ddanchev.blogspot.com Open in urlscan Pro
2a00:1450:4001:800::2001  Public Scan

URL: https://ddanchev.blogspot.com/2022/06/a-compilation-of-known-conti-ransomware_19.html/
Submission: On August 30 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

https://ddanchev.blogspot.com/search

<form action="https://ddanchev.blogspot.com/search" class="gsc-search-box" target="_top">
  <table cellpadding="0" cellspacing="0" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <input autocomplete="off" class="gsc-input" name="q" size="10" title="search" type="text" value="">
        </td>
        <td class="gsc-search-button">
          <input class="gsc-search-button" title="search" type="submit" value="Search">
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Sorry, the page you were looking for in this blog does not exist.
Sorry, the page you were looking for in this blog does not exist.

Home

Subscribe to: Posts (Atom)



ABOUT ME

Dancho Danchev Independent Security Consultancy, Threat Intelligence Analysis
(OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on
demand. Insightful, unbiased, and client-tailored assessments, neatly
communicated in the form of interactive reports - because anticipating the
emerging threatscape is what shapes the big picture at the end of the day.
Approach me at dancho.danchev@hush.com View my complete profile



SEARCH






DARK WEB ONION






FEATURED POST


DANCHO DANCHEV'S DISAPPEARANCE - 2010 - OFFICIAL COMPLAINT AGAINST REPUBLIC OF
BULGARIA REGARDING DANCHO DANCHEV'S ILLEGAL LAW ENFORCEMENT ARREST HOME
MOLESTATION AND KIDNAPPING ATTEMPT - A COMPILATION






DANCHO DANCHEV'S ILLEGAL LAW ENFORCEMENT ARREST HOME MOLESTATION AND KIDNAPPING
ATTEMPT CIRCA 2010

 * A Profile of a Bulgarian Kidnapper – Pavlin Georgiev (Павлин Георгиев/Васил
   Моев Гачевски/Явор - Колев) – An Elaboration on Dancho Danchev’s
   Disappearance circa 2010 – An Analysis
 * An Update on My Disappearance and Kidnapping Attempt Courtesy of Bulgarian
   Law Enforcement Officers from the City of Troyan Bulgaria Circa 2010 - An
   Analysis
 * Courtesy of Republic of Bulgaria!
 * Courtesy of Republic of Bulgaria! - Part Five
 * Courtesy of Republic of Bulgaria! - Part Four
 * Courtesy of Republic of Bulgaria! - Part Three
 * Courtesy of Republic of Bulgaria! - Part Two
 * Dancho Danchev's Disappearance - 2010 - Official Complaint Against Republic
   of Bulgaria - Part Three
 * Dancho Danchev's Disappearance - 2010 - Official Complaint Against Republic
   of Bulgaria - Part Two
 * Dancho Danchev's Disappearance - An Elaboration - Part Two
 * Dancho Danchev's Disappearance 2010 - Official Complaint Against Republic of
   Bulgaria
 * Deep from the Trenches in Bulgaria - Part Three
 * Deep from the Trenches in Bulgaria - Part Two
 * How I Got Robbed and Beaten and Illegally Arrested by a Local Troyan Gang in
   Bulgaria
 * What You Get From "Peasant-aria Land" - A New Cyber Security Center - Behold
   Yourself To the Almighty Savior! - An Analysis




SUBSCRIBE

Posts
Atom

Posts

All Comments
Atom

All Comments




Join the Blue Ribbon Online Free Speech Campaign!





BLOGS I FOLLOW

 * Adam Shoshtack
 * Anton Chuvakin
 * Astalavista.box.sk
 * Astalavista.com
 * Bruce Schneier
 * CERIAS Purdue
 * Cryptome.org
 * CSO Online
 * Dan Kaminsky
 * DarkReading
 * Electronic Frontier Foundation
 * Electronic Privacy Information Center
 * Google Security Blog
 * Graham Cluley
 * HelpNetSecurity
 * Information Security Magazine
 * KrebsOnSecurity
 * Lastwatchdog
 * Naked Security
 * SCMagazine
 * Securelist
 * SecurityWeekly
 * Talos Intelligence
 * Tao Security
 * ThreatPost
 * Virus Bulletin Blog
 * Webroot Threat Blog
 * WeLiveSecurity
 * ZDNet Zero Day Blog




BLOG ARCHIVE

 * ▼  2022 (128)
   * August (23)
   * July (17)
   * June (26)
   * April (3)
   * March (11)
   * February (14)
   * January (34)

 * ►  2021 (177)
   * December (14)
   * November (9)
   * October (27)
   * September (21)
   * August (2)
   * July (13)
   * June (13)
   * May (11)
   * April (20)
   * March (24)
   * February (14)
   * January (9)

 * ►  2020 (52)
   * December (29)
   * November (1)
   * October (1)
   * September (4)
   * August (3)
   * July (8)
   * June (1)
   * May (2)
   * February (1)
   * January (2)

 * ►  2019 (58)
   * December (9)
   * November (1)
   * October (1)
   * September (8)
   * August (2)
   * July (6)
   * May (13)
   * April (3)
   * March (1)
   * February (10)
   * January (4)

 * ►  2018 (34)
   * December (2)
   * October (26)
   * September (1)
   * July (2)
   * May (1)
   * January (2)

 * ►  2017 (16)
   * November (3)
   * July (1)
   * May (10)
   * January (2)

 * ►  2016 (46)
   * December (12)
   * September (4)
   * August (9)
   * June (3)
   * May (13)
   * April (5)

 * ►  2015 (3)
   * August (2)
   * July (1)

 * ►  2014 (11)
   * October (1)
   * March (3)
   * January (7)

 * ►  2013 (78)
   * December (5)
   * November (12)
   * October (3)
   * September (5)
   * August (14)
   * July (7)
   * June (7)
   * May (5)
   * April (5)
   * March (3)
   * February (6)
   * January (6)

 * ►  2012 (38)
   * December (2)
   * November (7)
   * October (3)
   * September (4)
   * August (2)
   * July (2)
   * June (2)
   * May (4)
   * April (2)
   * March (2)
   * February (2)
   * January (6)

 * ►  2011 (58)
   * December (1)
   * October (7)
   * September (4)
   * August (4)
   * July (3)
   * June (1)
   * May (10)
   * April (5)
   * March (12)
   * February (6)
   * January (5)

 * ►  2010 (89)
   * September (2)
   * August (3)
   * July (7)
   * June (7)
   * May (16)
   * April (15)
   * March (13)
   * February (17)
   * January (9)

 * ►  2009 (134)
   * December (9)
   * November (13)
   * October (9)
   * September (10)
   * August (12)
   * July (14)
   * June (11)
   * May (11)
   * April (11)
   * March (11)
   * February (12)
   * January (11)

 * ►  2008 (267)
   * December (10)
   * November (15)
   * October (25)
   * September (17)
   * August (26)
   * July (38)
   * June (19)
   * May (33)
   * April (30)
   * March (19)
   * February (21)
   * January (14)

 * ►  2007 (332)
   * December (20)
   * November (33)
   * October (32)
   * September (28)
   * August (25)
   * July (22)
   * June (20)
   * May (30)
   * April (20)
   * March (41)
   * February (32)
   * January (29)

 * ►  2006 (326)
   * December (20)
   * November (20)
   * October (28)
   * September (40)
   * August (27)
   * July (28)
   * June (29)
   * May (33)
   * April (20)
   * March (19)
   * February (23)
   * January (39)

 * ►  2005 (6)
   * December (6)




LABEL

 * 29A
 * 29A Virus Coding Group
 * 419 Scam
 * AbdAllah
 * Abdallah Internet Hizmetleri
 * Able Danger
 * Abuse Department
 * Active Security Monitor
 * Advance Fee Scam
 * Advanced Persistent Threat
 * Advertising
 * Adware
 * Affiliate Network
 * Ahmad Al Agha
 * Al Qaeda
 * Aleksandr Zhukov
 * Allied Group Inc
 * Amazon AWS
 * ANA Spoofer Project
 * Android
 * Anonymity
 * Anonymizer
 * Anonymous
 * Anonymous Hacking Collective
 * Anti-Phishing Group
 * Antivirus
 * Antivirus Signatures
 * Anton Nikolaevich Korotchenko
 * AOL
 * API
 * Apple
 * APT
 * Aqua ZeuS Gang
 * Armadillo Phone
 * Ashiyane Digital Security Team
 * ASProx
 * Astalavista
 * Astalavista Security Group
 * Astalavista.box.sk
 * ATM Skimmer
 * ATS
 * Australia
 * Authentication
 * Avalance Botnet
 * Avast
 * Background Check
 * BadB
 * Bahama Botnet
 * BakaSoftware
 * Bantu
 * BBC
 * Bebo
 * Bed Time Reading
 * Behrooz Kamalian
 * Best Practices
 * BGP
 * Big Brother
 * Bill Gates Botnet
 * Biography
 * Biometrics
 * Bitcoin
 * Bjorn Andreasson
 * Black Energy
 * Blackhat SEO
 * Blood and Honor
 * Blood and Honor Bulgaria
 * Boeing
 * Bogus Account
 * bother
 * Botners
 * Botnet
 * Botnets
 * Box.sk
 * Brian Krebs
 * Brute-Forcing
 * Bulgaria
 * Bulgaria Law Enforcement
 * Bulgarian Cyber Army
 * Bulgarian Cyber Army Hacking Group
 * Bullet Proof Hosting
 * Bust
 * C4I
 * CALEA
 * Caller ID
 * Caller ID Spoofer
 * Candid Wuest
 * CAPTCHA
 * Career Enrichment
 * Cash Transfers
 * CCTV
 * CDT
 * Cell Phone Monitoring
 * Cell Phone Surveillance
 * CellDEK
 * Censorship
 * Center for Democracy and Technology
 * CERT
 * Cheyenne Mountain Operations Center
 * Child Pornography
 * China
 * China Eagle Union
 * CIA
 * CipherTrust
 * Classified Information
 * Client-Side Exploits
 * Client-Side Vulnerabilities
 * CNO
 * COCOM
 * Cold War
 * COMINT
 * Competitive Intelligence
 * Compliance
 * Computer Crime Survey
 * Computer Network Operation
 * Conficker
 * Confidential Connections
 * Conspiracy
 * Conspiracy Theory
 * Conti
 * Conti Ransomware
 * Conti Gang
 * Conti Ransomware
 * Conti Ransomware Gang
 * Cookies
 * CoolWebSearch
 * Corporate Risk Management
 * Counter Espionage
 * Counter Intelligence
 * Credit Cards
 * Crimeware
 * Critical Infrastructure
 * Crusade Affiliates
 * Crypters
 * Cryptography
 * Cryptome
 * Cryptoviral Extortion
 * CSIA
 * CVE
 * Cyber Attack
 * Cyber Espionage
 * Cyber Insurance
 * Cyber Jihad
 * Cyber Militia
 * Cyber Security Industry Alliance
 * Cyber Security Investment
 * Cyber Terrorism
 * Cyber Threat Actor Attribution Maltego Graphs
 * Cyber Warfare
 * Cyber Weapon
 * Cyber Weapons
 * CyberCamp 2016
 * Cybercrime
 * Cybercrime Ecosystem
 * Cybercrime Forum
 * Cybercrime Forum Data Set
 * Cybercrime Incident Response
 * Cybercrime Incident Response Maltego Graphs
 * Cybercrime Search Engine
 * Cybercriminal
 * Cyberpunk
 * Cyberspace
 * Cybertronics
 * Daniel Brandt
 * Dark Vader
 * Dark Forum
 * Dark Web
 * Dark Web Onion
 * Dark Web Search Engine
 * DarkComet RAT
 * Darkode
 * Darkode Forum Community
 * Data Acquisition
 * Data Breach
 * Data Center
 * Data Leak
 * Data Mining
 * David Endler
 * DCLeaks
 * DDoS
 * DDoS For Hire
 * Defense Complex
 * Delicious Information Warfare
 * Denmark
 * Department of Defense
 * DHS
 * DIA
 * Digital Armaments
 * Digital Forensics
 * Digital Rights
 * Dilbert
 * Disinformation
 * Distributed Computing
 * Distributed Computing Project
 * Distributed Project
 * DNS
 * DNS Changer
 * DoD
 * DoJ
 * DotCom
 * DreamHost
 * Dropbox
 * Durzhavna Sigurnost
 * DVD of the Weekend
 * E-Banking
 * E-Business
 * E-Commerce
 * E-Shop
 * Eavesdropping
 * Ebay
 * ECHELON
 * ECOFIN Projects
 * Economics
 * eID
 * Electric Universe
 * Electromagnetic Pulse Weapons
 * Electronic Banking
 * ELINT
 * Emotet
 * Emotet Botnet
 * EMP
 * Encrochat
 * Encrochat Database Leak
 * Encrypted Communication
 * Encrypted Phone
 * Encryption
 * Enigma
 * ENISA
 * Enki Bilal
 * Enron
 * Erasmus Bridge
 * Eric Goldman
 * Espionage
 * Espionage Movie
 * Evgeniy Mikhaylovich Bogachev
 * Exmanoize
 * Exploit Broker
 * Exploit Kit
 * Exploits
 * Eyeball Series
 * F-Secure
 * Facebook
 * Fake Account
 * Fake Adobe Flash Player
 * Fake Certificate
 * Fake Chrome Extension
 * Fake Chrome Update
 * Fake Code Signing Certificate
 * Fake Confirmed Facebook Friend Request Email
 * Fake Documents
 * Fake Facebook Appeal
 * Fake Facebook Notification
 * Fake Facebook Profile Spy Application
 * Fake Firefox Update
 * Fake Hosting Provider
 * Fake ID
 * Fake Internet Explorer Update
 * Fake Passport
 * Fake Personal ID
 * Fake Safari Update
 * Fake Security Software
 * Fake Tech Support Scam
 * Fake Utility Bill
 * Fake Video Codec
 * Fake Visa
 * Fake Visa Application
 * Fake Web Site
 * Fake Who's Viewed Your Facebook Profile Extension
 * Fake YouTube Player
 * Fast-Flux
 * FBI
 * FBI Most Wanted
 * FCC
 * FDIC
 * Financial Management
 * Firas Nur Al Din Dardar
 * FireEye
 * Flashpoint Intel
 * Foreign Influence Operations
 * Forensics
 * Forwarderz
 * FoxNews
 * Fraud
 * Free Speech
 * FSB
 * FTLog
 * FTLog Worm
 * Gartner
 * Gavril Danilkin
 * GazTranzitStroyInfo
 * GCHQ
 * GDBOP
 * Generation I
 * George Bush
 * Georgi Markov
 * Georgia
 * Germany
 * Gift Cards
 * GiveMeDB
 * Global Security Challenge
 * Goa Trance
 * GoDaddy
 * Google
 * Google Firebase
 * Google Ads
 * Google Docs
 * Google Earth
 * Google Groups
 * Google Hacking
 * Google Maps
 * Google Play
 * Google Store
 * Greece
 * Growth Hacker
 * GRU
 * Guccifer 2.0
 * GUI
 * Gumblar
 * Hacked Database
 * Hacked Web Site
 * Hacker
 * Hackers
 * Hacking
 * Hacking Book
 * Hacking Forum
 * Hacking Group
 * Hacking Groups
 * Hacking Tools
 * HackPhreak
 * HackPhreak Hacking Group
 * Hacktivism
 * Haiti
 * Hamas
 * Hezbollah
 * High Tech Brazil Hack Team
 * Hilary Kneber
 * HKLeaks
 * Home Molestation
 * Homebrew
 * Honeynet Project
 * Honker Union of China
 * HUMINT
 * ICBM
 * ID Theft
 * iDefense
 * Identity Theft
 * Illegal Arrest
 * Illegal Hosting
 * Illegal Restraint
 * IMINT
 * IMLogic
 * India
 * India Company
 * Indicator of Compromise
 * Information Operations
 * Information Security
 * Information Security Forum
 * Information Security Market
 * Information Warfare
 * Infrastructure Security
 * InFraud
 * InFraud Cybercrime Gang
 * InFraud Cybercrime Syndicate
 * InFraud Organization
 * Innovative Marketing
 * InqTana Mac OS X Malware
 * Insider
 * Insider Monitoring
 * Insider Threat
 * Instant Messaging
 * Intellectual Property
 * Intelligence
 * Intelligence Agency
 * Intelligence Community
 * Internal Revenue Service
 * International Exploit Shop
 * Internet
 * Internet Censorship
 * Internet Economy
 * Internet Relay Chat
 * Investment Banking
 * IoC
 * IP Cloaking
 * IP Hiding
 * IP Spoofing
 * iPowerWeb
 * IPSec
 * IPv4
 * IPv6
 * Iran
 * Iran Election
 * Iran Election 2009
 * Iran Hacker Groups
 * Iran Hacking Groups
 * Iran Mabna Hackers
 * IRC
 * IRS
 * ISIS
 * Israel
 * Jabber
 * JabberZeuS
 * Javor Kolev
 * Jeffrey Carr
 * Joanna Rutkowska
 * Johannes Ullrich
 * John Young
 * K Rudolph
 * Kaseya
 * Kaseya Ransomware Attack
 * Katrina
 * Keylogger
 * KGB
 * Kidnapping
 * Koobface
 * Koobface Botnet
 * Korean Demilitarized Zone
 * KrotReal
 * Latest News Articles
 * Latvia
 * Law Enforcement
 * Lawful Interception
 * Leaks
 * Lenovo
 * Liberty Front Press Network
 * Lizamoon
 * Loads.cc
 * Localization
 * Location Tracking
 * Lockheed Martin
 * Logicube
 * Lone Gunmen
 * Lovely Horse
 * Lubyanka Square Headquarters
 * M4 Project
 * Mac OS X
 * Malicious Domain
 * Malicious Software
 * Maltego
 * Maltego Graphs
 * Malvertising
 * Malware
 * Malware Information Sharing Platform
 * Marketing
 * Mass Web Site Defacement
 * Mastercard
 * McAfee
 * MD5
 * Media Methane
 * Memoir
 * Metrics
 * Microsoft
 * Microsoft Live
 * Military Communications
 * Ministry of Interior
 * MISP
 * Missile Base
 * Mobile
 * Mobile Application
 * Mobile Communication Censorship
 * Mobile Internet
 * Mobile Location Tracking
 * Mobile Malware
 * Mobile Security
 * Mohammad Sagegh Ahmadzadegan
 * Money Laundering
 * Money Mule
 * Money Mule Recruitment
 * Monoculture
 * Morgan Stanley
 * Moses Staff
 * Most Wanted Cybercriminals
 * MSN
 * MSRC
 * MSRC Researcher Recognition Program
 * Muhammad Cartoons
 * MVR
 * MyWebFace
 * NASA
 * National Cyber Security Centre
 * National Security
 * Native Intelligence
 * NBC
 * NCSC
 * NetAssist LLC
 * NetCraft
 * Network Centric Warfare
 * Network Solutions
 * New Media
 * Nikolay Nedyalkov
 * Nikopol Trilogy
 * Nintendo
 * Nintendo DS
 * NordVPN
 * Norman Sandbox
 * North Korea
 * North Korea Missile Launch Pad
 * NSA
 * NSO Group
 * NSO Group Spyware
 * Nuclear Weapons
 * Nyxem
 * OEM
 * Offensive Cyber Warfare
 * OMEMO
 * Omerta
 * One-Time Password
 * One-Time Passwords In Everything
 * OneCare
 * Online Advertising
 * Online Fraud
 * Online Marketing
 * Online Propaganda Campaign
 * Online Scam
 * Open Source Malware
 * Operation EQUALIZER
 * Operation Uncle George
 * OPIE
 * OPSEC
 * Osama Bin Laden
 * OSINT
 * OSINT Training
 * OTC
 * OTP
 * Over-The-Counter
 * Packers
 * Parked Domains
 * Passwords
 * Pavlin Georgiev
 * Pay Per Install
 * PayPal
 * Perplex City
 * Persistent Cookies
 * Personal Career
 * Personal Data
 * Pharmaceutical Scams
 * Phileas Crawler
 * Phishing
 * Phishing Campaign
 * Phishing Domain Farm
 * Phishing Toolbar
 * PhishTube
 * Phreedom
 * Physical Security
 * Pinterest
 * Piracy
 * PlushForums
 * Podcast
 * Point of Sale Terrminal
 * Politics
 * PornTube
 * POS
 * Potentially Unwanted Application
 * PR
 * Press Coverage
 * Privacy
 * Project RAHAB
 * Prolexic
 * Protonmail
 * Proxy Service
 * Psychedelic Trance
 * PSYOPS
 * Psytrance
 * Psytrance Song of the Day
 * Qassam Cyber Fighters
 * Radicati Group
 * Ransomware
 * RAT
 * Ray Kurzweil
 * RBN
 * Reconnaissance Satellite
 * Red Joan
 * Regulation
 * Remote Access Tool
 * Reporters Without Borders
 * Return On Investment
 * Return On Security Investment
 * REvil Ransomware Group
 * Revolution in Militvry Affairs
 * RIPA
 * Risk Management
 * Rogue Account
 * Rogue Chrome Extension
 * Rogue Facebook Appeal
 * Rogue Security Software
 * Rogue Video Codec
 * Rogue YouTube Player
 * Rogueware
 * ROI
 * Roman Polesek
 * Root Server
 * Rootkit
 * ROSI
 * RSA
 * RSA Conference
 * Russia
 * Russia Small Group
 * Russian
 * Russian Bomber
 * Russian Business Network
 * Russian Cyber War
 * Russian Submarine
 * Safe Harbor
 * Satellite Imagery
 * Satellite Jamming
 * Satellite SIGINT
 * Scam
 * Scams
 * Scandoo
 * ScanSafe
 * Scareware
 * Scientific Intelligence
 * Scribd
 * Search Engine
 * Search Engine Optimization
 * SEC
 * SecondEye Solutions
 * Secret Service
 * Secure Communication
 * SecureDrop
 * Securities and Exchange Commission
 * Security
 * Security Awareness
 * Security Book
 * Security Breach
 * Security Conference
 * Security Education
 * Security Event
 * Security Forum
 * Security Game
 * Security Industry
 * Security Interviews
 * Security Investment
 * Security Metrics
 * Security Podcast
 * Security Project
 * Security Research
 * Security Statistics
 * Security Training
 * Security Trends
 * Sensitive Information
 * SEO
 * Shadow Server
 * ShadowCrew
 * SIGINT
 * Silent Circle
 * Sipco Systems
 * SIPRNET
 * SITE Institute
 * SiteAdvisor
 * Skype
 * Sniffing
 * Social Engineering
 * Social Network Analysis
 * SocialMediaSystem
 * Software Piracy
 * Solarwinds
 * Song of the Day
 * Sophos
 * Soviet Union
 * Space Warfare
 * Space Weapons
 * Spam
 * Spam Campaign
 * Spam Operations
 * Spear Phishing
 * Spoofing
 * Sprott Asset Management
 * Spyware
 * SQL Injection
 * SSL
 * SSN
 * Stalkware
 * Starlight
 * Stealth Ideas Inc
 * Steganography
 * STIX
 * STIX2
 * Stolen Credit Card
 * Stolen Credit Cards
 * Stolen Gift Cards
 * Strider Crawler
 * Sub7
 * Suri Pluma
 * Surveillance
 * Swine Flu
 * Symantec
 * Symbian
 * Syria
 * Syrian Electronic Army
 * Syrian Embassy
 * Taia Global
 * TAN
 * TAXII
 * TDoS
 * Team Code Zero
 * Team Code Zero Hacking Group
 * Tech Support Scam
 * Technical Collection
 * Technical Mujahid
 * Telephony Denial of Service Attack
 * Terrorism
 * THAAD
 * The Bunker
 * The Immortals
 * The Lawnmower Man
 * The Outer Limits
 * Thought Leadership
 * Thousand Talents Program
 * Threat Intelligence
 * Threat Intelligence Feed
 * Threat Intelligence Report
 * TIA
 * Tipping Point
 * Top Secret Program
 * Tor
 * Tor Project
 * Torrent
 * TorrentReactor
 * Total Information Awareness
 * Travel Without Moving
 * TrendMicro
 * Trickbot
 * Trickbot Gang
 * Trickbot Malware
 * Trickbot Malware Gang
 * Trifinite Group
 * Trojan Horse
 * TROYAK-AS
 * Tutanota
 * Twitter
 * Two Factor Authentication
 * Two-Factor Authentication
 * Typosquatting
 * U.K National Cyber Security Centre
 * U.S Bureau of Engraving and Printing
 * U.S Cyber Command
 * U.S Driving License
 * U.S Elections
 * U.S Sanctions
 * U.S Secret Service
 * Ukraine
 * Ukraine Cyber War
 * Underground Search Engine
 * United Kingdom
 * University ID Card
 * Vasil Moev Gachevski
 * Vault 7
 * VeriSign
 * Vertex Net Loader
 * Virtual Private Network
 * Virtual Reality
 * Virtual Reality Social Network
 * Virtual World
 * Virus
 * Virus for You
 * Virus Map
 * Virus Recovery Button
 * Viruses
 * VirusTotal
 * Visa
 * Visual Information System
 * Visualization
 * Void Balaur Malware Gang
 * VoIP
 * VPN
 * Vulnerabilities
 * Vulnerability Broker
 * War Driving
 * War Games
 * Weapon Systems
 * Web 2.0
 * Web Application Worm
 * Web Crawler
 * Web Inject
 * Web Proxy Service
 * Web Shells
 * Web Site Defacement
 * Web Site Defacement Groups
 * Webroot
 * WHGDG
 * WhoisXML API
 * WhoisXML API Jabber ZeuS Gang
 * Wireless
 * Wireless Hacking
 * Wireless Internet
 * Wiretapping
 * WMF Vulnerability
 * World Hacker Global Domination Group
 * X-Files
 * X-Tunnel
 * XMPP
 * XSS
 * Yahoo
 * Yaroslav Vasinskyi
 * Yavor Kolev
 * YouTube
 * ZDNet
 * ZDNet Zero Day Blog
 * Zero Day Exploit
 * Zero Day Initiative
 * Zerodium
 * ZeuS
 * Zombie Alert
 * Zone-H
 * Zotob




GIRL POWER!






THE LAB - CIRCA 2006






DANCHO DANCHEV'S FAN CLUB!






FORBES BULGARIA






LOVELY HORSE






DANCHO DANCHEV'S FAN CLUB!






BLOG STATISTICS






KOOBFACE BOTNET!






E-BOOK COMPILATION






ZDNET ARTICLES






WEBROOT RESEARCH






MEDIUM RESEARCH






UNIT-123 RESEARCH






IRAN RESEARCH REPORT






IRAN RESEARCH REPORT






CYBER INTELLIGENCE MEMOIR






MOBILE APPLICATION






TAGS

29A 29A Virus Coding Group 419 Scam AbdAllah Abdallah Internet Hizmetleri Able
Danger Abuse Department Active Security Monitor Advance Fee Scam Advanced
Persistent Threat Advertising Adware Affiliate Network Ahmad Al Agha Al Qaeda
Aleksandr Zhukov Allied Group Inc Amazon AWS ANA Spoofer Project Android
Anonymity Anonymizer Anonymous Anonymous Hacking Collective Anti-Phishing Group
Antivirus Antivirus Signatures Anton Nikolaevich Korotchenko AOL API Apple APT
Aqua ZeuS Gang Armadillo Phone Ashiyane Digital Security Team ASProx Astalavista
Astalavista Security Group Astalavista.box.sk ATM Skimmer ATS Australia
Authentication Avalance Botnet Avast Background Check BadB Bahama Botnet
BakaSoftware Bantu BBC Bebo Bed Time Reading Behrooz Kamalian Best Practices BGP
Big Brother Bill Gates Botnet Biography Biometrics Bitcoin Bjorn Andreasson
Black Energy Blackhat SEO Blood and Honor Blood and Honor Bulgaria Boeing Bogus
Account bother Botners Botnet Botnets Box.sk Brian Krebs Brute-Forcing Bulgaria
Bulgaria Law Enforcement Bulgarian Cyber Army Bulgarian Cyber Army Hacking Group
Bullet Proof Hosting Bust C4I CALEA Caller ID Caller ID Spoofer Candid Wuest
CAPTCHA Career Enrichment Cash Transfers CCTV CDT Cell Phone Monitoring Cell
Phone Surveillance CellDEK Censorship Center for Democracy and Technology CERT
Cheyenne Mountain Operations Center Child Pornography China China Eagle Union
CIA CipherTrust Classified Information Client-Side Exploits Client-Side
Vulnerabilities CNO COCOM Cold War COMINT Competitive Intelligence Compliance
Computer Crime Survey Computer Network Operation Conficker Confidential
Connections Conspiracy Conspiracy Theory Conti Conti Ransomware Conti Gang Conti
Ransomware Conti Ransomware Gang Cookies CoolWebSearch Corporate Risk Management
Counter Espionage Counter Intelligence Credit Cards Crimeware Critical
Infrastructure Crusade Affiliates Crypters Cryptography Cryptome Cryptoviral
Extortion CSIA CVE Cyber Attack Cyber Espionage Cyber Insurance Cyber Jihad
Cyber Militia Cyber Security Industry Alliance Cyber Security Investment Cyber
Terrorism Cyber Threat Actor Attribution Maltego Graphs Cyber Warfare Cyber
Weapon Cyber Weapons CyberCamp 2016 Cybercrime Cybercrime Ecosystem Cybercrime
Forum Cybercrime Forum Data Set Cybercrime Incident Response Cybercrime Incident
Response Maltego Graphs Cybercrime Search Engine Cybercriminal Cyberpunk
Cyberspace Cybertronics Daniel Brandt Dark Vader Dark Forum Dark Web Dark Web
Onion Dark Web Search Engine DarkComet RAT Darkode Darkode Forum Community Data
Acquisition Data Breach Data Center Data Leak Data Mining David Endler DCLeaks
DDoS DDoS For Hire Defense Complex Delicious Information Warfare Denmark
Department of Defense DHS DIA Digital Armaments Digital Forensics Digital Rights
Dilbert Disinformation Distributed Computing Distributed Computing Project
Distributed Project DNS DNS Changer DoD DoJ DotCom DreamHost Dropbox Durzhavna
Sigurnost DVD of the Weekend E-Banking E-Business E-Commerce E-Shop
Eavesdropping Ebay ECHELON ECOFIN Projects Economics eID Electric Universe
Electromagnetic Pulse Weapons Electronic Banking ELINT Emotet Emotet Botnet EMP
Encrochat Encrochat Database Leak Encrypted Communication Encrypted Phone
Encryption Enigma ENISA Enki Bilal Enron Erasmus Bridge Eric Goldman Espionage
Espionage Movie Evgeniy Mikhaylovich Bogachev Exmanoize Exploit Broker Exploit
Kit Exploits Eyeball Series F-Secure Facebook Fake Account Fake Adobe Flash
Player Fake Certificate Fake Chrome Extension Fake Chrome Update Fake Code
Signing Certificate Fake Confirmed Facebook Friend Request Email Fake Documents
Fake Facebook Appeal Fake Facebook Notification Fake Facebook Profile Spy
Application Fake Firefox Update Fake Hosting Provider Fake ID Fake Internet
Explorer Update Fake Passport Fake Personal ID Fake Safari Update Fake Security
Software Fake Tech Support Scam Fake Utility Bill Fake Video Codec Fake Visa
Fake Visa Application Fake Web Site Fake Who's Viewed Your Facebook Profile
Extension Fake YouTube Player Fast-Flux FBI FBI Most Wanted FCC FDIC Financial
Management Firas Nur Al Din Dardar FireEye Flashpoint Intel Foreign Influence
Operations Forensics Forwarderz FoxNews Fraud Free Speech FSB FTLog FTLog Worm
Gartner Gavril Danilkin GazTranzitStroyInfo GCHQ GDBOP Generation I George Bush
Georgi Markov Georgia Germany Gift Cards GiveMeDB Global Security Challenge Goa
Trance GoDaddy Google Google Firebase Google Ads Google Docs Google Earth Google
Groups Google Hacking Google Maps Google Play Google Store Greece Growth Hacker
GRU Guccifer 2.0 GUI Gumblar Hacked Database Hacked Web Site Hacker Hackers
Hacking Hacking Book Hacking Forum Hacking Group Hacking Groups Hacking Tools
HackPhreak HackPhreak Hacking Group Hacktivism Haiti Hamas Hezbollah High Tech
Brazil Hack Team Hilary Kneber HKLeaks Home Molestation Homebrew Honeynet
Project Honker Union of China HUMINT ICBM ID Theft iDefense Identity Theft
Illegal Arrest Illegal Hosting Illegal Restraint IMINT IMLogic India India
Company Indicator of Compromise Information Operations Information Security
Information Security Forum Information Security Market Information Warfare
Infrastructure Security InFraud InFraud Cybercrime Gang InFraud Cybercrime
Syndicate InFraud Organization Innovative Marketing InqTana Mac OS X Malware
Insider Insider Monitoring Insider Threat Instant Messaging Intellectual
Property Intelligence Intelligence Agency Intelligence Community Internal
Revenue Service International Exploit Shop Internet Internet Censorship Internet
Economy Internet Relay Chat Investment Banking IoC IP Cloaking IP Hiding IP
Spoofing iPowerWeb IPSec IPv4 IPv6 Iran Iran Election Iran Election 2009 Iran
Hacker Groups Iran Hacking Groups Iran Mabna Hackers IRC IRS ISIS Israel Jabber
JabberZeuS Javor Kolev Jeffrey Carr Joanna Rutkowska Johannes Ullrich John Young
K Rudolph Kaseya Kaseya Ransomware Attack Katrina Keylogger KGB Kidnapping
Koobface Koobface Botnet Korean Demilitarized Zone KrotReal Latest News Articles
Latvia Law Enforcement Lawful Interception Leaks Lenovo Liberty Front Press
Network Lizamoon Loads.cc Localization Location Tracking Lockheed Martin
Logicube Lone Gunmen Lovely Horse Lubyanka Square Headquarters M4 Project Mac OS
X Malicious Domain Malicious Software Maltego Maltego Graphs Malvertising
Malware Malware Information Sharing Platform Marketing Mass Web Site Defacement
Mastercard McAfee MD5 Media Methane Memoir Metrics Microsoft Microsoft Live
Military Communications Ministry of Interior MISP Missile Base Mobile Mobile
Application Mobile Communication Censorship Mobile Internet Mobile Location
Tracking Mobile Malware Mobile Security Mohammad Sagegh Ahmadzadegan Money
Laundering Money Mule Money Mule Recruitment Monoculture Morgan Stanley Moses
Staff Most Wanted Cybercriminals MSN MSRC MSRC Researcher Recognition Program
Muhammad Cartoons MVR MyWebFace NASA National Cyber Security Centre National
Security Native Intelligence NBC NCSC NetAssist LLC NetCraft Network Centric
Warfare Network Solutions New Media Nikolay Nedyalkov Nikopol Trilogy Nintendo
Nintendo DS NordVPN Norman Sandbox North Korea North Korea Missile Launch Pad
NSA NSO Group NSO Group Spyware Nuclear Weapons Nyxem OEM Offensive Cyber
Warfare OMEMO Omerta One-Time Password One-Time Passwords In Everything OneCare
Online Advertising Online Fraud Online Marketing Online Propaganda Campaign
Online Scam Open Source Malware Operation EQUALIZER Operation Uncle George OPIE
OPSEC Osama Bin Laden OSINT OSINT Training OTC OTP Over-The-Counter Packers
Parked Domains Passwords Pavlin Georgiev Pay Per Install PayPal Perplex City
Persistent Cookies Personal Career Personal Data Pharmaceutical Scams Phileas
Crawler Phishing Phishing Campaign Phishing Domain Farm Phishing Toolbar
PhishTube Phreedom Physical Security Pinterest Piracy PlushForums Podcast Point
of Sale Terrminal Politics PornTube POS Potentially Unwanted Application PR
Press Coverage Privacy Project RAHAB Prolexic Protonmail Proxy Service
Psychedelic Trance PSYOPS Psytrance Psytrance Song of the Day Qassam Cyber
Fighters Radicati Group Ransomware RAT Ray Kurzweil RBN Reconnaissance Satellite
Red Joan Regulation Remote Access Tool Reporters Without Borders Return On
Investment Return On Security Investment REvil Ransomware Group Revolution in
Militvry Affairs RIPA Risk Management Rogue Account Rogue Chrome Extension Rogue
Facebook Appeal Rogue Security Software Rogue Video Codec Rogue YouTube Player
Rogueware ROI Roman Polesek Root Server Rootkit ROSI RSA RSA Conference Russia
Russia Small Group Russian Russian Bomber Russian Business Network Russian Cyber
War Russian Submarine Safe Harbor Satellite Imagery Satellite Jamming Satellite
SIGINT Scam Scams Scandoo ScanSafe Scareware Scientific Intelligence Scribd
Search Engine Search Engine Optimization SEC SecondEye Solutions Secret Service
Secure Communication SecureDrop Securities and Exchange Commission Security
Security Awareness Security Book Security Breach Security Conference Security
Education Security Event Security Forum Security Game Security Industry Security
Interviews Security Investment Security Metrics Security Podcast Security
Project Security Research Security Statistics Security Training Security Trends
Sensitive Information SEO Shadow Server ShadowCrew SIGINT Silent Circle Sipco
Systems SIPRNET SITE Institute SiteAdvisor Skype Sniffing Social Engineering
Social Network Analysis SocialMediaSystem Software Piracy Solarwinds Song of the
Day Sophos Soviet Union Space Warfare Space Weapons Spam Spam Campaign Spam
Operations Spear Phishing Spoofing Sprott Asset Management Spyware SQL Injection
SSL SSN Stalkware Starlight Stealth Ideas Inc Steganography STIX STIX2 Stolen
Credit Card Stolen Credit Cards Stolen Gift Cards Strider Crawler Sub7 Suri
Pluma Surveillance Swine Flu Symantec Symbian Syria Syrian Electronic Army
Syrian Embassy Taia Global TAN TAXII TDoS Team Code Zero Team Code Zero Hacking
Group Tech Support Scam Technical Collection Technical Mujahid Telephony Denial
of Service Attack Terrorism THAAD The Bunker The Immortals The Lawnmower Man The
Outer Limits Thought Leadership Thousand Talents Program Threat Intelligence
Threat Intelligence Feed Threat Intelligence Report TIA Tipping Point Top Secret
Program Tor Tor Project Torrent TorrentReactor Total Information Awareness
Travel Without Moving TrendMicro Trickbot Trickbot Gang Trickbot Malware
Trickbot Malware Gang Trifinite Group Trojan Horse TROYAK-AS Tutanota Twitter
Two Factor Authentication Two-Factor Authentication Typosquatting U.K National
Cyber Security Centre U.S Bureau of Engraving and Printing U.S Cyber Command U.S
Driving License U.S Elections U.S Sanctions U.S Secret Service Ukraine Ukraine
Cyber War Underground Search Engine United Kingdom University ID Card Vasil Moev
Gachevski Vault 7 VeriSign Vertex Net Loader Virtual Private Network Virtual
Reality Virtual Reality Social Network Virtual World Virus Virus for You Virus
Map Virus Recovery Button Viruses VirusTotal Visa Visual Information System
Visualization Void Balaur Malware Gang VoIP VPN Vulnerabilities Vulnerability
Broker War Driving War Games Weapon Systems Web 2.0 Web Application Worm Web
Crawler Web Inject Web Proxy Service Web Shells Web Site Defacement Web Site
Defacement Groups Webroot WHGDG WhoisXML API WhoisXML API Jabber ZeuS Gang
Wireless Wireless Hacking Wireless Internet Wiretapping WMF Vulnerability World
Hacker Global Domination Group X-Files X-Tunnel XMPP XSS Yahoo Yaroslav
Vasinskyi Yavor Kolev YouTube ZDNet ZDNet Zero Day Blog Zero Day Exploit Zero
Day Initiative Zerodium ZeuS Zombie Alert Zone-H Zotob








SAMPLE TEXT

Dancho Danchev is an expert in the field of cybercrime fighting and threat
intelligence gathering having actively pioneered his own methodology for
processing threat intelligence leading to a successful set ofhundreds of
high-quality analysis and research articles published at the industry's leading
threat intelligence blog- ZDNet's Zero Day, Dancho Danchev's Mind Streams of
Information Security Knowledge and Webroot's ThreatBlog with his research
featured in Techmeme, ZDNet, CNN, PCWorld, SCMagazine, The Register,
NYTimes,CNET, ComputerWorld, H+Magazine currently producing threat intelligence
at the industry's leading threat intelligence blog - Dancho Danchev's - Mind
Streams of Information Security Knowledge which has received over 5.6M page
views since December, 2005 and is currently considered one of the security
industry's most popularsecurity publications. Key achievements include: -
Presented at the GCHQ with the Honeynet Project - SCMagazine Who to Follow on
Twitter for 2011 - Participated in a Top Secret GCHQ Program called "Lovely
Horse" - Identified a major victim of the SolarWinds Attack - PaloAltoNetworks -
Found malware on the Web Site of Flashpoint - Tracked monitored and profiled the
Koobface Botnet and exposed one botnet operator - Made it to Slashdot two times
- My Personal Blog got 5.6M Page Views Since December, 2005 - My old Twitter
Account got 11,000 followers - I had an average of 7,000 RSS readers on my blog
- I have my own vinyl "Blue Sabbath Black Cheer / Griefer – We Hate You Dancho
Danchev" made by a Canadian artist - Currently running Astalavista.box.sk - I
gave an interview to DW on the Koobface Botnet - I gave an interview to NYTimes
on the Koobface botnet - I gave an interview to Russian OSINT - Listed as a
major competitor by Jeffrey Carr's Taia Global - Presented at the GCHQ -
Presented at Interpol - Presented at InfoSec - Presented at CyberCamp -
Presented at RSA Europe

Public Domain Work. All rights Reserved. Dancho Danchev - Email:
dancho.danchev@hush.com. Powered by Blogger.



Diese Website verwendet Cookies von Google, um Dienste anzubieten und Zugriffe
zu analysieren. Deine IP-Adresse und dein User-Agent werden zusammen mit
Messwerten zur Leistung und Sicherheit für Google freigegeben. So können
Nutzungsstatistiken generiert, Missbrauchsfälle erkannt und behoben und die
Qualität des Dienstes gewährleistet werden.Weitere InformationenOk