ddanchev.blogspot.com Open in urlscan Pro
2a00:1450:4001:82f::2001  Public Scan

URL: https://ddanchev.blogspot.com/2022/01/exposing-currently-active-free-rogue.html
Submission Tags: falconsandbox
Submission: On December 25 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

POST https://www.paypal.com/donate

<form action="https://www.paypal.com/donate" method="post">
  <!-- Identify your business so that you can collect the payments. -->
  <input type="hidden" name="business" value="dancho.danchev@hush.com">
  <!-- Specify details about the contribution -->
  <input type="hidden" name="no_recurring" value="0">
  <input type="hidden" name="item_name" value="Dancho Danchev's Blog">
  <input type="hidden" name="item_number" value="Research Donation">
  <input type="hidden" name="amount" value="100.00">
  <input type="hidden" name="currency_code" value="USD">
  <!-- Display the payment button. -->
  <input type="image" name="submit" src="https://www.paypalobjects.com/en_US/i/btn/btn_donate_LG.gif" alt="Donate">
  <img alt="" width="1" height="1" src="https://www.paypalobjects.com/en_US/i/scr/pixel.gif">
</form>

https://ddanchev.blogspot.com/search

<form action="https://ddanchev.blogspot.com/search" class="gsc-search-box" target="_top">
  <table cellpadding="0" cellspacing="0" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <input autocomplete="off" class="gsc-input" name="q" size="10" title="search" type="text" value="">
        </td>
        <td class="gsc-search-button">
          <input class="gsc-search-button" title="search" type="submit" value="Search">
        </td>
      </tr>
    </tbody>
  </table>
</form>

POST https://app.feedpress.com/e/mailverify

<form style="border:1px solid #ccc;padding:3px;text-align:center;" action="https://app.feedpress.com/e/mailverify" method="post" target="popupwindow" onsubmit="window.open('https://app.feedpress.com/e/mailverify?feed_id=DanchoDanchevBlog', 'popupwindow',
'scrollbars=yes,width=550,height=400');return true">
  <p>Enter your e-mail address:</p>
  <p>
    <input type="text" style="width:140px" name="email">
  </p><input type="hidden" value="DanchoDanchevBlog" name="feed_id">
  <input type="submit" value="Subscribe">
  <p>Powered by <a href="https://feedpress.com" target="_blank">FeedPress</a></p>
</form>

Text Content

DANCHO DANCHEV'S BLOG - MIND STREAMS OF INFORMATION SECURITY KNOWLEDGE

Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email:
dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR:
danchodanchev@xmpp.jp | TOX ID:
2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1





THURSDAY, JANUARY 27, 2022


EXPOSING A CURRENTLY ACTIVE FREE ROGUE VPN DOMAINS PORTFOLIO COURTESY OF THE NSA
- AN OSINT ANALYSIS


Note: This OSINT analysis has been originally published at my current employer's
Web site - https://whoisxmlapi.com where I'm currently acting as a DNS Threat
Researcher since January, 2021.



We’ve recently came across to a currently active free VPN domains portfolio
which based on ourn research and publicly accessible sources appears to be run
and operated by the NSA where the ultimate goal would be to trick users into
using these rogue and bogus free VPN service providers in particular Iran-based
users where the ultimate goal would be to monitor an eavesdrop on their Internet
activities and we’ve decided to take a deeper look inside the Internet-connected
infrastructure of these domains and offer practical and relevant threat
intelligence and cyber attack attribution details on the true origins of the
campaign.

In this case study we’ll offer practical and relevant technical information on
the Internet-connected infrastructure of this campaign with the idea to assist
the security community on its way to track down and monitor this campaign
including to offer actual cyber attack and cyber campaign attribution clues
which could come handy to a security researcher or a threat intelligence analyst
on their way to track down and monitor the campaign.



Original rogue portfolio of fake VPN service domains courtesy of the NSA:

bluewebx[.]com

bluewebx[.]us

irs1[.]ga

iranianvpn[.]net

IRSV[.]ME

DNSSPEEDY[.]TK

ironvpn[.]tk

ironvpn[.]pw

irgomake[.]win

make-account[.]us

make-account[.]ir

IRANTUNEL[.]COM

JET-VPN[.]COM

newhost[.]ir

homeunix[.]net

vpnmakers[.]com

hidethisip[.]info

uk[.]myfastport[.]com

witopia[.]net

worldserver[.]in

music30ty[.]net

misconfused[.]org

privatetunnel[.]com

aseman-sky[.]in



Related domain registrant email addresses known to have been involved in
the campaign:

zodaraxe@yandex[.]com

2alfaman@gmail[.]com

rossma@aliyun[.]com

uletmed@gmail[.]com

xy168899@gmail[.]com

baoma123654@gmail[.]com

88guaji@gmail[.]com

deshintawiida@gmail[.]com

2710282345@qq[.]com

youji364558@163[.]com

ngelaa337@gmail[.]com

THEPOUTHOOEB@HOTMAIL[.]COM

michalrestl@email[.]cz

cfwwx2@126[.]com

20702176@qq[.]com

ljytyhdeai@foxmail[.]com

2140426952@qq[.]com

marocsofiane20@gmail[.]com

17891750@qq[.]com

moniqueburorb@yahoo[.]com

rayyxy@163[.]com

chaxun@dispostable[.]com

Related domains known to have been involved in the campaign:

gaysexvideo[.]us

keezmovies[.]us

hitporntube[.]com

enjoyfreesex[.]com

allfreesextube[.]com

thegaytubes[.]com

sextubeshop[.]com

pornfetishexxx[.]com

ebonypornox[.]com

freepornpig[.]com

marriagesextube[.]com

searchporntubes[.]com

suckporntube[.]com

darlingmatures[.]com

pornretrotube[.]com

teensexfusion[.]net

rough18[.]us

teendorf[.]us

1retrotube[.]com

typeteam[.]com

biosextube[.]com

hadcoreporntube[.]com

reporntube[.]com

telltake[.]com

asianprivatetube[.]com

hostednude[.]com

alfaporn[.]com

sexbring[.]com

porntubem[.]com

newerotictube[.]com

firstretrotube[.]com

oralsexlove[.]com

1bdsmtubes[.]com

hairytubeporn[.]com

brunettetubex[.]com

tubelatinaporn[.]com

xxxgaytubes[.]com

analxxxvideo[.]com

analsexytube[.]com

aeroxxxtube[.]com

amateurpornlove[.]com

admingay[.]com

xxxretrotube[.]com

xxxshemaletubes[.]com

hotpornstartube[.]com

firsttrannytube[.]com

erotixtubes[.]com

1pornstartube[.]com

1asiantube[.]com

18mpegs[.]com

maturediva[.]com

elitematures[.]com

vipmatures[.]com

pcsextube[.]com

porn-vote[.]com

pornbrunettes[.]com

maturedtube[.]com

alfatubes[.]com

maturetubesexy[.]com

justhairyporn[.]com

hotblowjobporn[.]com

homemadetubez[.]com

homemadexx[.]com

golesbiansex[.]com

fuck-k[.]com

freebdsmxxx[.]com

emeraldporntube[.]com

dosextube[.]com

bigtitslove[.]com

yoursex[.]sexy

tubez[.]sexy

japaneseporn[.]win

hdfuck[.]me

tubelesbianporn[.]com

vipebonytube[.]com

vipamateurtube[.]com

largematuretube[.]com

latinosextube[.]com

xxxhardest[.]com

tubebigtit[.]com

tubesexa[.]com

realfetishtube[.]com

pornways[.]com



Related domains known to have been involved in the campaign:

qhbzkj[.]cn

mmbrbdf[.]cn

daosidanbao[.]cn

txxutmgs[.]cn

sdhsyl[.]cn

butrxmgp[.]cn

aiin[.]com[.]cn

xuxinwuliu[.]cn

qaqbhvnb[.]cn

hnldfm[.]cn

tjtyfs[.]cn

china-sum[.]com

bjyfjh[.]cn

lianstea[.]cn

shufaxuetang[.]cn

wdjjsc[.]cn

hjstory[.]cn

domcc[.]cn

918mzj[.]com

chninvest[.]cn

jfcng[.]com

nksale[.]cn

davidzhu[.]cn

tswfg[.]cn

realpornmovies[.]xyz

freepornosvideo[.]xyz

xxxpornomovies[.]xyz

sexbring[.]com

discountsale[.]xyz

howmanyweeksinayear[.]net

nutridot[.]xyz

doomyaffiliate[.]com

gacha3[.]online

hollybox[.]store

slimevideoyoutube[.]com

gooogle[.]site

vtrpic[.]com

hg301[.]com

pornvv[.]com

voonage[.]com

pornonada[.]com

uscab[.]com

pornoporntube[.]com

beaces[.]com

spaziotorte[.]com

spermix[.]com

eyew[.]com

pornky[.]com

cosmos-nc[.]com

pornlow[.]com

topbridal[.]com

coolporntube[.]com

pornotubevideos[.]com

freshporntv[.]com

pornushkin[.]com

pornodayiz[.]com

fjser[.]com

egreenfusion[.]com

ahbest[.]net

cvm[.]cn

spccsd[.]com

kozw[.]com

finalyearprojects[.]net

ylciyuiw[.]com

ylcimgsm[.]com

ylcddldz[.]com

ylchzhvb[.]com

rhshh[.]cn

ylcksqag[.]com

coodj[.]com

ylckigoa[.]com

qzguangda[.]com

ylcawqoq[.]com

laohe360[.]net

ylcxzlxd[.]com

miracure-bio[.]com

nmhxt[.]com

bjaiweiyi[.]com

hermankardon[.]com

ybcvideo[.]com

vindowsad[.]net

hpimsummit[.]com

wilmassage[.]com

cpfpz[.]com

gaysexvideo[.]us

keezmovies[.]us

ylcaiyay[.]com

lewan123[.]com

tbtmzk[.]com

haigouusa[.]com

ztmzp[.]com

hacctv[.]com

zuikuho[.]com

enping1[.]com

xgfxw[.]com

xzkywx[.]com

alotof-people[.]com

choreographyourhealth[.]us

acwt[.]us

somethinglovely[.]us

onlinestock-investing[.]us

lionheartgallery[.]us

host4bit[.]us

computerpartsdirect[.]us

sjb152[.]com

sjb513[.]com

sjb073[.]com

sjb458[.]com

sjb632[.]com

sjb272[.]com

sjb190[.]com

bighank[.]com

funskip[.]com

funnyjp[.]com

n6i[.]com

forgoodfuture[.]com

dzhfgj[.]cn

wbag[.]com

ceducation[.]cn

ahound[.]com

kenchu[.]net

bigsaks[.]com

7l0[.]com

psichiomega[.]us

blankparkzoo[.]us

ujdah[.]us

my-ask[.]com

yourtutor[.]us

cbdemon[.]us

anweigps[.]cn

szdjt[.]cn

yooyle[.]com[.]cn

maturediva[.]com

ccy-sj[.]com[.]cn

ntdoc[.]cn

024jk[.]cn

cd8888[.]cn

tlmlj[.]cn

bjostore[.]com

lockhan[.]cn

yangqiu[.]cn

bigaq[.]com

szca[.]org[.]cn

cnturtle[.]com[.]cn

gzycdz[.]cn

pdshdzz[.]cn

zhjzzz[.]cn

szms678[.]com[.]cn

taifengzd[.]com

100airport[.]cn

rtchache[.]com

dtcs[.]com[.]cn

szhychem[.]cn

lqqz[.]net

hyfk[.]net

geoer[.]cn

jjzyhhy[.]cn

goroog[.]cn

ey-x[.]com

yabtsf[.]cn

blzyds[.]cn

dgtdzs[.]cn

118km[.]cn

ad-cct[.]com

52huimin[.]com

zeshangze[.]com

0971jz[.]com

scxzt[.]cn

sjzxwg[.]cn

yhyizhneit[.]com

51hikao[.]com

holomovie[.]xyz

alisale[.]xyz

itangv[.]com

qhlqq[.]com

pdsyicheng[.]com

sjb925[.]com

sjb312[.]com

sjb301[.]com

yun034[.]com

zhc240[.]com

youpindaojia[.]cn

We’ll continue monitoring the campaign and post updates as soon as new
developments take place

Stay tuned!


- January 27, 2022
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Tags: Cybercrime, NSA, OSINT, Security, Technical Collection, VPN

Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber
Counter Intelligence) and Competitive Intelligence research on demand.
Insightful, unbiased, and client-tailored assessments, neatly communicated in
the form of interactive reports - because anticipating the emerging threatscape
is what shapes the big picture at the end of the day. Approach me at
dancho.danchev@hush.com

NO COMMENTS:





POST A COMMENT





Newer Post Older Post Home

Subscribe to: Post Comments (Atom)



THIS BLOG - 2005 - 2024






ASTALAVISTA.COM




Free Shoutcast HostingRadio Stream Hosting





ABOUT ME

Dancho Danchev Independent Security Consultancy, Threat Intelligence Analysis
(OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on
demand. Insightful, unbiased, and client-tailored assessments, neatly
communicated in the form of interactive reports - because anticipating the
emerging threatscape is what shapes the big picture at the end of the day.
Approach me at dancho.danchev@hush.com View my complete profile



ADVERTISING






ADVERTISING






DARK WEB ONION






DARK WEB ONION E-SHOP FOR THREAT INTELLIGENCE DELIVERABLES






OSINT AND THREAT INTELLIGENCE TRAINING






E-SHOP FOR THREAT INTELLIGENCE DELIVERABLES






MY YOUTUBE CHANNEL






COMPILATION






SUBSCRIBE USING RSS






SEARCH THIS BLOG






SUBSCRIBE USING EMAIL

Enter your e-mail address:



Powered by FeedPress




FOLLOWERS




POPULAR POSTS

 * Exposing Bulgaria's Largest Data Leak - An OSINT Analysis
   I've recently came across to a news article detailing the recently leaked
   Bulgaria NAP records database and I decided to take a closer...
   
 * Dynamic DNS Service Providers for APT Command and Control (C&C) - An Analysis
   Dear blog readers, The following is a compilation of dynamic DNS providers in
   specific ones used by APTs and various other targeted campaign...
   
 * Astalavista.com - Security Community - Official Re-Launch Video
   Link .  
   
 * Astalavista.com
   Link .
   
 * Azerbaijanian Embassies in Pakistan and Hungary Serving Malware
   The very latest addition to the "Compromised International Embassies Series"
   are the Hungarian and Pakistani embassies of the Repu...
   




BLOG ARCHIVE

 * ►  2024 (97)
   * ►  December (2)
   * ►  November (5)
   * ►  October (7)
   * ►  September (16)
   * ►  August (6)
   * ►  July (11)
   * ►  June (11)
   * ►  May (1)
   * ►  April (8)
   * ►  March (3)
   * ►  February (15)
   * ►  January (12)

 * ►  2023 (160)
   * ►  December (15)
   * ►  November (24)
   * ►  October (9)
   * ►  September (25)
   * ►  August (16)
   * ►  July (5)
   * ►  June (8)
   * ►  May (7)
   * ►  April (16)
   * ►  March (14)
   * ►  February (17)
   * ►  January (4)

 * ▼  2022 (252)
   * ►  December (14)
   * ►  November (54)
   * ►  October (45)
   * ►  September (3)
   * ►  August (24)
   * ►  July (17)
   * ►  June (28)
   * ►  May (1)
   * ►  April (3)
   * ►  March (11)
   * ►  February (15)
   * ▼  January (37)
     * Exposing A Portfolio of Shadow Crew Cybercrime-Fri...
     * Exposing A Portfolio of Shadow Crew Cybercrime-Fri...
     * Exposing A Portfolio of Shadow Crew Cybercrime-Fri...
     * Exposing A Portfolio of Shadow Crew Cybercrime-Fri...
     * The Evolution of Encrypted IM Messenging Platforms...
     * Exposing a Currently Active Portfolio of Rogue and...
     * Profiling FBI's Most Wanted Iran-based Cybercrimin...
     * Profing FBI's Most Wanted Cybercriminal Mujtaba Ra...
     * A Peek Inside Today's Modern RATs (Remote Access T...
     * Exposing a Currently Active CoolWebSearch Rogue an...
     * Profiling a Currently Active Personal Email Addres...
     * Exposing a Currently Active CoolWebSearch Rogue an...
     * Exposing a Currently Active CoolWebSearch Domains...
     * Profiling Yaroslav Vasinskyi from the Kaseya Ranso...
     * Exposing FBI's Most Wanted Iran's Mabna Hackers - ...
     * Exposing Behrooz Kamalian's Ashiyane ICT Company -...
     * Profiling the Emotet Botnet C&C Infrastructure - A...
     * Exposing a Currently Active "Jabber ZeuS" also kno...
     * Profiling the Liberty Front Press Network Online -...
     * Profiling Russia's U.S Election Interference 2016 ...
     * Exposing a Currently Active Domain Portfolio Manag...
     * Exposing a Currently Active Free Rogue VPN Domains...
     * Exposing a Currently Active List of Iran-Based Hac...
     * Exposing a Currently Active List of Iran-Based Hac...
     * Who Wants to Support My Work Commercially?
     * Exposing a Portfolio of Pay Per Install Rogue and ...
     * This presentation aims to detail Dancho Danchev's ...
     * Exposing the Internet-Connected Infrastructure of ...
     * Inquire About One-on-One or One-to-Many Virtual OS...
     * My Participation in GCHQ's Top Secret "Lovely Hors...
     * Profiling the Blood and Honor Online Hate Group - ...
     * An Update on My Disappearance and Kidnapping Attem...
     * Sample Portfolio of Dancho Danchev's Personal and ...
     * Exposing the Pay Per Install (PPI) Underground Mar...
     * TrendMicro Releases New Report on a New Cybercrime...
     * Sample Portfolio of Dancho Danchev's Personal and ...
     * "It’s Full of Secrets of User-Generated Classified...

 * ►  2021 (197)
   * ►  December (17)
   * ►  November (9)
   * ►  October (28)
   * ►  September (27)
   * ►  August (2)
   * ►  July (19)
   * ►  June (12)
   * ►  May (11)
   * ►  April (23)
   * ►  March (25)
   * ►  February (15)
   * ►  January (9)

 * ►  2020 (56)
   * ►  December (35)
   * ►  November (1)
   * ►  October (1)
   * ►  September (4)
   * ►  August (3)
   * ►  July (5)
   * ►  June (2)
   * ►  May (2)
   * ►  February (1)
   * ►  January (2)

 * ►  2019 (68)
   * ►  December (9)
   * ►  November (3)
   * ►  October (1)
   * ►  September (11)
   * ►  August (2)
   * ►  July (6)
   * ►  May (16)
   * ►  April (3)
   * ►  March (1)
   * ►  February (11)
   * ►  January (5)

 * ►  2018 (41)
   * ►  December (3)
   * ►  November (2)
   * ►  October (25)
   * ►  September (1)
   * ►  August (2)
   * ►  July (3)
   * ►  May (3)
   * ►  January (2)

 * ►  2017 (16)
   * ►  November (3)
   * ►  July (1)
   * ►  May (10)
   * ►  January (2)

 * ►  2016 (46)
   * ►  December (12)
   * ►  September (4)
   * ►  August (9)
   * ►  June (3)
   * ►  May (13)
   * ►  April (5)

 * ►  2015 (3)
   * ►  August (2)
   * ►  July (1)

 * ►  2014 (11)
   * ►  October (1)
   * ►  March (3)
   * ►  January (7)

 * ►  2013 (77)
   * ►  December (5)
   * ►  November (12)
   * ►  October (3)
   * ►  September (5)
   * ►  August (13)
   * ►  July (7)
   * ►  June (7)
   * ►  May (5)
   * ►  April (5)
   * ►  March (3)
   * ►  February (6)
   * ►  January (6)

 * ►  2012 (38)
   * ►  December (2)
   * ►  November (7)
   * ►  October (3)
   * ►  September (4)
   * ►  August (2)
   * ►  July (2)
   * ►  June (2)
   * ►  May (4)
   * ►  April (2)
   * ►  March (2)
   * ►  February (2)
   * ►  January (6)

 * ►  2011 (59)
   * ►  December (1)
   * ►  October (8)
   * ►  September (4)
   * ►  August (4)
   * ►  July (3)
   * ►  June (1)
   * ►  May (10)
   * ►  April (5)
   * ►  March (12)
   * ►  February (6)
   * ►  January (5)

 * ►  2010 (90)
   * ►  September (2)
   * ►  August (3)
   * ►  July (7)
   * ►  June (7)
   * ►  May (16)
   * ►  April (15)
   * ►  March (13)
   * ►  February (17)
   * ►  January (10)

 * ►  2009 (134)
   * ►  December (9)
   * ►  November (13)
   * ►  October (9)
   * ►  September (10)
   * ►  August (12)
   * ►  July (14)
   * ►  June (11)
   * ►  May (11)
   * ►  April (11)
   * ►  March (11)
   * ►  February (12)
   * ►  January (11)

 * ►  2008 (267)
   * ►  December (10)
   * ►  November (15)
   * ►  October (25)
   * ►  September (17)
   * ►  August (26)
   * ►  July (38)
   * ►  June (19)
   * ►  May (33)
   * ►  April (30)
   * ►  March (19)
   * ►  February (21)
   * ►  January (14)

 * ►  2007 (331)
   * ►  December (19)
   * ►  November (33)
   * ►  October (32)
   * ►  September (28)
   * ►  August (25)
   * ►  July (22)
   * ►  June (20)
   * ►  May (30)
   * ►  April (20)
   * ►  March (41)
   * ►  February (32)
   * ►  January (29)

 * ►  2006 (325)
   * ►  December (20)
   * ►  November (20)
   * ►  October (28)
   * ►  September (40)
   * ►  August (27)
   * ►  July (28)
   * ►  June (28)
   * ►  May (33)
   * ►  April (20)
   * ►  March (19)
   * ►  February (23)
   * ►  January (39)

 * ►  2005 (6)
   * ►  December (6)




SUBSCRIBE TO

Posts
Atom

Posts

Comments
Atom

Comments





LABELS

Security (646) Information Security (599) Cybercrime (335) Hacking (233)
Malicious Software (190) Botnet (160) OSINT (119) Cyber Espionage (73) Technical
Collection (73) Cyber Warfare (68) Information Warfare (67) Cyber Attack (61)
Scareware (50) Malware (49) Fake Security Software (48) Cyber Terrorism (40)
Exploits (39) Vulnerabilities (39) Cybercrime Forum (37) Intelligence Community
(36) Cyber Jihad (34) Privacy (34) Anonymity (31) Client-Side Exploits (30)
Client-Side Vulnerabilities (30) Law Enforcement (30) Koobface (29) Censorship
(28) Blackhat SEO (27) Money Mule (26) Money Mule Recruitment (26) Search Engine
Optimization (26) Eavesdropping (24) Money Laundering (24) Surveillance (24)
Internet Censorship (23) Cyberspace (22) Botnets (21) Cybercrime Ecosystem (21)
Ransomware (20) Intelligence (19) Iran (19) Bulgaria (18) Threat Intelligence
(18) Fraud (17) Free Speech (17) Intelligence Agency (17) NSA (16) Search Engine
(16) CIA (15) Facebook (15) Internet (15) Bulgaria Law Enforcement (14)
Kidnapping (14) Cybercrime Forum Data Set (13) Illegal Arrest (13) Online Fraud
(12) Phishing (12) Russia (12) Google (11) DDoS (10) Dark Web (10) Data Breach
(10) Exploit Broker (10) Mass Web Site Defacement (10) Mobile Malware (10)
Return On Security Investment (10) Spam (10) Vulnerability Broker (10) Web Site
Defacement (10) WhoisXML API (10) Wiretapping (10) China (9) Cyber Security
Investment (9) Insider Threat (9) New Media (9) Return On Investment (9) Scams
(9) Stolen Credit Card (9) Travel Without Moving (9) Conti (8) Conti Gang (8)
Conti Ransomware Gang (8) Digital Rights (8) Encryption (8) Fake Passport (8)
GCHQ (8) Home Molestation (8) Insider (8) Operation Uncle George (8) Phishing
Campaign (8) Security Trends (8) Terrorism (8) Affiliate Network (7) Astalavista
(7) Conti Ransomware (7) Conti Ransomware (7) Credit Cards (7) Cyber Militia (7)
Fake Documents (7) Fake ID (7) Iran Hacker Groups (7) Iran Hacking Groups (7)
KGB (7) ROSI (7) Spam Campaign (7) Spam Operations (7) Antivirus (6)
Cryptography (6) Data Mining (6) Encrypted Communication (6) Espionage (6)
Google Docs (6) Instant Messaging (6) Investment Banking (6) Maltego (6)
Security Industry (6) Zero Day Exploit (6) Ashiyane Digital Security Team (5)
DVD of the Weekend (5) Dark Web Onion (5) FBI Most Wanted (5) Hacked Database
(5) Hacked Web Site (5) Hacking Group (5) Hacktivism (5) Information Security
Market (5) Jabber (5) Lawful Interception (5) Mobile (5) Mobile Location
Tracking (5) Online Advertising (5) Security Investment (5) ShadowCrew (5)
Social Network Analysis (5) Stolen Credit Cards (5) Symantec (5) Virtual Reality
(5) 419 Scam (4) Astalavista.box.sk (4) CoolWebSearch (4) Corporate Risk
Management (4) Cyberpunk (4) Distributed Computing (4) Distributed Computing
Project (4) Distributed Project (4) FBI (4) Fake Adobe Flash Player (4) Fake
Utility Bill (4) Fake Who's Viewed Your Facebook Profile Extension (4) Georgia
(4) Google Earth (4) Hilary Kneber (4) ID Theft (4) Identity Theft (4) Internet
Economy (4) Malvertising (4) Personal Data (4) Protonmail (4) Remote Access Tool
(4) Russian Business Network (4) Scam (4) Security Breach (4) SiteAdvisor (4)
Social Engineering (4) TIA (4) The Outer Limits (4) Total Information Awareness
(4) Twitter (4) United Kingdom (4) Virtual Reality Social Network (4) Virtual
World (4) Web Site Defacement Groups (4) XMPP (4) ZeuS (4) Advertising (3)
Adware (3) Al Qaeda (3) Antivirus Signatures (3) Big Brother (3) Competitive
Intelligence (3) Compliance (3) Crimeware (3) Cybertronics (3) DoD (3) Durzhavna
Sigurnost (3) E-Business (3) EMP (3) Economics (3) Electromagnetic Pulse Weapons
(3) Fast-Flux (3) Google Maps (3) IMLogic (3) Illegal Restraint (3) Koobface
Botnet (3) Lenovo (3) Lone Gunmen (3) MSN (3) Mac OS X (3) McAfee (3) Microsoft
(3) Mobile Internet (3) Network Solutions (3) North Korea (3) Nuclear Weapons
(3) Online Marketing (3) Online Scam (3) Open Source Malware (3) Pay Per Install
(3) ROI (3) Rogueware (3) SQL Injection (3) STIX (3) STIX2 (3) Satellite Imagery
(3) Security Interviews (3) Security Metrics (3) Security Statistics (3) Space
Warfare (3) Spyware (3) TAXII (3) Two-Factor Authentication (3) Typosquatting
(3) U.S Elections (3) VPN (3) Visualization (3) Web 2.0 (3) iDefense (3) AOL (2)
ASProx (2) Advance Fee Scam (2) Advanced Persistent Threat (2) Android (2)
Armadillo Phone (2) Authentication (2) Avalance Botnet (2) Behrooz Kamalian (2)
Best Practices (2) C4I (2) CAPTCHA (2) CSIA (2) Counter Espionage (2) Critical
Infrastructure (2) Cryptome (2) Cryptoviral Extortion (2) Cyber Threat Actor
Attribution Maltego Graphs (2) DNS (2) Dark Web Search Engine (2) Data Leak (2)
David Endler (2) Department of Defense (2) Digital Forensics (2) E-Banking (2)
E-Commerce (2) E-Shop (2) ECHELON (2) Emotet (2) Enigma (2) Eric Goldman (2)
Espionage Movie (2) Exploit Kit (2) FSB (2) Fake Video Codec (2) Foreign
Influence Operations (2) Forensics (2) Forwarderz (2) Google Hacking (2) Growth
Hacker (2) HUMINT (2) Hacker (2) Hackers (2) IMINT (2) IP Cloaking (2) IPv6 (2)
Information Operations (2) Insider Monitoring (2) International Exploit Shop (2)
JabberZeuS (2) Johannes Ullrich (2) Latest News Articles (2) Lizamoon (2)
Location Tracking (2) Lovely Horse (2) Marketing (2) Memoir (2) Military
Communications (2) Mobile Application (2) Mobile Security (2) NBC (2) National
Security (2) One-Time Passwords In Everything (2) PSYOPS (2) Passwords (2)
Phishing Toolbar (2) Podcast (2) Potentially Unwanted Application (2)
Psychedelic Trance (2) Psytrance (2) Psytrance Song of the Day (2) Qassam Cyber
Fighters (2) Reconnaissance Satellite (2) Risk Management (2) Rogue Security
Software (2) Root Server (2) SEO (2) SIGINT (2) SIPRNET (2) SSL (2) SecondEye
Solutions (2) Security Awareness (2) Security Conference (2) Security Event (2)
Security Podcast (2) Sensitive Information (2) Skype (2) Song of the Day (2)
Spear Phishing (2) Syria (2) TROYAK-AS (2) The Lawnmower Man (2) Threat
Intelligence Feed (2) TrendMicro (2) Trojan Horse (2) Tutanota (2) U.S Bureau of
Engraving and Printing (2) Virtual Private Network (2) Viruses (2) Visual
Information System (2) VoIP (2) WMF Vulnerability (2) Web Crawler (2) Webroot
(2) Wireless (2) Wireless Internet (2) X-Files (2) Yahoo (2) Zero Day Initiative
(2) Zombie Alert (2) Zone-H (2) 29A (1) 29A Virus Coding Group (1) ANA Spoofer
Project (1) API (1) APT (1) ATM Skimmer (1) ATS (1) AbdAllah (1) Abdallah
Internet Hizmetleri (1) Able Danger (1) Abuse Department (1) Active Security
Monitor (1) Ahmad Al Agha (1) Aleksandr Zhukov (1) Allied Group Inc (1) Amazon
AWS (1) Anonymizer (1) Anonymous (1) Anonymous Hacking Collective (1)
Anti-Phishing Group (1) Anton Nikolaevich Korotchenko (1) Apple (1) Aqua ZeuS
Gang (1) Astalavista Security Group (1) Australia (1) Avast (1) BBC (1) BGP (1)
Background Check (1) BadB (1) Bahama Botnet (1) BakaSoftware (1) Bantu (1) Bebo
(1) Bed Time Reading (1) Bill Gates Botnet (1) Biography (1) Biometrics (1)
Bitcoin (1) Bjorn Andreasson (1) Black Energy (1) Blood and Honor (1) Blood and
Honor Bulgaria (1) Boeing (1) Bogus Account (1) Botners (1) Box.sk (1) Brian
Krebs (1) Brute-Forcing (1) Bulgarian Cyber Army (1) Bulgarian Cyber Army
Hacking Group (1) Bullet Proof Hosting (1) Bust (1) CALEA (1) CCTV (1) CDT (1)
CERT (1) CNO (1) COCOM (1) COMINT (1) CVE (1) Caller ID (1) Caller ID Spoofer
(1) Candid Wuest (1) Career Enrichment (1) Cash Transfers (1) Cell Phone
Monitoring (1) Cell Phone Surveillance (1) CellDEK (1) Center for Democracy and
Technology (1) Cheyenne Mountain Operations Center (1) China Eagle Union (1)
CipherTrust (1) Classified Information (1) Cold War (1) Computer Crime Survey
(1) Computer Network Operation (1) Conficker (1) Confidential Connections (1)
Conspiracy (1) Conspiracy Theory (1) Cookies (1) Counter Intelligence (1)
Crusade Affiliates (1) Crypters (1) Cyber Insurance (1) Cyber Security Industry
Alliance (1) Cyber Weapon (1) Cyber Weapons (1) CyberCamp 2016 (1) Cybercrime
Incident Response (1) Cybercrime Incident Response Maltego Graphs (1) Cybercrime
Search Engine (1) Cybercriminal (1) DCLeaks (1) DDoS For Hire (1) DHS (1) DIA
(1) DNS Changer (1) Daniel Brandt (1) Dark Vader (1) Dark Forum (1) DarkComet
RAT (1) Darkode (1) Darkode Forum Community (1) Data Acquisition (1) Data Center
(1) Defense Complex (1) Delicious Information Warfare (1) Denmark (1) Digital
Armaments (1) Dilbert (1) DoJ (1) DotCom (1) DreamHost (1) Dropbox (1) ECOFIN
Projects (1) ELINT (1) ENISA (1) Ebay (1) Electric Universe (1) Electronic
Banking (1) Emotet Botnet (1) Encrochat (1) Encrochat Database Leak (1)
Encrypted Phone (1) Enki Bilal (1) Enron (1) Erasmus Bridge (1) Evgeniy
Mikhaylovich Bogachev (1) Exmanoize (1) Eyeball Series (1) F-Secure (1) FCC (1)
FDIC (1) FTLog (1) FTLog Worm (1) Fake Account (1) Fake Certificate (1) Fake
Chrome Extension (1) Fake Chrome Update (1) Fake Code Signing Certificate (1)
Fake Confirmed Facebook Friend Request Email (1) Fake Facebook Appeal (1) Fake
Facebook Notification (1) Fake Facebook Profile Spy Application (1) Fake Firefox
Update (1) Fake Hosting Provider (1) Fake Internet Explorer Update (1) Fake
Personal ID (1) Fake Safari Update (1) Fake Tech Support Scam (1) Fake Visa (1)
Fake Visa Application (1) Fake Web Site (1) Fake YouTube Player (1) Financial
Management (1) Firas Nur Al Din Dardar (1) FireEye (1) Flashpoint Intel (1)
FoxNews (1) GDBOP (1) GRU (1) GUI (1) Gartner (1) Gavril Danilkin (1)
GazTranzitStroyInfo (1) Generation I (1) George Bush (1) Georgi Markov (1)
Germany (1) Gift Cards (1) GiveMeDB (1) Global Security Challenge (1) GoDaddy
(1) Goa Trance (1) Google Firebase (1) Google Ads (1) Google Groups (1) Google
Play (1) Google Store (1) Greece (1) Guccifer 2.0 (1) Gumblar (1) HKLeaks (1)
HackPhreak (1) HackPhreak Hacking Group (1) Hacking Book (1) Hacking Forum (1)
Hacking Groups (1) Hacking Tools (1) Haiti (1) Hamas (1) Hezbollah (1) High Tech
Brazil Hack Team (1) Homebrew (1) Honeynet Project (1) Honker Union of China (1)
ICBM (1) IP Hiding (1) IP Spoofing (1) IPSec (1) IPv4 (1) IRC (1) IRS (1) ISIS
(1) Illegal Hosting (1) InFraud (1) InFraud Cybercrime Gang (1) InFraud
Cybercrime Syndicate (1) InFraud Organization (1) India (1) India Company (1)
Indicator of Compromise (1) Information Security Forum (1) Infrastructure
Security (1) InqTana Mac OS X Malware (1) Intellectual Property (1) Internal
Revenue Service (1) Internet Relay Chat (1) IoC (1) Iran Election (1) Iran
Election 2009 (1) Iran Mabna Hackers (1) Israel (1) Javor Kolev (1) Jeffrey Carr
(1) Joanna Rutkowska (1) John Young (1) K Rudolph (1) Kaseya (1) Kaseya
Ransomware Attack (1) Katrina (1) Keylogger (1) Korean Demilitarized Zone (1)
KrotReal (1) Latvia (1) Leaks (1) Liberty Front Press Network (1) Loads.cc (1)
Localization (1) Lockheed Martin (1) Logicube (1) Lubyanka Square Headquarters
(1) M4 Project (1) MD5 (1) MISP (1) MSRC (1) MSRC Researcher Recognition Program
(1) MVR (1) Maltego Graphs (1) Malware Information Sharing Platform (1)
Mastercard (1) Media Methane (1) Metrics (1) Microsoft Live (1) Ministry of
Interior (1) Missile Base (1) Mobile Communication Censorship (1) Mohammad
Sagegh Ahmadzadegan (1) Monoculture (1) Morgan Stanley (1) Moses Staff (1) Most
Wanted Cybercriminals (1) Muhammad Cartoons (1) MyWebFace (1) NASA (1) NCSC (1)
NSO Group (1) NSO Group Spyware (1) National Cyber Security Centre (1) Native
Intelligence (1) NetAssist LLC (1) NetCraft (1) Network Centric Warfare (1)
Nikolay Nedyalkov (1) Nikopol Trilogy (1) Nintendo (1) Nintendo DS (1) NordVPN
(1) Norman Sandbox (1) North Korea Missile Launch Pad (1) Nyxem (1) OEM (1)
OMEMO (1) OPIE (1) OPSEC (1) OSINT Training (1) OTC (1) OTP (1) Offensive Cyber
Warfare (1) Omerta (1) One-Time Password (1) OneCare (1) Online Propaganda
Campaign (1) Operation EQUALIZER (1) Osama Bin Laden (1) Over-The-Counter (1)
POS (1) PR (1) Packers (1) Parked Domains (1) Pavlin Georgiev (1) PayPal (1)
Perplex City (1) Persistent Cookies (1) Personal Career (1) Pharmaceutical Scams
(1) Phileas Crawler (1) PhishTube (1) Phishing Domain Farm (1) Phreedom (1)
Physical Security (1) Pinterest (1) Piracy (1) PlushForums (1) Point of Sale
Terrminal (1) Politics (1) PornTube (1) Press Coverage (1) Project RAHAB (1)
Prolexic (1) Proxy Service (1) RAT (1) RBN (1) REvil Ransomware Group (1) RIPA
(1) RSA (1) RSA Conference (1) Radicati Group (1) Ray Kurzweil (1) Red Joan (1)
Regulation (1) Reporters Without Borders (1) Revolution in Militvry Affairs (1)
Rogue Account (1) Rogue Chrome Extension (1) Rogue Facebook Appeal (1) Rogue
Video Codec (1) Rogue YouTube Player (1) Roman Polesek (1) Rootkit (1) Russia
Small Group (1) Russian (1) Russian Bomber (1) Russian Submarine (1) SEC (1)
SITE Institute (1) SSN (1) Safe Harbor (1) Satellite Jamming (1) Satellite
SIGINT (1) ScanSafe (1) Scandoo (1) Scientific Intelligence (1) Scribd (1)
Secret Service (1) Secure Communication (1) SecureDrop (1) Securities and
Exchange Commission (1) Security Book (1) Security Directory (1) Security
Education (1) Security Forum (1) Security Game (1) Security Project (1) Security
Research (1) Security Training (1) Shadow Server (1) Silent Circle (1) Sipco
Systems (1) Sniffing (1) SocialMediaSystem (1) Software Piracy (1) Solarwinds
(1) Sophos (1) Soviet Union (1) Space Weapons (1) Spoofing (1) Sprott Asset
Management (1) Stalkware (1) Starlight (1) Stealth Ideas Inc (1) Steganography
(1) Stolen Gift Cards (1) Strider Crawler (1) Sub7 (1) Suri Pluma (1) Swine Flu
(1) Symbian (1) Syrian Electronic Army (1) Syrian Embassy (1) TAN (1) TDoS (1)
THAAD (1) Taia Global (1) Team Code Zero (1) Team Code Zero Hacking Group (1)
Tech Support Scam (1) Technical Mujahid (1) Telephony Denial of Service Attack
(1) The Bunker (1) The Immortals (1) Thought Leadership (1) Thousand Talents
Program (1) Threat Intelligence Report (1) Tipping Point (1) Top Secret Program
(1) Tor (1) Tor Project (1) Torrent (1) TorrentReactor (1) Trickbot (1) Trickbot
Gang (1) Trickbot Malware (1) Trickbot Malware Gang (1) Trifinite Group (1) Two
Factor Authentication (1) U.K National Cyber Security Centre (1) U.S Cyber
Command (1) U.S Driving License (1) U.S Sanctions (1) U.S Secret Service (1)
Underground Search Engine (1) University ID Card (1) Vasil Moev Gachevski (1)
Vault 7 (1) VeriSign (1) Vertex Net Loader (1) Virus (1) Virus Map (1) Virus
Recovery Button (1) Virus for You (1) VirusTotal (1) Visa (1) Void Balaur
Malware Gang (1) WHGDG (1) War Driving (1) War Games (1) Weapon Systems (1) Web
Application Worm (1) Web Inject (1) Web Proxy Service (1) Web Shells (1)
WhoisXML API Jabber ZeuS Gang (1) Wireless Hacking (1) World Hacker Global
Domination Group (1) X-Tunnel (1) XSS (1) Yaroslav Vasinskyi (1) Yavor Kolev (1)
YouTube (1) ZDNet (1) ZDNet Zero Day Blog (1) Zerodium (1) Zotob (1) bother (1)
eID (1) iPowerWeb (1) th3j35t3r (1)







Powered by Blogger.



Diese Website verwendet Cookies von Google, um Dienste anzubieten und Zugriffe
zu analysieren. Deine IP-Adresse und dein User-Agent werden zusammen mit
Messwerten zur Leistung und Sicherheit für Google freigegeben. So können
Nutzungsstatistiken generiert, Missbrauchsfälle erkannt und behoben und die
Qualität des Dienstes gewährleistet werden.Weitere InformationenOk