Massive Malware Serving Campaign Abuses Portmap A Web Based Port Forwarding Solution – An Analysis

Dear blog readers,In this post I’ve decided to further profile a currently circulating malicious software and njRAT malware dropping campaign that’s using a popular port forwarding solution as a C&C server with the idea to provide everyone wit… Continue reading Massive Malware Serving Campaign Abuses Portmap A Web Based Port Forwarding Solution – An Analysis

Posted in Uncategorized

Profiling the ZeusEsta Managed ZeuS Crimeware Hosting Service – An Analysis

Dear blog readers,Back in 2009 I came across to a pretty interesting and easy to use sophisticated ZeuS crimeware managed hosting service which was basically enticing users into becoming customers of a managed ZeuS crimeware service which was basically… Continue reading Profiling the ZeusEsta Managed ZeuS Crimeware Hosting Service – An Analysis

Posted in Uncategorized

Profiling a Email Password Harvesting Enabled Malicious Software Release – An Analysis

Dear blog readers,I’ve decided to share with everyone sample screenshots which I took back in 2010 while doing research in specific the malicious release’s capability to eavesdrop on email communications initiated from the hosts of the affected victims… Continue reading Profiling a Email Password Harvesting Enabled Malicious Software Release – An Analysis

Posted in Uncategorized

Exposing a Russia-Based Stolen and Compromised Credit Cards Checking Web Site – An Analysis

Dear blog readers,I’ve decided to share with everyone some screenshots which I took from the infamous back in 2010 stolen and compromised credit cards checking service hxxp://ccchkr.com which uses a variety of methods and techniques to check the validi… Continue reading Exposing a Russia-Based Stolen and Compromised Credit Cards Checking Web Site – An Analysis

Posted in Uncategorized

Exposing a Sample Rock Phish Phishing Campaign’s Botnet Hosted Infrastructure – An Analysis

Did you know that a huge percentage of Rock Phish related campaigns are known to have been hosted on a fast-fluxed botnet infrastructure where the ultimate goal is to make them impossible to take offline or basically increase the average time it takes … Continue reading Exposing a Sample Rock Phish Phishing Campaign’s Botnet Hosted Infrastructure – An Analysis

Posted in Uncategorized

Exposing a Rogue Google AdSense Campaign Using Typosquatted Malware Serving Software Releases – An Analysis

Dear blog readers,I wanted to share with everyone the details including the actual technical details behind a what appears to be a rogue and fraudulent Google AdSense campaign that’s using popular software download keywords for the purpose of serving r… Continue reading Exposing a Rogue Google AdSense Campaign Using Typosquatted Malware Serving Software Releases – An Analysis

Posted in Uncategorized

Joseph Mlodzianowski Joining Dancho Danchev’s Blog as Guest Blogger – Stay tuned!

Hi, everyone,This is Dancho and I have some big news. Joseph Mlodzianowski (Twitter; LinkedIn) is joining my personal blog as an official Guest Blogger starting as of today so stay tuned for some high-quality security and information security research … Continue reading Joseph Mlodzianowski Joining Dancho Danchev’s Blog as Guest Blogger – Stay tuned!

Posted in Uncategorized

The Deepest of Them All – A Profile of Yavor Kolev – a Bulgarian Law Enforcement Officer Kidnapper and a Bulgarian Dipshit – An Analysis

Psst – where’s approximately of $85,000 of my own money which I earned legally throughout the period 2012-2014? And where approximately 80% of my health based on my health pension records which Bulgaria’s DANS gave me?Ask this guy which I told you… Continue reading The Deepest of Them All – A Profile of Yavor Kolev – a Bulgarian Law Enforcement Officer Kidnapper and a Bulgarian Dipshit – An Analysis

Posted in Uncategorized