The Ransomware “Epidemic” – Or How To Strike Back?
Not only did we live to see it we’re actually living and taking actions one way or another to see… Continue reading The Ransomware “Epidemic” – Or How To Strike Back?
Collaborate Disseminate
Not only did we live to see it we’re actually living and taking actions one way or another to see… Continue reading The Ransomware “Epidemic” – Or How To Strike Back?
Not only did we live to see it we’re actually living and taking actions one way or another to see it and yes it’s the ransomware “epidemic” that I’m referring to and which I’ll try to expose in this post by not only providing the typical for me technic… Continue reading The Ransomware "Epidemic" – Or How To Strike Back?
Who would have thought? The U.S Secret Service is currently offering $10M reward for Denis Gennadievich Kulkov also known as Kreenjo/Nordex/Nordexin who’s particularly famous for running the infamous Try2Check credit card checking cybercrimin… Continue reading Exposing The "Denis Gennadievich Kulkov" a.k.a Kreenjo/Nordex/Nordexin/Try2Check Cybercriminal Enterprise – An Analysis
Who would have thought? The U.S Secret Service is currently offering $10M reward for Denis Gennadievich Kulkov also known as Kreenjo/Nordex/Nordexin… Continue reading Exposing The “Denis Gennadievich Kulkov” a.k.a Kreenjo/Nordex/Nordexin/Try2Check Cybercriminal Enterprise – An Analysis
In this post I’ll profile Hacking Team GhostSec and I’ll provide all the relevant and necessary IoCs (Indicators of Compromise) including all the relevant personally identifiable information in terms of assisting U.S Law Enforcement and the U.S Intelli… Continue reading Exposing Hacking Team GhostSec – An Analysis
In this post I’ll profile Hacking Team GhostSec and I’ll provide all the relevant and necessary IoCs (Indicators of Compromise)… Continue reading Exposing Hacking Team GhostSec – An Analysis
Dipshit. The deepest of them all.
Stay tuned! Continue reading Happy Holidays From The (Not) Republic of Bulgaria – An Analysis – Part Five
I would like to take the time and effort and let you know about my latest project which is called Hacker Database. Obtain access here.Sample screenshots:Sample visualizations produced using the database in GraphML format: Continue reading Hacker Database
If an image is worth a thousand words then check out the following which although released in 2006 appears to be one of the cybercrime ecosystem’s most sophisticated and advanced compromised hosts management tool within the ecosystem up to present day…. Continue reading How Do Cybercriminals Manage Compromised Hosts Using Desktop Management Applications? – An Analysis
Awesome.Emails known to have been involved in the campaign include:iserdo@gmail.comtoadmin@1337crew.infowg.fatal@gmail.comemailedgov.hacN@gmail.comadmin@1337crew.infojernej_5@hotmail.comusediserdo@gmail.comtoiserdo@gmail.comschlist90210@gmail.comWaiste… Continue reading Who’s Behind the Butterfly Bot/DCI Bot/DownTroj/Aspergillus Botnet Malicious Software?