Exposing the Pay Per Install Underground Business Model – Historical OSINT – An Analysis – 2008 – Part Two

In my previous analysis on the pay per install underground market business model I elaborated more on the actual business model using a variety of images which I’ve collected over the years to showcase the business model sticking to the usual “an … Continue reading Exposing the Pay Per Install Underground Business Model – Historical OSINT – An Analysis – 2008 – Part Two

Exposing the Pay Per Install Underground Business Model – Historical OSINT – An Analysis – 2008

What are some of the primary scareware and adware distributors circa 2008? Which were the most profitable pay-pay-install and drive-by-download affiliate-network based revenue-sharing scheme malicious and fraudulent scareware and adware pushing provide… Continue reading Exposing the Pay Per Install Underground Business Model – Historical OSINT – An Analysis – 2008

Historical OSINT – The Russian Business Network Says “Hi”

You know you’re popular when “they” say “hi”.

It’s 2009 and I’ve received a surprising personal email courtesy of guess who – The Russian Business Network showing off the actual ownership of the hxxp://rbnnetwork.com domain and basically saying “hi”. … Continue reading Historical OSINT – The Russian Business Network Says “Hi”

Profiling “Innovative Marketing” – The Flagship Malvertising andf Scareware Distributor – Circa 2008 – An OSINT Analysis

Continuing the “FBI Most Wanted Cybercriminals” series I’ve decided to take a closer look at “Innovative Marketing” the primary malvertising and scareware distributor participating in several high-profile malvertising and scareware-serving campaigns ci… Continue reading Profiling “Innovative Marketing” – The Flagship Malvertising andf Scareware Distributor – Circa 2008 – An OSINT Analysis

Proprietary Threat Intelligence Reports Available On Demand – Request a Copy Today!

Dear blog readers – I wanted to let everyone know of two — currently in the works — proprietary Threat Intelligence type of reports – that you and your organization can easily acquire on demand. The first report details in-depth including tactics tec… Continue reading Proprietary Threat Intelligence Reports Available On Demand – Request a Copy Today!

Historical OSINT – Yet Another Massive Scareware-Serving Campaign Courtesy of the Koobface Gang

It’s 2010 and I’ve recently came across to yet another currently active scareware-serving campaign courtesy of the Koobface gang this time successfully introducing a CAPTCHA-breaking module potentially improving the propagation and distribution scale w… Continue reading Historical OSINT – Yet Another Massive Scareware-Serving Campaign Courtesy of the Koobface Gang

Historical OSINT – Massive Scareware Serving Campaign Spotted in the Wild

With scareware continuing to proliferate I’ve recently intercepted a currently active malicious and fraudulent blackhat SEO campaign successfully enticing thousands of users into interacting with the rogue and malicious software with the scareware behi… Continue reading Historical OSINT – Massive Scareware Serving Campaign Spotted in the Wild

4 Phishing Attacks that Exploit Two-Factor Authentication (2FA)

Earlier this year, we posted a blog on Two-Factor Authentication (2FA). In it, we …
The post 4 Phishing Attacks that Exploit Two-Factor Authentication (2FA) appeared first on SlashNext.
The post 4 Phishing Attacks that Exploit Two-Factor Authenticati… Continue reading 4 Phishing Attacks that Exploit Two-Factor Authentication (2FA)