping-reshipping-mule-recruiters-on.html | Keeping Reshipping Mule Recruiters on a Short Leash |
http://ddanchev.blogspot.com/2009/11/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash |
http://ddanchev.blogspot.com/2009/10/standardizing-money-mule-recruitment.html | Standardizing the Money Mule Recruitment Process |
http://ddanchev.blogspot.com/2009/05/inside-money-laundering-groups-spamming.html | Inside a Money Laundering Group's Spamming Operations |
http://ddanchev.blogspot.com/2008/07/money-mule-recruiters-use-asproxs-fast.html | Money Mule Recruiters use ASProx's Fast Fluxing Services |
http://ddanchev.blogspot.com/2008/10/money-mules-syndicate-actively.html | Money Mules Syndicate Actively Recruiting Since 2002 |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_30.html | Monday, May 30, 2011 |
http://ddanchev.blogspot.com/2011/05/peek-inside-vertex-net-loader.html | A Peek Inside the Vertex Net Loader |
http://ddanchev.blogspot.com/2011/05/peek-inside-new-ddos-bot-snap.html | A Peek Inside a New DDoS Bot - "Snap" |
http://ddanchev.blogspot.com/2008/07/coding-spyware-and-malware-for-hire.html | Coding Spyware and Malware for Hire |
http://ddanchev.blogspot.com/2008/11/will-code-malware-for-financial.html | Will Code Malware for Financial Incentives |
http://ddanchev.blogspot.com/2008/01/e-crime-and-socioeconomic-factors.html | E-crime and Socioeconomic Factors |
http://ddanchev.blogspot.com/2008/08/web-based-botnet-command-and-control.html | Web Based Botnet Command and Control Kit 2.0 |
http://ddanchev.blogspot.com/2007/09/new-ddos-malware-kit-in-wild.html | A New DDoS Malware Kit in the Wild |
http://ddanchev.blogspot.com/2007/04/shots-from-malicious-wild-west-sample_20.html | The Cyber Bot - Web Based Malware |
http://ddanchev.blogspot.com/2007/04/shots-from-malicious-wild-west-sample_7672.html | The Black Sun Bot - Web Based Malware |
http://ddanchev.blogspot.com/2007/09/custom-ddos-capabilities-within-malware.html | Custom DDoS Capabilities Within a Malware |
http://ddanchev.blogspot.com/2007/10/botnet-on-demand-service.html | Botnet on Demand Service |
http://ddanchev.blogspot.com/2008/03/loadsccs-ddos-for-hire-service.html | Loads.cc - DDoS for Hire Service |
http://ddanchev.blogspot.com/2008/06/using-market-forces-to-disrupt-botnets.html | Using Market Forces to Disrupt Botnets |
http://ddanchev.blogspot.com/2007/03/botnet-communication-platforms.html | Botnet Communication Platforms |
http://ddanchev.blogspot.com/2008/04/botnet-masters-to-do-list.html | A Botnet Master's To-Do List |
http://ddanchev.blogspot.com/2007/05/ddos-on-demand-vs-ddos-extortion.html | DDoS on Demand VS DDoS Extortion |
http://ddanchev.blogspot.com/2008/05/how-does-botnet-with-100k-infected-pcs.html | How Does a Botnet with 100k Infected PCs Look Like? |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/05/peek-inside-vertex-net-loader.html | Thursday, May 26, 2011 |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_25.html | Keeping Money Mule Recruiters on a Short Leash - Part Eight - Historical OSINT |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Seven |
http://ddanchev.blogspot.com/2011/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Six |
http://ddanchev.blogspot.com/2011/01/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Five |
http://ddanchev.blogspot.com/2010/04/dns-infrastructure-of-money-mule.html | The DNS Infrastructure of the Money Mule Recruitment Ecosystem |
http://ddanchev.blogspot.com/2010/04/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Four |
http://ddanchev.blogspot.com/2010/03/money-mule-recruitment-campaign-serving.html | Money Mule Recruitment Campaign Serving Client-Side Exploits |
http://ddanchev.blogspot.com/2010/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Three |
http://ddanchev.blogspot.com/2010/03/money-mule-recruiters-on-yahoos-web.html | Money Mule Recruiters on Yahoo!'s Web Hosting |
http://ddanchev.blogspot.com/2010/02/dissecting-ongoing-money-mule.html | Dissecting an Ongoing Money Mule Recruitment Campaign |
http://ddanchev.blogspot.com/2010/02/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Two |
http://ddanchev.blogspot.com/2009/12/keeping-reshipping-mule-recruiters-on.html | Keeping Reshipping Mule Recruiters on a Short Leash |
http://ddanchev.blogspot.com/2009/11/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash |
http://ddanchev.blogspot.com/2009/10/standardizing-money-mule-recruitment.html | Standardizing the Money Mule Recruitment Process |
http://ddanchev.blogspot.com/2009/05/inside-money-laundering-groups-spamming.html | Inside a Money Laundering Group's Spamming Operations |
http://ddanchev.blogspot.com/2008/07/money-mule-recruiters-use-asproxs-fast.html | Money Mule Recruiters use ASProx's Fast Fluxing Services |
http://ddanchev.blogspot.com/2008/10/money-mules-syndicate-actively.html | Money Mules Syndicate Actively Recruiting Since 2002 |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_25.html | Wednesday, May 25, 2011 |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Seven |
http://ddanchev.blogspot.com/2011/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash |
http://ddanchev.blogspot.com/2011/03/keeping-money-mule-recruiters-on-short.html | seen here |
http://ddanchev.blogspot.com/2011/03/keeping-money-mule-recruiters-on-short.html | seen here |
http://ddanchev.blogspot.com/2011/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Six |
http://ddanchev.blogspot.com/2011/01/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Five |
http://ddanchev.blogspot.com/2010/04/dns-infrastructure-of-money-mule.html | The DNS Infrastructure of the Money Mule Recruitment Ecosystem |
http://ddanchev.blogspot.com/2010/04/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Four |
http://ddanchev.blogspot.com/2010/03/money-mule-recruitment-campaign-serving.html | Money Mule Recruitment Campaign Serving Client-Side Exploits |
http://ddanchev.blogspot.com/2010/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Three |
http://ddanchev.blogspot.com/2010/03/money-mule-recruiters-on-yahoos-web.html | Money Mule Recruiters on Yahoo!'s Web Hosting |
http://ddanchev.blogspot.com/2010/02/dissecting-ongoing-money-mule.html | Dissecting an Ongoing Money Mule Recruitment Campaign |
http://ddanchev.blogspot.com/2010/02/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - Part Two |
http://ddanchev.blogspot.com/2009/12/keeping-reshipping-mule-recruiters-on.html | Keeping Reshipping Mule Recruiters on a Short Leash |
http://ddanchev.blogspot.com/2009/11/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash |
http://ddanchev.blogspot.com/2009/10/standardizing-money-mule-recruitment.html | Standardizing the Money Mule Recruitment Process |
http://ddanchev.blogspot.com/2009/05/inside-money-laundering-groups-spamming.html | Inside a Money Laundering Group's Spamming Operations |
http://ddanchev.blogspot.com/2008/07/money-mule-recruiters-use-asproxs-fast.html | Money Mule Recruiters use ASProx's Fast Fluxing Services |
http://ddanchev.blogspot.com/2008/10/money-mules-syndicate-actively.html | Money Mules Syndicate Actively Recruiting Since 2002 |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short.html | Tuesday, May 10, 2011 |
http://ddanchev.blogspot.com/2011/05/peek-inside-new-ddos-bot-snap.html | A Peek Inside a New DDoS Bot - "Snap" |
http://ddanchev.blogspot.com/2008/07/coding-spyware-and-malware-for-hire.html | Coding Spyware and Malware for Hire |
http://ddanchev.blogspot.com/2008/11/will-code-malware-for-financial.html | Will Code Malware for Financial Incentives |
http://ddanchev.blogspot.com/2008/01/e-crime-and-socioeconomic-factors.html | E-crime and Socioeconomic Factors |
http://ddanchev.blogspot.com/2008/08/web-based-botnet-command-and-control.html | Web Based Botnet Command and Control Kit 2.0 |
http://ddanchev.blogspot.com/2007/09/new-ddos-malware-kit-in-wild.html | A New DDoS Malware Kit in the Wild |
http://ddanchev.blogspot.com/2007/04/shots-from-malicious-wild-west-sample_20.html | The Cyber Bot - Web Based Malware |
http://ddanchev.blogspot.com/2007/04/shots-from-malicious-wild-west-sample_7672.html | The Black Sun Bot - Web Based Malware |
http://ddanchev.blogspot.com/2007/09/custom-ddos-capabilities-within-malware.html | Custom DDoS Capabilities Within a Malware |
http://ddanchev.blogspot.com/2007/10/botnet-on-demand-service.html | Botnet on Demand Service |
http://ddanchev.blogspot.com/2008/03/loadsccs-ddos-for-hire-service.html | Loads.cc - DDoS for Hire Service |
http://ddanchev.blogspot.com/2008/06/using-market-forces-to-disrupt-botnets.html | Using Market Forces to Disrupt Botnets |
http://ddanchev.blogspot.com/2007/03/botnet-communication-platforms.html | Botnet Communication Platforms |
http://ddanchev.blogspot.com/2008/04/botnet-masters-to-do-list.html | A Botnet Master's To-Do List |
http://ddanchev.blogspot.com/2007/05/ddos-on-demand-vs-ddos-extortion.html | DDoS on Demand VS DDoS Extortion |
http://ddanchev.blogspot.com/2008/05/how-does-botnet-with-100k-infected-pcs.html | How Does a Botnet with 100k Infected PCs Look Like? |
http://ddanchev.blogspot.com/ | Dancho Danchev's blog |
http://ddanchev.blogspot.com/2011/05/peek-inside-new-ddos-bot-snap.html | Monday, May 09, 2011 |
http://ddanchev.blogspot.com/search?updated-max=2011-05-09T17%3A03%3A00%2B02%3A00&max-results=20 | Older Posts |
http://ddanchev.blogspot.com/ | Home |
http://ddanchev.blogspot.com/feeds/posts/default | Posts (Atom) |
http://ddanchev.blogspot.com/search?updated-min=2011-01-01T00%3A00%3A00%2B01%3A00&updated-max=2012-01-01T00%3A00%3A00%2B01%3A00&max-results=43 | 2011 |
http://ddanchev.blogspot.com/2011_10_01_archive.html | October |
http://ddanchev.blogspot.com/2011/10/spamvertised-irs-notice-serving-malware.html | Spamvertised "IRS notice" Serving Malware |
http://ddanchev.blogspot.com/2011/10/spamvertised-nacha-security.html | Spamvertised "NACHA security nitification" Serving... |
http://ddanchev.blogspot.com/2011/10/summarizing-zdnets-zero-day-posts-for.html | Summarizing ZDNet's Zero Day Posts for September |
http://ddanchev.blogspot.com/2011_09_01_archive.html | September |
http://ddanchev.blogspot.com/2011/09/spamvertised-uniform-traffic-ticket-and.html | Spamvertised 'Uniform Traffic Ticket' and 'FDIC No... |
http://ddanchev.blogspot.com/2011/09/summarizing-zdnets-zero-day-posts-for.html | Summarizing ZDNet's Zero Day Posts for August |
http://ddanchev.blogspot.com/2011/09/summarizing-3-years-of-research-into.html | Summarizing 3 Years of Research Into Cyber Jihad |
http://ddanchev.blogspot.com/2011_08_01_archive.html | August |
http://ddanchev.blogspot.com/2011/08/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - P... |
http://ddanchev.blogspot.com/2011/08/peek-inside-web-malware-exploitation.html | A Peek Inside Web Malware Exploitation Kits |
http://ddanchev.blogspot.com/2011/08/summarizing-zdnets-zero-day-posts-for.html | Summarizing ZDNet's Zero Day Posts for July |
http://ddanchev.blogspot.com/2011_07_01_archive.html | July |
http://ddanchev.blogspot.com/2011/07/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - P... |
http://ddanchev.blogspot.com/2011/07/summarizing-zdnets-zero-day-posts-for.html | Summarizing ZDNet's Zero Day Posts for June |
http://ddanchev.blogspot.com/2011_06_01_archive.html | June |
http://ddanchev.blogspot.com/2011/06/summarizing-zdnets-zero-day-posts-for.html | Summarizing ZDNet's Zero Day Posts for May |
http://ddanchev.blogspot.com/2011_05_01_archive.html | May |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_30.html | Keeping Money Mule Recruiters on a Short Leash - P... |
http://ddanchev.blogspot.com/2011/05/peek-inside-vertex-net-loader.html | A Peek Inside the Vertex Net Loader |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short_25.html | Keeping Money Mule Recruiters on a Short Leash - P... |
http://ddanchev.blogspot.com/2011/05/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - P... |
http://ddanchev.blogspot.com/2011/05/peek-inside-new-ddos-bot-snap.html | A Peek Inside a New DDoS Bot - "Snap" |
http://ddanchev.blogspot.com/2011/05/dont-play-poker-on-infected-table-part.html | Don't Play Poker on an Infected Table - Part Five |
http://ddanchev.blogspot.com/2011/05/summarizing-zdnets-zero-day-posts-for.html | Summarizing ZDNet's Zero Day Posts for April |
http://ddanchev.blogspot.com/2011_04_01_archive.html | April |
http://ddanchev.blogspot.com/2011/04/spamvertised-successfull-order-977132.html | Spamvertised "Successfull Order 977132" Leads to S... |
http://ddanchev.blogspot.com/2011/04/spamvertised-reqest-rejected-campaign.html | Spamvertised "Reqest Rejected" Campaign Serving Sc... |
http://ddanchev.blogspot.com/2011/04/dont-play-poker-on-infected-table-part.html | Don't Play Poker on an Infected Table - Part Four |
http://ddanchev.blogspot.com/2011/04/summarizing-zero-days-posts-for-march.html | Summarizing Zero Day's Posts for March |
http://ddanchev.blogspot.com/2011/04/spamvertised-dhl-notifications.html | Spamvertised DHL Notifications Scareware Campaign |
http://ddanchev.blogspot.com/2011_03_01_archive.html | March |
http://ddanchev.blogspot.com/2011/03/dissecting-massive-sql-injection-attack.html | Dissecting the Massive SQL Injection Attack Servin... |
http://ddanchev.blogspot.com/2011/03/spamvertised-post-office-express-mail.html | Spamvertised Post Office Express Mail (USPS) Email... |
http://ddanchev.blogspot.com/2011/03/spamvertised-united-parcel-service.html | Spamvertised United Parcel Service notifications s... |
http://ddanchev.blogspot.com/2011/03/compromised-universities-leads-to.html | Compromised Universities Leads to Fraudulent Pharm... |
http://ddanchev.blogspot.com/2011/03/spamvertised-fedex-notifications-spread.html | Spamvertised FedEx Notifications Spread Malware |
http://ddanchev.blogspot.com/2011/03/more-spamvertised-dhl-notifications.html | More Spamvertised DHL Notifications Spread Malware... |
http://ddanchev.blogspot.com/2011/03/compromised-university-leads-to_10.html | Compromised University Leads to Fraudulent Pharmac... |
http://ddanchev.blogspot.com/2011/03/spamvertised-dhl-notificication-malware.html | Spamvertised DHL Notification Malware Campaign |
http://ddanchev.blogspot.com/2011/03/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - P... |
http://ddanchev.blogspot.com/2011/03/compromised-university-leads-to.html | Compromised University Leads to Fraudulent Google ... |
http://ddanchev.blogspot.com/2011_02_01_archive.html | February |
http://ddanchev.blogspot.com/2011/02/summarizing-zero-days-posts-for.html | Summarizing Zero Day's Posts for February |
http://ddanchev.blogspot.com/2011/02/sampling-419-advance-fee-scams-activity.html | Sampling 419 Advance Fee Scams Activity - Part Two... |
http://ddanchev.blogspot.com/2011/02/bogus-adult-content-spim-ed-over-icq.html | Bogus Adult Content SPIM-ed Over ICQ |
http://ddanchev.blogspot.com/2011/02/diverse-portfolio-of-fake-security.html | A Diverse Portfolio of Fake Security Software - Pa... |
http://ddanchev.blogspot.com/2011/02/spamvertised-portfolio-of.html | Spamvertised Portfolio of Fraudulent/Pharmaceutica... |
http://ddanchev.blogspot.com/2011_01_01_archive.html | January |
http://ddanchev.blogspot.com/2011/01/keeping-money-mule-recruiters-on-short.html | Keeping Money Mule Recruiters on a Short Leash - P... |
http://ddanchev.blogspot.com/2011/01/spamvertised-your-password-has-been.html | Spamvertised "Your password has been stolen!" Malw... |
http://ddanchev.blogspot.com/2011/01/top-ten-must-read-posts-at-zdnets-zero.html | Top Ten Must-Read Posts at ZDNet's Zero Day for 20... |
http://ddanchev.blogspot.com/2011/01/top-ten-must-read-ddanchev-posts-for.html | Top Ten Must-Read DDanchev Posts For 2010 |
http://ddanchev.blogspot.com/search?updated-min=2010-01-01T00%3A00%3A00%2B01%3A00&updated-max=2011-01-01T00%3A00%3A00%2B01%3A00&max-results=50 | 2010 |
http://ddanchev.blogspot.com/2010_09_01_archive.html | September |
http://ddanchev.blogspot.com/2010/09/summarizing-3-years-of-research-into.html | Summarizing 3 Years of Research Into Cyber Jihad |
http://ddanchev.blogspot.com/2010/09/historical-osint-celebrities-death.html | Historical OSINT: Celebrities Death, Fedex Invoice... |
http://ddanchev.blogspot.com/2010_08_01_archive.html | August |
http://ddanchev.blogspot.com/2010/08/dissecting-scareware-serving-black-hat.html | Dissecting a Scareware-Serving Black Hat SEO Campa... |
http://ddanchev.blogspot.com/2010/08/spamvertised-best-buy-macys-evite-and.html | Spamvertised Best Buy, Macy's, Evite and Target Th... |
http://ddanchev.blogspot.com/2010/08/summarizing-zero-days-posts-for-july.html | Summarizing Zero Day's Posts for July |
http://ddanchev.blogspot.com/2010_07_01_archive.html | July |
http://ddanchev.blogspot.com/2010/07/zeus-crimeware-serving-123greetings.html | ZeuS Crimeware Serving 123Greetings Ecard Themed C... |
http://ddanchev.blogspot.com/2010/07/dissecting-xerox-workcentre-pro-scanned.html | Dissecting the Xerox WorkCentre Pro Scanned Docume... |
http://ddanchev.blogspot.com/2010_06_01_archive.html | June |
http://ddanchev.blogspot.com/2010_05_01_archive.html | May |
http://ddanchev.blogspot.com/2010_04_01_archive.html | April |
http://ddanchev.blogspot.com/2010_03_01_archive.html | March |
http://ddanchev.blogspot.com/2010_02_01_archive.html | February |
http://ddanchev.blogspot.com/2010_01_01_archive.html | January |
http://ddanchev.blogspot.com/search?updated-min=2009-01-01T00%3A00%3A00%2B01%3A00&updated-max=2010-01-01T00%3A00%3A00%2B01%3A00&max-results=50 | 2009 |
http://ddanchev.blogspot.com/2009_12_01_archive.html | December |
http://ddanchev.blogspot.com/2009_11_01_archive.html | November |
http://ddanchev.blogspot.com/2009_10_01_archive.html | October |
http://ddanchev.blogspot.com/2009_09_01_archive.html | September |
http://ddanchev.blogspot.com/2009_08_01_archive.html | August |
http://ddanchev.blogspot.com/2009_07_01_archive.html | July |
http://ddanchev.blogspot.com/2009_06_01_archive.html | June |
http://ddanchev.blogspot.com/2009_05_01_archive.html | May |
http://ddanchev.blogspot.com/2009_04_01_archive.html | April |
http://ddanchev.blogspot.com/2009_03_01_archive.html | March |
http://ddanchev.blogspot.com/2009_02_01_archive.html | February |
http://ddanchev.blogspot.com/2009_01_01_archive.html | January |
http://ddanchev.blogspot.com/search?updated-min=2008-01-01T00%3A00%3A00%2B01%3A00&updated-max=2009-01-01T00%3A00%3A00%2B01%3A00&max-results=50 | 2008 |
http://ddanchev.blogspot.com/2008_12_01_archive.html | December |
http://ddanchev.blogspot.com/2008_11_01_archive.html | November |
http://ddanchev.blogspot.com/2008_10_01_archive.html | October |
http://ddanchev.blogspot.com/2008_09_01_archive.html | September |
http://ddanchev.blogspot.com/2008_08_01_archive.html | August |
http://ddanchev.blogspot.com/2008_07_01_archive.html | July |
http://ddanchev.blogspot.com/2008_06_01_archive.html | June |
http://ddanchev.blogspot.com/2008_05_01_archive.html | May |
http://ddanchev.blogspot.com/2008_04_01_archive.html | April |
http://ddanchev.blogspot.com/2008_03_01_archive.html | March |
http://ddanchev.blogspot.com/2008_02_01_archive.html | February |
http://ddanchev.blogspot.com/2008_01_01_archive.html | January |
http://ddanchev.blogspot.com/search?updated-min=2007-01-01T00%3A00%3A00%2B01%3A00&updated-max=2008-01-01T00%3A00%3A00%2B01%3A00&max-results=50 | 2007 |
http://ddanchev.blogspot.com/2007_12_01_archive.html | December |
http://ddanchev.blogspot.com/2007_11_01_archive.html | November |
http://ddanchev.blogspot.com/2007_10_01_archive.html | October |
http://ddanchev.blogspot.com/2007_09_01_archive.html | September |
http://ddanchev.blogspot.com/2007_08_01_archive.html | August |
http://ddanchev.blogspot.com/2007_07_01_archive.html | July |
http://ddanchev.blogspot.com/2007_06_01_archive.html | June |
http://ddanchev.blogspot.com/2007_05_01_archive.html | May |
http://ddanchev.blogspot.com/2007_04_01_archive.html | April |
http://ddanchev.blogspot.com/2007_03_01_archive.html | March |
http://ddanchev.blogspot.com/2007_02_01_archive.html | February |
http://ddanchev.blogspot.com/2007_01_01_archive.html | January |
http://ddanchev.blogspot.com/search?updated-min=2006-01-01T00%3A00%3A00%2B01%3A00&updated-max=2007-01-01T00%3A00%3A00%2B01%3A00&max-results=50 | 2006 |
http://ddanchev.blogspot.com/2006_12_01_archive.html | December |
http://ddanchev.blogspot.com/2006_11_01_archive.html | November |
http://ddanchev.blogspot.com/2006_10_01_archive.html | October |
http://ddanchev.blogspot.com/2006_09_01_archive.html | September |
http://ddanchev.blogspot.com/2006_08_01_archive.html | August |
http://ddanchev.blogspot.com/2006_07_01_archive.html | July |
http://ddanchev.blogspot.com/2006_06_01_archive.html | June |
http://ddanchev.blogspot.com/2006_05_01_archive.html | May |
http://ddanchev.blogspot.com/2006_04_01_archive.html | April |
http://ddanchev.blogspot.com/2006_03_01_archive.html | March |
http://ddanchev.blogspot.com/2006_02_01_archive.html | February |
http://ddanchev.blogspot.com/2006_01_01_archive.html | January |
http://ddanchev.blogspot.com/search?updated-min=2005-01-01T00%3A00%3A00%2B01%3A00&updated-max=2006-01-01T00%3A00%3A00%2B01%3A00&max-results=4 | 2005 |
http://ddanchev.blogspot.com/2005_12_01_archive.html | December |
external links
address | anchor text |
---|---|
http://3.bp.blogspot.com/-uKXzBr4F1p4/TpGQoLomWiI/AAAAAAAAE7c/W_e7RRS90n4/s1600/IRS_Notice_malware.png | |
http://www.virustotal.com/file-scan/report.html?id=d1551934d60033c871b377015c8be65d608b33543f149369d1e70361e06dc05e-1318162358 | |
http://twitter.com/danchodanchev | |
http://4.bp.blogspot.com/-KIyTyriN3Z0/ToqAYziKT8I/AAAAAAAAE7Y/6j22zsNKIkQ/s1600/nacha_malware.png | |
http://www.virustotal.com/file-scan/report.html?id=1ad11c1193f0dbcae3766e5cb4094acc137c10430d615e55470cbc41ce6cd03a-1317676852 | |
http://twitter.com/danchodanchev | |
http://1.bp.blogspot.com/-MvsrDCRrXPA/Top8aXc2JRI/AAAAAAAAE7Q/DJtoUouqS0k/s1600/ZDNet_Zero_Day_September.png | |
http://www.zdnet.com/topics/dancho+danchev?o=1&mode=rss&tag=mantle_skin;content | |
http://feeds.feedburner.com/zdnet/security | |
http://twitter.com/danchodanchev | |
http://www.zdnet.com/blog/security/spamvertised-facebook-notification-leads-to-exploits-and-malware/9334 | |
http://www.zdnet.com/blog/security/google-mozilla-and-microsoft-ban-the-diginotar-certificate-authority-in-their-browsers/9337 | |
http://www.zdnet.com/blog/security/microsoft-themed-ransomware-variant-spotted-in-the-wild/9341 | |
http://www.zdnet.com/blog/security/man-in-wheelchair-falls-down-the-elevator-shaft-scam-spreading-on-facebook/9403 | |
http://www.zdnet.com/blog/security/new-ransomware-variant-uses-false-child-porn-accusations-/9406 | |
http://www.zdnet.com/blog/security/russian-embassy-in-london-hit-by-a-ddos-attack/9409 | |
http://www.zdnet.com/blog/security/utorrentcom-hacked-serving-scareware/9413 | |
http://www.zdnet.com/blog/security/bank-of-melbourne-twitter-account-hacked-spreading-phishing-links/9415 | |
http://www.zdnet.com/blog/security/malicious-spam-campaigns-proliferating/9420 | |
http://www.zdnet.com/blog/security/spamvertised-we-are-going-to-sue-you-emails-lead-to-malware/9423 | |
http://www.zdnet.com/blog/security/xss-bug-in-skype-for-iphone-ipad-allows-address-book-theft/9426 | |
http://www.zdnet.com/blog/security/researcher-releases-details-on-6-scada-vulnerabilities/9432 | |
http://www.zdnet.com/blog/security/diy-botnet-kit-spotted-in-the-wild/9440 | |
http://www.zdnet.com/blog/security/new-mac-os-x-trojan-poses-as-malicious-pdf-file/9486 | |
http://www.zdnet.com/blog/security/survey-60-percent-of-users-use-the-same-password-across-more-than-one-of-their-online-accounts/9489 | |
http://twitter.com/danchodanchev | |
http://www.zdnet.com/blog/security/spamvertised-uniform-traffic-tickets-and-invoices-lead-to-malware/9289 | |
http://www.zdnet.com/blog/security/malware-watch-fdic-and-western-union-themed-emails-lead-to-malware/9328 | |
http://3.bp.blogspot.com/-RhedU84jjx8/ToIFTTDPUOI/AAAAAAAAE7I/rLFavjVbk_w/s1600/ny-ticket.jpg | |
http://www.virustotal.com/file-scan/report.html?id=ca67a14bfed2a7bc2ac8be9c01cb17d5da12b75320b4bad4fe8d8a6759ad9725-1315139717 | |
http://www.virustotal.com/file-scan/report.html?id=50b104c5f8314327e03b01e7f7c2535d8de7cd9f73f8e16d1364c7fd021a90cc-1315139775 | |
http://www.virustotal.com/file-scan/report.html?id=1741ef5d24641ee99b5d78a68109162bebc714c3d19abc37e3d4472f3dcd6f18-1315161281 | |
http://1.bp.blogspot.com/-fGQlQMHGsCE/ToMWYEHUDDI/AAAAAAAAE7M/1nPFXvGpgAI/s1600/fdic_malware.jpg | |
http://labs.m86security.com/2011/09/an-analysis-of-the-ach-spam-campaign/ | |
http://twitter.com/danchodanchev | |
http://2.bp.blogspot.com/-j9tlauN0TeQ/ToICnuFMSGI/AAAAAAAAE7A/hKwpqtrd0QY/s1600/ZDNet_Zero_Day_August_2011.png | |
http://www.zdnet.com/topics/dancho+danchev?o=1&mode=rss&tag=mantle_skin;content | |
http://feeds.feedburner.com/zdnet/security | |
http://twitter.com/danchodanchev | |
http://www.zdnet.com/blog/security/study-rootkits-target-pirated-copies-of-windows-xp/9223 | |
http://www.zdnet.com/blog/security/56-percent-of-enterprise-users-using-vulnerable-adobe-reader-plugins/9241 | |
http://www.zdnet.com/blog/security/new-malware-attack-circulating-on-facebook/9281 | |
http://www.zdnet.com/blog/security/kaspersky-12-different-vulnerabilities-detected-on-every-pc/9283 | |
http://www.zdnet.com/blog/security/spamvertised-uniform-traffic-tickets-and-invoices-lead-to-malware/9289 | |
http://www.zdnet.com/blog/security/latest-version-of-skype-susceptible-to-malicious-code-injection-flaw/9295 | |
http://www.zdnet.com/blog/security/spamvertised-scan-from-a-xerox-workcentre-pro-leads-to-malware/9315 | |
http://www.zdnet.com/blog/security/malware-watch-fdic-and-western-union-themed-emails-lead-to-malware/9328 | |
http://twitter.com/danchodanchev | |
http://1.bp.blogspot.com/-nEUV2KU28Zg/TmyYsSZwA8I/AAAAAAAAE68/6rSEcplvi2A/s1600/cyber_jihadist_communities.png | |
http://twitter.com/danchodanchev | |
http://4.bp.blogspot.com/-B6JItIdHwss/Tlt-EVVmpuI/AAAAAAAAE6s/ZVhCfkQvbgE/s1600/Money_Mule_Recruitment_August_2011_01.png | |
http://2.bp.blogspot.com/-x3ILwKpmCzo/TluMjVcJP2I/AAAAAAAAE6w/eH9Zwysu_Sk/s1600/Money_Mule_Recruitment_August_2011_03.png | |
http://3.bp.blogspot.com/-CAk5C1qVi50/TluOFaUBNmI/AAAAAAAAE60/2SXnXBeQ-nI/s1600/Money_Mule_Recruitment_August_2011.png | |
http://1.bp.blogspot.com/-P1X6rxZlGL4/TluOO0P20fI/AAAAAAAAE64/lVfzCywrwgo/s1600/Money_Mule_Recruitment_August_2011_02.png | |
http://www.zdnet.com/blog/security/56-percent-of-enterprise-users-using-vulnerable-adobe-reader-plugins/9241 | |
http://www.zdnet.com/blog/security/kaspersky-12-different-vulnerabilities-detected-on-every-pc/9283 | |
http://2.bp.blogspot.com/-bmN4o62dMmw/Tlth60Y7FSI/AAAAAAAAE6U/ZlFYkeRzp5g/s1600/31372543.jpg | |
http://3.bp.blogspot.com/-Zk-k1sNvsS8/TltomLIDBbI/AAAAAAAAE6Y/rSZIs0T-fuQ/s1600/20413223.jpg | |
http://1.bp.blogspot.com/-Q_NRoK1syvQ/Tlts_KwnMwI/AAAAAAAAE6c/9CAnmmyB8nI/s1600/dmgscreen.jpg | |
http://1.bp.blogspot.com/-q0oCqKefZqI/TltwKaJsl0I/AAAAAAAAE6g/M3KNcdgUx2Y/s1600/Liberty_Exploit_Pack.gif | |
http://2.bp.blogspot.com/-iD3DHT9gdpQ/TltwqSJvLyI/AAAAAAAAE6k/UaXYzdSEjGQ/s1600/Bleeding_Life_Exploit_Pack.png | |
http://twitter.com/danchodanchev | |
http://4.bp.blogspot.com/-Ofx1p-jnCxw/TlJ7g2ELUNI/AAAAAAAAE6M/rZvosUvCwIU/s1600/ZDNet_Zero_Day_August_2011.png | |
http://www.zdnet.com/topics/dancho+danchev?o=1&mode=rss&tag=mantle_skin;content | |
http://feeds.feedburner.com/zdnet/security | |
http://twitter.com/danchodanchev | |
http://www.zdnet.com/blog/security/leaked-video-of-casey-anthony-confessing-to-lawyer-scam-spreading-on-facebook/8979 | |
http://www.zdnet.com/blog/security/anonymous-leaks-90000-emails-from-compromised-military-contractor-booz-allen-hamilton/8983 | |
http://www.zdnet.com/blog/security/this-girl-must-be-out-of-her-mind-to-do-this-on-live-television-scam-spreading-on-facebook/9070 | |
http://www.zdnet.com/blog/security/spamvertised-bank-statements-serving-scareware/9075 | |
http://www.zdnet.com/blog/security/internet-explorer-9-outperforms-competing-browsers-in-malware-blocking-test/9086 | |
http://www.zdnet.com/blog/security/leaked-video-amy-winehouse-on-crack-hours-before-death-scam-spreading-on-facebook/9108 | |
http://www.zdnet.com/blog/security/pfizers-facebook-hacked-by-antisec/9113 | |
http://www.zdnet.com/blog/security/90000-pages-compromised-in-mass-iframe-injection-attack/9116 | |
http://www.zdnet.com/blog/security/amazons-cloud-services-systematically-exploited-by-cybercriminals/9122 | |
http://twitter.com/danchodanchev | |
http://1.bp.blogspot.com/-66RXMJqntSo/ThWKFjK-5KI/AAAAAAAAE6E/NkQJrKWBsqk/s1600/June_money_mule_recruitment_02.PNG | |
http://2.bp.blogspot.com/-piWQOXpEroc/ThWXI67OyFI/AAAAAAAAE6I/I5GQt8v6vSg/s1600/June_money_mule_recruitment_01.PNG | |
http://1.bp.blogspot.com/-usiIv-xyb00/ThWI8NigSuI/AAAAAAAAE6A/DR1ayhMcrRc/s1600/June_ZDNet_Zero_Day.png | |
http://www.zdnet.com/topics/dancho+danchev?o=1&mode=rss&tag=mantle_skin;content | |
http://feeds.feedburner.com/zdnet/security | |
http://twitter.com/danchodanchev | |
http://www.zdnet.com/blog/security/hot-lesbian-video-rihanna-and-hayden-panettiere-scam-on-facebook-leads-to-mac-malware/8717 | |
http://www.zdnet.com/blog/security/sony-europe-hacked-by-lebanese-grey-hat-hacker-/8725 | |
http://www.zdnet.com/blog/security/spamvertised-united-parcel-service-emails-lead-to-scareware/8745 | |
http://www.zdnet.com/blog/security/the-most-common-iphone-passcodes/8760 | |
http://www.zdnet.com/blog/security/autorun-malware-infections-declining/8772 | |
http://www.zdnet.com/blog/security/mcdonalds-free-dinner-day-emails-lead-to-scareware/8848 | |
http://www.zdnet.com/blog/security/two-ddos-attacks-hit-network-solutions/8852 | |
http://www.zdnet.com/blog/security/the-creator-of-lulzsec-arrested-in-london-scam-spreading-on-facebook/8856 | |
http://www.zdnet.com/blog/security/federal-reserve-themed-emails-lead-to-zeus-crimeware/8862 | |
http://www.zdnet.com/blog/security/photographer-commited-suicide-3-days-after-shooting-this-video-scam-spreading-on-facebook/8911 | |
http://twitter.com/danchodanchev | |
http://3.bp.blogspot.com/-SsCOISM2YEY/Te-F3v0QDSI/AAAAAAAAE54/wKZFvr1UtRk/s1600/a4808f8014d1e345559618b4e27c97f9.png | |
http://www.zdnet.com/topics/dancho+danchev?o=1&mode=rss&tag=mantle_skin;content | |
http://feeds.feedburner.com/zdnet/security | |
http://twitter.com/danchodanchev | |
http://www.zdnet.com/blog/security/chinas-blue-army-when-nations-harness-hacktivists-for-information-warfare-/8686 | |
http://www.zdnet.com/blog/security/vishing-attack-on-skype-pushing-scareware/8598 | |
http://www.zdnet.com/blog/security/commtouch-71-percent-increase-in-new-zombies/8602 | |
http://www.zdnet.com/blog/security/osama-execution-video-scam-spreading-on-facebook/8607 | |
http://www.zdnet.com/blog/security/new-mac-os-x-scareware-delivered-through-blackhat-seo/8614 | |
http://www.zdnet.com/blog/security/you-visit-illegal-websites-fbi-themed-emails-lead-to-scareware/8618 | |
http://www.zdnet.com/blog/security/fake-microsoft-patch-tuesday-emails-lead-to-zeus-crimeware/8646 | |
http://www.zdnet.com/blog/security/enable-dislike-button-scam-spreading-on-facebook/8655 | |
http://www.zdnet.com/blog/security/nasas-goddard-space-flight-center-ftp-server-hacked/8660 | |
http://www.zdnet.com/blog/security/checkout-your-profile-stalkers-scam-spreading-on-facebook/8665 | |
http://www.zdnet.com/blog/security/the-world-funniest-condom-commercial-lol-scam-spreading-on-facebook/8680 | |
http://www.zdnet.com/blog/security/chinas-blue-army-when-nations-harness-hacktivists-for-information-warfare-/8686 | |
http://twitter.com/danchodanchev | |
http://1.bp.blogspot.com/-Lo9QziJ68ko/TeNn6eEh-5I/AAAAAAAAE5s/vFpsg4xRqqU/s1600/May_money_mule_recruitment_01.PNG | |
http://1.bp.blogspot.com/-v9MDiomb_pU/TeNp_ly1UEI/AAAAAAAAE5w/lfqqVEkwh3s/s1600/May_money_mule_recruitment_02.PNG | |
http://4.bp.blogspot.com/-aAu93De1iFo/TdzraOk-3yI/AAAAAAAAE5I/TQ4UMBOWzm0/s1600/Vertex_Net_Loader_01.png | |
http://2.bp.blogspot.com/-Ckqd5Sipc7U/Td5hXheB2gI/AAAAAAAAE5M/OB_N0ZZxHjw/s1600/Vertex_Net_Loader_02.png | |
http://4.bp.blogspot.com/-_SBV5XHe_Oo/Td5hcx7ggPI/AAAAAAAAE5Q/JKodsL8tdfQ/s1600/Vertex_Net_Loader_03.png | |
http://3.bp.blogspot.com/-4jGolDgEUyY/Td5hnFffv9I/AAAAAAAAE5Y/c3MtD5JFKEc/s1600/Vertex_Net_Loader_04.png | |
http://2.bp.blogspot.com/-EAFK-hWBXQ4/Td5hxqqe5iI/AAAAAAAAE5c/lhayh-xt-ns/s1600/Vertex_Net_Loader_05.png | |
http://2.bp.blogspot.com/-9M-U3uSmDvo/Td5h5lH8A8I/AAAAAAAAE5g/BugSrW2sEqA/s1600/Vertex_Net_Loader_06.png | |
http://1.bp.blogspot.com/-gkxq8Vq04Vc/Td5h-GL0nCI/AAAAAAAAE5k/Csg5eo636R0/s1600/Vertex_Net_Loader_07.png | |
http://4.bp.blogspot.com/-ob5JwxLKGvQ/Td5iCqw97QI/AAAAAAAAE5o/M8ZjuaW_tYI/s1600/Vertex_Net_Loader_08.png | |
http://twitter.com/danchodanchev | |
http://3.bp.blogspot.com/-8D46sf_T778/Tdzj0lTyt0I/AAAAAAAAE5A/u8C64QK1QZI/s1600/Historical_OSINT_money_mule_recruitment_scams.PNG | |
http://2.bp.blogspot.com/-8VuSA852CxU/Tcgd5beOUaI/AAAAAAAAE4c/8Xzg6vDvXOc/s1600/April_2011_money_mule_recrutiment_01.PNG | |
http://3.bp.blogspot.com/-0HJND4jBGsU/TckRO3v_j_I/AAAAAAAAE4k/0XP-faPLn98/s1600/April_2011_money_mule_recrutiment_02.PNG | |
http://3.bp.blogspot.com/-HuAhjK_jsGs/TckQosZ_J5I/AAAAAAAAE4g/ZMH1Ix5kcQk/s1600/April_2011_money_mule_recrutiment.PNG | |
http://3.bp.blogspot.com/-Z9ueye8oefI/Tcf1JUEA3mI/AAAAAAAAE4U/9zVpaChNMAQ/s1600/snap.png | |
http://3.bp.blogspot.com/-nFcz6QcKVvo/Tcf61ur41XI/AAAAAAAAE4Y/Fr2RLIX2RNI/s1600/snap_DDoS_Bot_01.PNG | |
http://twitter.com/danchodanchev | |
http://www.blogger.com/profile/09989733095447891258 | |
http://www.blogger.com/profile/09989733095447891258 | |
http://www.addthis.com/feed.php?pub=ddanchev123&h1=http%3A%2F%2Ffeeds.feedburner.com%2FDanchoDanchevOnSecurityAndNewMedia&t1= | |
http://feeds.feedburner.com/DanchoDanchevOnSecurityAndNewMedia | |
http://whos.amung.us/show/r9dt9uac | |
http://www.feedblitz.com | |
http://windowsecurity.com/articles/Phishing-Metamorphosis-2007-Trend-Developments.html | |
http://www.windowsecurity.com/articles/Popular-Spammers-Strategies-Tactics.html | |
http://packetstormsecurity.org/papers/general/malware-trends.pdf | |
http://www.windowsecurity.com/pages/security-policy.pdf | |
http://blogs.technet.com/antimalware | |
http://anti-virus-rants.blogspot.com/ | |
http://chuvakin.blogspot.com/ | |
http://asert.arbornetworks.com/ | |
http://boingboing.net/ | |
http://www.cerias.purdue.edu/ | |
http://www.thedarkvisitor.com/ | |
http://counterterrorismblog.org/ | |
http://www.darknet.org.uk/ | |
http://www.defensetech.org/ | |
http://determina.blogspot.com/ | |
http://erratasec.blogspot.com/ | |
http://explabs.blogspot.com/ | |
http://www.f-secure.com/weblog | |
http://www.fas.org/blog/secrecy | |
http://www.fas.org/blog/ssp | |
http://fergdawg.blogspot.com/ | |
http://www.finjan.com/MCRCblog.aspx | |
http://blogs.iss.net/ | |
http://www.gnucitizen.org/blog | |
http://honeyblog.org/ | |
http://www.warintel.blogspot.com/ | |
http://internet-haganah.com/haganah/ | |
http://isc.sans.org/ | |
http://jeremiahgrossman.blogspot.com/ | |
http://www.jihadwatch.org/ | |
http://viruslist.com/weblog | |
http://lspitzner.blogspot.com/ | |
http://www.avertlabs.com/research/blog | |
http://www.whatevercompliance.com/ | |
http://blogs.pandasecurity.com/ | |
http://www.prevx.com/blog.asp | |
http://taosecurity.blogspot.com/ | |
http://www.rsasecurity.com/blog | |
http://rbnexploit.blogspot.com/ | |
http://securitywatch. |