Flashpoint Intel Official Web Site Serving Malware – An Analysis

UPDATE: Flashpoint Intel issued a response to my research.

UPDATE: SCMagazine picked up the story.

UPDATE: Anti-Malware.name picked up the story.

UPDATE: EnterpriseTimes picked up the story

UPDATE: Rambler News picked up the story.

It appears that… Continue reading Flashpoint Intel Official Web Site Serving Malware – An Analysis

Historical OSINT – “I Know Who DDoS-ed Georgia and Bobbear.co.uk Last Summer”

Appreciate my rhetoric. In this post I’ll provide actionable intelligence on a key DDoS for hire service that was primarily used in the Russia vs Georgia Cyber Attacks circa 2009 including the DDoS attack against Bobbear.co.uk.

Related actionable inte… Continue reading Historical OSINT – “I Know Who DDoS-ed Georgia and Bobbear.co.uk Last Summer”

Historical OSINT – Sub7 Crew Releases New Version on 11th Anniversary of The RAT

It’s 2010 and I’ve recently came across to the following announcement at Sub7’s Main Forum – the most ubiquitous trojan horse also known as Remote Access Tool circa the 90’s on the upcoming release of a new version.

“People can buy unique FUD servers … Continue reading Historical OSINT – Sub7 Crew Releases New Version on 11th Anniversary of The RAT

Bing Warns VLC Media Player Site is ‘Suspicious’ in Likely False-Positive Gaff

After identifying the official VLC media download page as “unsafe” with its Bing search engine, Microsoft now suggests it was done in error. Continue reading Bing Warns VLC Media Player Site is ‘Suspicious’ in Likely False-Positive Gaff

HIstorical OSINT – Malicious Economies of Scale – The Emergence of Efficient Platforms for Exploitation – 2007

Dear blog readers it’s been several years since I last posted a quality update following my 2010 disappearance. As it’s been quite a significant period of time since I last posted a quality update I feel it’s about time I post an quality update by deta… Continue reading HIstorical OSINT – Malicious Economies of Scale – The Emergence of Efficient Platforms for Exploitation – 2007

Historical OSINT – Massive Blackhat SEO Campaign Spotted in the Wild Serves Scareware

It’s 2010 and I’ve recently stumbled upon a currently active and circulating malicious and fraudulent blackhat SEO campaign successfully enticing hundreds of thousands globally into interacting with a multi-tude of rogue and malicious software also kno… Continue reading Historical OSINT – Massive Blackhat SEO Campaign Spotted in the Wild Serves Scareware

Historical OSINT – A Diversified Portfolio of Fake Security Software Spotted in the Wild

It’s 2010 and I’ve recently stumbled upon yet another malicious and fraudulent domain portfolio serving a variety of fake security software also known as scareware potentially exposing hundreds of thousands of users to a variety of fake security softwa… Continue reading Historical OSINT – A Diversified Portfolio of Fake Security Software Spotted in the Wild

Historical OSINT – A Diversified Portfolio of Fake Security Software

It’s 2010 and I’ve recently stumbled upon a currently active and circulating malicious and fraudulent porfolio of fake security software also known as scareware potentially enticing hundreds of thousands of users to a multi-tude of malicious software w… Continue reading Historical OSINT – A Diversified Portfolio of Fake Security Software

Historical OSINT – Massive Blackhat SEO Campaign Spotted in the Wild Drops Scareware

It’s 2008 and I’ve recently stumbled upon a currently active malicious and fraudulent blackhat SEO campaign successfully enticing users into falling victim into fake security software also known as scareware including a variety of dropped fake codecs l… Continue reading Historical OSINT – Massive Blackhat SEO Campaign Spotted in the Wild Drops Scareware

Historical OSINT – Spamvertized Swine Flu Domains – Part Two

It’s 2010 and I’ve recently came across to a currently active diverse portfolio of Swine Flu related domains further enticing users into interacting with rogue and malicious content.

In this post I’ll profile and expose a currently active malicious do… Continue reading Historical OSINT – Spamvertized Swine Flu Domains – Part Two