ddanchev.blogspot.com
Open in
urlscan Pro
2a00:1450:4001:82f::2001
Public Scan
URL:
https://ddanchev.blogspot.com/2022/01/exposing-currently-active-free-rogue.html
Submission Tags: falconsandbox
Submission: On December 25 via api from US — Scanned from DE
Submission Tags: falconsandbox
Submission: On December 25 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMPOST https://www.paypal.com/donate
<form action="https://www.paypal.com/donate" method="post">
<!-- Identify your business so that you can collect the payments. -->
<input type="hidden" name="business" value="dancho.danchev@hush.com">
<!-- Specify details about the contribution -->
<input type="hidden" name="no_recurring" value="0">
<input type="hidden" name="item_name" value="Dancho Danchev's Blog">
<input type="hidden" name="item_number" value="Research Donation">
<input type="hidden" name="amount" value="100.00">
<input type="hidden" name="currency_code" value="USD">
<!-- Display the payment button. -->
<input type="image" name="submit" src="https://www.paypalobjects.com/en_US/i/btn/btn_donate_LG.gif" alt="Donate">
<img alt="" width="1" height="1" src="https://www.paypalobjects.com/en_US/i/scr/pixel.gif">
</form>
https://ddanchev.blogspot.com/search
<form action="https://ddanchev.blogspot.com/search" class="gsc-search-box" target="_top">
<table cellpadding="0" cellspacing="0" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<input autocomplete="off" class="gsc-input" name="q" size="10" title="search" type="text" value="">
</td>
<td class="gsc-search-button">
<input class="gsc-search-button" title="search" type="submit" value="Search">
</td>
</tr>
</tbody>
</table>
</form>
POST https://app.feedpress.com/e/mailverify
<form style="border:1px solid #ccc;padding:3px;text-align:center;" action="https://app.feedpress.com/e/mailverify" method="post" target="popupwindow" onsubmit="window.open('https://app.feedpress.com/e/mailverify?feed_id=DanchoDanchevBlog', 'popupwindow',
'scrollbars=yes,width=550,height=400');return true">
<p>Enter your e-mail address:</p>
<p>
<input type="text" style="width:140px" name="email">
</p><input type="hidden" value="DanchoDanchevBlog" name="feed_id">
<input type="submit" value="Subscribe">
<p>Powered by <a href="https://feedpress.com" target="_blank">FeedPress</a></p>
</form>
Text Content
DANCHO DANCHEV'S BLOG - MIND STREAMS OF INFORMATION SECURITY KNOWLEDGE Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1 THURSDAY, JANUARY 27, 2022 EXPOSING A CURRENTLY ACTIVE FREE ROGUE VPN DOMAINS PORTFOLIO COURTESY OF THE NSA - AN OSINT ANALYSIS Note: This OSINT analysis has been originally published at my current employer's Web site - https://whoisxmlapi.com where I'm currently acting as a DNS Threat Researcher since January, 2021. We’ve recently came across to a currently active free VPN domains portfolio which based on ourn research and publicly accessible sources appears to be run and operated by the NSA where the ultimate goal would be to trick users into using these rogue and bogus free VPN service providers in particular Iran-based users where the ultimate goal would be to monitor an eavesdrop on their Internet activities and we’ve decided to take a deeper look inside the Internet-connected infrastructure of these domains and offer practical and relevant threat intelligence and cyber attack attribution details on the true origins of the campaign. In this case study we’ll offer practical and relevant technical information on the Internet-connected infrastructure of this campaign with the idea to assist the security community on its way to track down and monitor this campaign including to offer actual cyber attack and cyber campaign attribution clues which could come handy to a security researcher or a threat intelligence analyst on their way to track down and monitor the campaign. Original rogue portfolio of fake VPN service domains courtesy of the NSA: bluewebx[.]com bluewebx[.]us irs1[.]ga iranianvpn[.]net IRSV[.]ME DNSSPEEDY[.]TK ironvpn[.]tk ironvpn[.]pw irgomake[.]win make-account[.]us make-account[.]ir IRANTUNEL[.]COM JET-VPN[.]COM newhost[.]ir homeunix[.]net vpnmakers[.]com hidethisip[.]info uk[.]myfastport[.]com witopia[.]net worldserver[.]in music30ty[.]net misconfused[.]org privatetunnel[.]com aseman-sky[.]in Related domain registrant email addresses known to have been involved in the campaign: zodaraxe@yandex[.]com 2alfaman@gmail[.]com rossma@aliyun[.]com uletmed@gmail[.]com xy168899@gmail[.]com baoma123654@gmail[.]com 88guaji@gmail[.]com deshintawiida@gmail[.]com 2710282345@qq[.]com youji364558@163[.]com ngelaa337@gmail[.]com THEPOUTHOOEB@HOTMAIL[.]COM michalrestl@email[.]cz cfwwx2@126[.]com 20702176@qq[.]com ljytyhdeai@foxmail[.]com 2140426952@qq[.]com marocsofiane20@gmail[.]com 17891750@qq[.]com moniqueburorb@yahoo[.]com rayyxy@163[.]com chaxun@dispostable[.]com Related domains known to have been involved in the campaign: gaysexvideo[.]us keezmovies[.]us hitporntube[.]com enjoyfreesex[.]com allfreesextube[.]com thegaytubes[.]com sextubeshop[.]com pornfetishexxx[.]com ebonypornox[.]com freepornpig[.]com marriagesextube[.]com searchporntubes[.]com suckporntube[.]com darlingmatures[.]com pornretrotube[.]com teensexfusion[.]net rough18[.]us teendorf[.]us 1retrotube[.]com typeteam[.]com biosextube[.]com hadcoreporntube[.]com reporntube[.]com telltake[.]com asianprivatetube[.]com hostednude[.]com alfaporn[.]com sexbring[.]com porntubem[.]com newerotictube[.]com firstretrotube[.]com oralsexlove[.]com 1bdsmtubes[.]com hairytubeporn[.]com brunettetubex[.]com tubelatinaporn[.]com xxxgaytubes[.]com analxxxvideo[.]com analsexytube[.]com aeroxxxtube[.]com amateurpornlove[.]com admingay[.]com xxxretrotube[.]com xxxshemaletubes[.]com hotpornstartube[.]com firsttrannytube[.]com erotixtubes[.]com 1pornstartube[.]com 1asiantube[.]com 18mpegs[.]com maturediva[.]com elitematures[.]com vipmatures[.]com pcsextube[.]com porn-vote[.]com pornbrunettes[.]com maturedtube[.]com alfatubes[.]com maturetubesexy[.]com justhairyporn[.]com hotblowjobporn[.]com homemadetubez[.]com homemadexx[.]com golesbiansex[.]com fuck-k[.]com freebdsmxxx[.]com emeraldporntube[.]com dosextube[.]com bigtitslove[.]com yoursex[.]sexy tubez[.]sexy japaneseporn[.]win hdfuck[.]me tubelesbianporn[.]com vipebonytube[.]com vipamateurtube[.]com largematuretube[.]com latinosextube[.]com xxxhardest[.]com tubebigtit[.]com tubesexa[.]com realfetishtube[.]com pornways[.]com Related domains known to have been involved in the campaign: qhbzkj[.]cn mmbrbdf[.]cn daosidanbao[.]cn txxutmgs[.]cn sdhsyl[.]cn butrxmgp[.]cn aiin[.]com[.]cn xuxinwuliu[.]cn qaqbhvnb[.]cn hnldfm[.]cn tjtyfs[.]cn china-sum[.]com bjyfjh[.]cn lianstea[.]cn shufaxuetang[.]cn wdjjsc[.]cn hjstory[.]cn domcc[.]cn 918mzj[.]com chninvest[.]cn jfcng[.]com nksale[.]cn davidzhu[.]cn tswfg[.]cn realpornmovies[.]xyz freepornosvideo[.]xyz xxxpornomovies[.]xyz sexbring[.]com discountsale[.]xyz howmanyweeksinayear[.]net nutridot[.]xyz doomyaffiliate[.]com gacha3[.]online hollybox[.]store slimevideoyoutube[.]com gooogle[.]site vtrpic[.]com hg301[.]com pornvv[.]com voonage[.]com pornonada[.]com uscab[.]com pornoporntube[.]com beaces[.]com spaziotorte[.]com spermix[.]com eyew[.]com pornky[.]com cosmos-nc[.]com pornlow[.]com topbridal[.]com coolporntube[.]com pornotubevideos[.]com freshporntv[.]com pornushkin[.]com pornodayiz[.]com fjser[.]com egreenfusion[.]com ahbest[.]net cvm[.]cn spccsd[.]com kozw[.]com finalyearprojects[.]net ylciyuiw[.]com ylcimgsm[.]com ylcddldz[.]com ylchzhvb[.]com rhshh[.]cn ylcksqag[.]com coodj[.]com ylckigoa[.]com qzguangda[.]com ylcawqoq[.]com laohe360[.]net ylcxzlxd[.]com miracure-bio[.]com nmhxt[.]com bjaiweiyi[.]com hermankardon[.]com ybcvideo[.]com vindowsad[.]net hpimsummit[.]com wilmassage[.]com cpfpz[.]com gaysexvideo[.]us keezmovies[.]us ylcaiyay[.]com lewan123[.]com tbtmzk[.]com haigouusa[.]com ztmzp[.]com hacctv[.]com zuikuho[.]com enping1[.]com xgfxw[.]com xzkywx[.]com alotof-people[.]com choreographyourhealth[.]us acwt[.]us somethinglovely[.]us onlinestock-investing[.]us lionheartgallery[.]us host4bit[.]us computerpartsdirect[.]us sjb152[.]com sjb513[.]com sjb073[.]com sjb458[.]com sjb632[.]com sjb272[.]com sjb190[.]com bighank[.]com funskip[.]com funnyjp[.]com n6i[.]com forgoodfuture[.]com dzhfgj[.]cn wbag[.]com ceducation[.]cn ahound[.]com kenchu[.]net bigsaks[.]com 7l0[.]com psichiomega[.]us blankparkzoo[.]us ujdah[.]us my-ask[.]com yourtutor[.]us cbdemon[.]us anweigps[.]cn szdjt[.]cn yooyle[.]com[.]cn maturediva[.]com ccy-sj[.]com[.]cn ntdoc[.]cn 024jk[.]cn cd8888[.]cn tlmlj[.]cn bjostore[.]com lockhan[.]cn yangqiu[.]cn bigaq[.]com szca[.]org[.]cn cnturtle[.]com[.]cn gzycdz[.]cn pdshdzz[.]cn zhjzzz[.]cn szms678[.]com[.]cn taifengzd[.]com 100airport[.]cn rtchache[.]com dtcs[.]com[.]cn szhychem[.]cn lqqz[.]net hyfk[.]net geoer[.]cn jjzyhhy[.]cn goroog[.]cn ey-x[.]com yabtsf[.]cn blzyds[.]cn dgtdzs[.]cn 118km[.]cn ad-cct[.]com 52huimin[.]com zeshangze[.]com 0971jz[.]com scxzt[.]cn sjzxwg[.]cn yhyizhneit[.]com 51hikao[.]com holomovie[.]xyz alisale[.]xyz itangv[.]com qhlqq[.]com pdsyicheng[.]com sjb925[.]com sjb312[.]com sjb301[.]com yun034[.]com zhc240[.]com youpindaojia[.]cn We’ll continue monitoring the campaign and post updates as soon as new developments take place Stay tuned! - January 27, 2022 Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest Tags: Cybercrime, NSA, OSINT, Security, Technical Collection, VPN Dancho Danchev Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com NO COMMENTS: POST A COMMENT Newer Post Older Post Home Subscribe to: Post Comments (Atom) THIS BLOG - 2005 - 2024 ASTALAVISTA.COM Free Shoutcast HostingRadio Stream Hosting ABOUT ME Dancho Danchev Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com View my complete profile ADVERTISING ADVERTISING DARK WEB ONION DARK WEB ONION E-SHOP FOR THREAT INTELLIGENCE DELIVERABLES OSINT AND THREAT INTELLIGENCE TRAINING E-SHOP FOR THREAT INTELLIGENCE DELIVERABLES MY YOUTUBE CHANNEL COMPILATION SUBSCRIBE USING RSS SEARCH THIS BLOG SUBSCRIBE USING EMAIL Enter your e-mail address: Powered by FeedPress FOLLOWERS POPULAR POSTS * Exposing Bulgaria's Largest Data Leak - An OSINT Analysis I've recently came across to a news article detailing the recently leaked Bulgaria NAP records database and I decided to take a closer... * Dynamic DNS Service Providers for APT Command and Control (C&C) - An Analysis Dear blog readers, The following is a compilation of dynamic DNS providers in specific ones used by APTs and various other targeted campaign... * Astalavista.com - Security Community - Official Re-Launch Video Link . * Astalavista.com Link . * Azerbaijanian Embassies in Pakistan and Hungary Serving Malware The very latest addition to the "Compromised International Embassies Series" are the Hungarian and Pakistani embassies of the Repu... BLOG ARCHIVE * ► 2024 (97) * ► December (2) * ► November (5) * ► October (7) * ► September (16) * ► August (6) * ► July (11) * ► June (11) * ► May (1) * ► April (8) * ► March (3) * ► February (15) * ► January (12) * ► 2023 (160) * ► December (15) * ► November (24) * ► October (9) * ► September (25) * ► August (16) * ► July (5) * ► June (8) * ► May (7) * ► April (16) * ► March (14) * ► February (17) * ► January (4) * ▼ 2022 (252) * ► December (14) * ► November (54) * ► October (45) * ► September (3) * ► August (24) * ► July (17) * ► June (28) * ► May (1) * ► April (3) * ► March (11) * ► February (15) * ▼ January (37) * Exposing A Portfolio of Shadow Crew Cybercrime-Fri... * Exposing A Portfolio of Shadow Crew Cybercrime-Fri... * Exposing A Portfolio of Shadow Crew Cybercrime-Fri... * Exposing A Portfolio of Shadow Crew Cybercrime-Fri... * The Evolution of Encrypted IM Messenging Platforms... * Exposing a Currently Active Portfolio of Rogue and... * Profiling FBI's Most Wanted Iran-based Cybercrimin... * Profing FBI's Most Wanted Cybercriminal Mujtaba Ra... * A Peek Inside Today's Modern RATs (Remote Access T... * Exposing a Currently Active CoolWebSearch Rogue an... * Profiling a Currently Active Personal Email Addres... * Exposing a Currently Active CoolWebSearch Rogue an... * Exposing a Currently Active CoolWebSearch Domains... * Profiling Yaroslav Vasinskyi from the Kaseya Ranso... * Exposing FBI's Most Wanted Iran's Mabna Hackers - ... * Exposing Behrooz Kamalian's Ashiyane ICT Company -... * Profiling the Emotet Botnet C&C Infrastructure - A... * Exposing a Currently Active "Jabber ZeuS" also kno... * Profiling the Liberty Front Press Network Online -... * Profiling Russia's U.S Election Interference 2016 ... * Exposing a Currently Active Domain Portfolio Manag... * Exposing a Currently Active Free Rogue VPN Domains... * Exposing a Currently Active List of Iran-Based Hac... * Exposing a Currently Active List of Iran-Based Hac... * Who Wants to Support My Work Commercially? * Exposing a Portfolio of Pay Per Install Rogue and ... * This presentation aims to detail Dancho Danchev's ... * Exposing the Internet-Connected Infrastructure of ... * Inquire About One-on-One or One-to-Many Virtual OS... * My Participation in GCHQ's Top Secret "Lovely Hors... * Profiling the Blood and Honor Online Hate Group - ... * An Update on My Disappearance and Kidnapping Attem... * Sample Portfolio of Dancho Danchev's Personal and ... * Exposing the Pay Per Install (PPI) Underground Mar... * TrendMicro Releases New Report on a New Cybercrime... * Sample Portfolio of Dancho Danchev's Personal and ... * "It’s Full of Secrets of User-Generated Classified... * ► 2021 (197) * ► December (17) * ► November (9) * ► October (28) * ► September (27) * ► August (2) * ► July (19) * ► June (12) * ► May (11) * ► April (23) * ► March (25) * ► February (15) * ► January (9) * ► 2020 (56) * ► December (35) * ► November (1) * ► October (1) * ► September (4) * ► August (3) * ► July (5) * ► June (2) * ► May (2) * ► February (1) * ► January (2) * ► 2019 (68) * ► December (9) * ► November (3) * ► October (1) * ► September (11) * ► August (2) * ► July (6) * ► May (16) * ► April (3) * ► March (1) * ► February (11) * ► January (5) * ► 2018 (41) * ► December (3) * ► November (2) * ► October (25) * ► September (1) * ► August (2) * ► July (3) * ► May (3) * ► January (2) * ► 2017 (16) * ► November (3) * ► July (1) * ► May (10) * ► January (2) * ► 2016 (46) * ► December (12) * ► September (4) * ► August (9) * ► June (3) * ► May (13) * ► April (5) * ► 2015 (3) * ► August (2) * ► July (1) * ► 2014 (11) * ► October (1) * ► March (3) * ► January (7) * ► 2013 (77) * ► December (5) * ► November (12) * ► October (3) * ► September (5) * ► August (13) * ► July (7) * ► June (7) * ► May (5) * ► April (5) * ► March (3) * ► February (6) * ► January (6) * ► 2012 (38) * ► December (2) * ► November (7) * ► October (3) * ► September (4) * ► August (2) * ► July (2) * ► June (2) * ► May (4) * ► April (2) * ► March (2) * ► February (2) * ► January (6) * ► 2011 (59) * ► December (1) * ► October (8) * ► September (4) * ► August (4) * ► July (3) * ► June (1) * ► May (10) * ► April (5) * ► March (12) * ► February (6) * ► January (5) * ► 2010 (90) * ► September (2) * ► August (3) * ► July (7) * ► June (7) * ► May (16) * ► April (15) * ► March (13) * ► February (17) * ► January (10) * ► 2009 (134) * ► December (9) * ► November (13) * ► October (9) * ► September (10) * ► August (12) * ► July (14) * ► June (11) * ► May (11) * ► April (11) * ► March (11) * ► February (12) * ► January (11) * ► 2008 (267) * ► December (10) * ► November (15) * ► October (25) * ► September (17) * ► August (26) * ► July (38) * ► June (19) * ► May (33) * ► April (30) * ► March (19) * ► February (21) * ► January (14) * ► 2007 (331) * ► December (19) * ► November (33) * ► October (32) * ► September (28) * ► August (25) * ► July (22) * ► June (20) * ► May (30) * ► April (20) * ► March (41) * ► February (32) * ► January (29) * ► 2006 (325) * ► December (20) * ► November (20) * ► October (28) * ► September (40) * ► August (27) * ► July (28) * ► June (28) * ► May (33) * ► April (20) * ► March (19) * ► February (23) * ► January (39) * ► 2005 (6) * ► December (6) SUBSCRIBE TO Posts Atom Posts Comments Atom Comments LABELS Security (646) Information Security (599) Cybercrime (335) Hacking (233) Malicious Software (190) Botnet (160) OSINT (119) Cyber Espionage (73) Technical Collection (73) Cyber Warfare (68) Information Warfare (67) Cyber Attack (61) Scareware (50) Malware (49) Fake Security Software (48) Cyber Terrorism (40) Exploits (39) Vulnerabilities (39) Cybercrime Forum (37) Intelligence Community (36) Cyber Jihad (34) Privacy (34) Anonymity (31) Client-Side Exploits (30) Client-Side Vulnerabilities (30) Law Enforcement (30) Koobface (29) Censorship (28) Blackhat SEO (27) Money Mule (26) Money Mule Recruitment (26) Search Engine Optimization (26) Eavesdropping (24) Money Laundering (24) Surveillance (24) Internet Censorship (23) Cyberspace (22) Botnets (21) Cybercrime Ecosystem (21) Ransomware (20) Intelligence (19) Iran (19) Bulgaria (18) Threat Intelligence (18) Fraud (17) Free Speech (17) Intelligence Agency (17) NSA (16) Search Engine (16) CIA (15) Facebook (15) Internet (15) Bulgaria Law Enforcement (14) Kidnapping (14) Cybercrime Forum Data Set (13) Illegal Arrest (13) Online Fraud (12) Phishing (12) Russia (12) Google (11) DDoS (10) Dark Web (10) Data Breach (10) Exploit Broker (10) Mass Web Site Defacement (10) Mobile Malware (10) Return On Security Investment (10) Spam (10) Vulnerability Broker (10) Web Site Defacement (10) WhoisXML API (10) Wiretapping (10) China (9) Cyber Security Investment (9) Insider Threat (9) New Media (9) Return On Investment (9) Scams (9) Stolen Credit Card (9) Travel Without Moving (9) Conti (8) Conti Gang (8) Conti Ransomware Gang (8) Digital Rights (8) Encryption (8) Fake Passport (8) GCHQ (8) Home Molestation (8) Insider (8) Operation Uncle George (8) Phishing Campaign (8) Security Trends (8) Terrorism (8) Affiliate Network (7) Astalavista (7) Conti Ransomware (7) Conti Ransomware (7) Credit Cards (7) Cyber Militia (7) Fake Documents (7) Fake ID (7) Iran Hacker Groups (7) Iran Hacking Groups (7) KGB (7) ROSI (7) Spam Campaign (7) Spam Operations (7) Antivirus (6) Cryptography (6) Data Mining (6) Encrypted Communication (6) Espionage (6) Google Docs (6) Instant Messaging (6) Investment Banking (6) Maltego (6) Security Industry (6) Zero Day Exploit (6) Ashiyane Digital Security Team (5) DVD of the Weekend (5) Dark Web Onion (5) FBI Most Wanted (5) Hacked Database (5) Hacked Web Site (5) Hacking Group (5) Hacktivism (5) Information Security Market (5) Jabber (5) Lawful Interception (5) Mobile (5) Mobile Location Tracking (5) Online Advertising (5) Security Investment (5) ShadowCrew (5) Social Network Analysis (5) Stolen Credit Cards (5) Symantec (5) Virtual Reality (5) 419 Scam (4) Astalavista.box.sk (4) CoolWebSearch (4) Corporate Risk Management (4) Cyberpunk (4) Distributed Computing (4) Distributed Computing Project (4) Distributed Project (4) FBI (4) Fake Adobe Flash Player (4) Fake Utility Bill (4) Fake Who's Viewed Your Facebook Profile Extension (4) Georgia (4) Google Earth (4) Hilary Kneber (4) ID Theft (4) Identity Theft (4) Internet Economy (4) Malvertising (4) Personal Data (4) Protonmail (4) Remote Access Tool (4) Russian Business Network (4) Scam (4) Security Breach (4) SiteAdvisor (4) Social Engineering (4) TIA (4) The Outer Limits (4) Total Information Awareness (4) Twitter (4) United Kingdom (4) Virtual Reality Social Network (4) Virtual World (4) Web Site Defacement Groups (4) XMPP (4) ZeuS (4) Advertising (3) Adware (3) Al Qaeda (3) Antivirus Signatures (3) Big Brother (3) Competitive Intelligence (3) Compliance (3) Crimeware (3) Cybertronics (3) DoD (3) Durzhavna Sigurnost (3) E-Business (3) EMP (3) Economics (3) Electromagnetic Pulse Weapons (3) Fast-Flux (3) Google Maps (3) IMLogic (3) Illegal Restraint (3) Koobface Botnet (3) Lenovo (3) Lone Gunmen (3) MSN (3) Mac OS X (3) McAfee (3) Microsoft (3) Mobile Internet (3) Network Solutions (3) North Korea (3) Nuclear Weapons (3) Online Marketing (3) Online Scam (3) Open Source Malware (3) Pay Per Install (3) ROI (3) Rogueware (3) SQL Injection (3) STIX (3) STIX2 (3) Satellite Imagery (3) Security Interviews (3) Security Metrics (3) Security Statistics (3) Space Warfare (3) Spyware (3) TAXII (3) Two-Factor Authentication (3) Typosquatting (3) U.S Elections (3) VPN (3) Visualization (3) Web 2.0 (3) iDefense (3) AOL (2) ASProx (2) Advance Fee Scam (2) Advanced Persistent Threat (2) Android (2) Armadillo Phone (2) Authentication (2) Avalance Botnet (2) Behrooz Kamalian (2) Best Practices (2) C4I (2) CAPTCHA (2) CSIA (2) Counter Espionage (2) Critical Infrastructure (2) Cryptome (2) Cryptoviral Extortion (2) Cyber Threat Actor Attribution Maltego Graphs (2) DNS (2) Dark Web Search Engine (2) Data Leak (2) David Endler (2) Department of Defense (2) Digital Forensics (2) E-Banking (2) E-Commerce (2) E-Shop (2) ECHELON (2) Emotet (2) Enigma (2) Eric Goldman (2) Espionage Movie (2) Exploit Kit (2) FSB (2) Fake Video Codec (2) Foreign Influence Operations (2) Forensics (2) Forwarderz (2) Google Hacking (2) Growth Hacker (2) HUMINT (2) Hacker (2) Hackers (2) IMINT (2) IP Cloaking (2) IPv6 (2) Information Operations (2) Insider Monitoring (2) International Exploit Shop (2) JabberZeuS (2) Johannes Ullrich (2) Latest News Articles (2) Lizamoon (2) Location Tracking (2) Lovely Horse (2) Marketing (2) Memoir (2) Military Communications (2) Mobile Application (2) Mobile Security (2) NBC (2) National Security (2) One-Time Passwords In Everything (2) PSYOPS (2) Passwords (2) Phishing Toolbar (2) Podcast (2) Potentially Unwanted Application (2) Psychedelic Trance (2) Psytrance (2) Psytrance Song of the Day (2) Qassam Cyber Fighters (2) Reconnaissance Satellite (2) Risk Management (2) Rogue Security Software (2) Root Server (2) SEO (2) SIGINT (2) SIPRNET (2) SSL (2) SecondEye Solutions (2) Security Awareness (2) Security Conference (2) Security Event (2) Security Podcast (2) Sensitive Information (2) Skype (2) Song of the Day (2) Spear Phishing (2) Syria (2) TROYAK-AS (2) The Lawnmower Man (2) Threat Intelligence Feed (2) TrendMicro (2) Trojan Horse (2) Tutanota (2) U.S Bureau of Engraving and Printing (2) Virtual Private Network (2) Viruses (2) Visual Information System (2) VoIP (2) WMF Vulnerability (2) Web Crawler (2) Webroot (2) Wireless (2) Wireless Internet (2) X-Files (2) Yahoo (2) Zero Day Initiative (2) Zombie Alert (2) Zone-H (2) 29A (1) 29A Virus Coding Group (1) ANA Spoofer Project (1) API (1) APT (1) ATM Skimmer (1) ATS (1) AbdAllah (1) Abdallah Internet Hizmetleri (1) Able Danger (1) Abuse Department (1) Active Security Monitor (1) Ahmad Al Agha (1) Aleksandr Zhukov (1) Allied Group Inc (1) Amazon AWS (1) Anonymizer (1) Anonymous (1) Anonymous Hacking Collective (1) Anti-Phishing Group (1) Anton Nikolaevich Korotchenko (1) Apple (1) Aqua ZeuS Gang (1) Astalavista Security Group (1) Australia (1) Avast (1) BBC (1) BGP (1) Background Check (1) BadB (1) Bahama Botnet (1) BakaSoftware (1) Bantu (1) Bebo (1) Bed Time Reading (1) Bill Gates Botnet (1) Biography (1) Biometrics (1) Bitcoin (1) Bjorn Andreasson (1) Black Energy (1) Blood and Honor (1) Blood and Honor Bulgaria (1) Boeing (1) Bogus Account (1) Botners (1) Box.sk (1) Brian Krebs (1) Brute-Forcing (1) Bulgarian Cyber Army (1) Bulgarian Cyber Army Hacking Group (1) Bullet Proof Hosting (1) Bust (1) CALEA (1) CCTV (1) CDT (1) CERT (1) CNO (1) COCOM (1) COMINT (1) CVE (1) Caller ID (1) Caller ID Spoofer (1) Candid Wuest (1) Career Enrichment (1) Cash Transfers (1) Cell Phone Monitoring (1) Cell Phone Surveillance (1) CellDEK (1) Center for Democracy and Technology (1) Cheyenne Mountain Operations Center (1) China Eagle Union (1) CipherTrust (1) Classified Information (1) Cold War (1) Computer Crime Survey (1) Computer Network Operation (1) Conficker (1) Confidential Connections (1) Conspiracy (1) Conspiracy Theory (1) Cookies (1) Counter Intelligence (1) Crusade Affiliates (1) Crypters (1) Cyber Insurance (1) Cyber Security Industry Alliance (1) Cyber Weapon (1) Cyber Weapons (1) CyberCamp 2016 (1) Cybercrime Incident Response (1) Cybercrime Incident Response Maltego Graphs (1) Cybercrime Search Engine (1) Cybercriminal (1) DCLeaks (1) DDoS For Hire (1) DHS (1) DIA (1) DNS Changer (1) Daniel Brandt (1) Dark Vader (1) Dark Forum (1) DarkComet RAT (1) Darkode (1) Darkode Forum Community (1) Data Acquisition (1) Data Center (1) Defense Complex (1) Delicious Information Warfare (1) Denmark (1) Digital Armaments (1) Dilbert (1) DoJ (1) DotCom (1) DreamHost (1) Dropbox (1) ECOFIN Projects (1) ELINT (1) ENISA (1) Ebay (1) Electric Universe (1) Electronic Banking (1) Emotet Botnet (1) Encrochat (1) Encrochat Database Leak (1) Encrypted Phone (1) Enki Bilal (1) Enron (1) Erasmus Bridge (1) Evgeniy Mikhaylovich Bogachev (1) Exmanoize (1) Eyeball Series (1) F-Secure (1) FCC (1) FDIC (1) FTLog (1) FTLog Worm (1) Fake Account (1) Fake Certificate (1) Fake Chrome Extension (1) Fake Chrome Update (1) Fake Code Signing Certificate (1) Fake Confirmed Facebook Friend Request Email (1) Fake Facebook Appeal (1) Fake Facebook Notification (1) Fake Facebook Profile Spy Application (1) Fake Firefox Update (1) Fake Hosting Provider (1) Fake Internet Explorer Update (1) Fake Personal ID (1) Fake Safari Update (1) Fake Tech Support Scam (1) Fake Visa (1) Fake Visa Application (1) Fake Web Site (1) Fake YouTube Player (1) Financial Management (1) Firas Nur Al Din Dardar (1) FireEye (1) Flashpoint Intel (1) FoxNews (1) GDBOP (1) GRU (1) GUI (1) Gartner (1) Gavril Danilkin (1) GazTranzitStroyInfo (1) Generation I (1) George Bush (1) Georgi Markov (1) Germany (1) Gift Cards (1) GiveMeDB (1) Global Security Challenge (1) GoDaddy (1) Goa Trance (1) Google Firebase (1) Google Ads (1) Google Groups (1) Google Play (1) Google Store (1) Greece (1) Guccifer 2.0 (1) Gumblar (1) HKLeaks (1) HackPhreak (1) HackPhreak Hacking Group (1) Hacking Book (1) Hacking Forum (1) Hacking Groups (1) Hacking Tools (1) Haiti (1) Hamas (1) Hezbollah (1) High Tech Brazil Hack Team (1) Homebrew (1) Honeynet Project (1) Honker Union of China (1) ICBM (1) IP Hiding (1) IP Spoofing (1) IPSec (1) IPv4 (1) IRC (1) IRS (1) ISIS (1) Illegal Hosting (1) InFraud (1) InFraud Cybercrime Gang (1) InFraud Cybercrime Syndicate (1) InFraud Organization (1) India (1) India Company (1) Indicator of Compromise (1) Information Security Forum (1) Infrastructure Security (1) InqTana Mac OS X Malware (1) Intellectual Property (1) Internal Revenue Service (1) Internet Relay Chat (1) IoC (1) Iran Election (1) Iran Election 2009 (1) Iran Mabna Hackers (1) Israel (1) Javor Kolev (1) Jeffrey Carr (1) Joanna Rutkowska (1) John Young (1) K Rudolph (1) Kaseya (1) Kaseya Ransomware Attack (1) Katrina (1) Keylogger (1) Korean Demilitarized Zone (1) KrotReal (1) Latvia (1) Leaks (1) Liberty Front Press Network (1) Loads.cc (1) Localization (1) Lockheed Martin (1) Logicube (1) Lubyanka Square Headquarters (1) M4 Project (1) MD5 (1) MISP (1) MSRC (1) MSRC Researcher Recognition Program (1) MVR (1) Maltego Graphs (1) Malware Information Sharing Platform (1) Mastercard (1) Media Methane (1) Metrics (1) Microsoft Live (1) Ministry of Interior (1) Missile Base (1) Mobile Communication Censorship (1) Mohammad Sagegh Ahmadzadegan (1) Monoculture (1) Morgan Stanley (1) Moses Staff (1) Most Wanted Cybercriminals (1) Muhammad Cartoons (1) MyWebFace (1) NASA (1) NCSC (1) NSO Group (1) NSO Group Spyware (1) National Cyber Security Centre (1) Native Intelligence (1) NetAssist LLC (1) NetCraft (1) Network Centric Warfare (1) Nikolay Nedyalkov (1) Nikopol Trilogy (1) Nintendo (1) Nintendo DS (1) NordVPN (1) Norman Sandbox (1) North Korea Missile Launch Pad (1) Nyxem (1) OEM (1) OMEMO (1) OPIE (1) OPSEC (1) OSINT Training (1) OTC (1) OTP (1) Offensive Cyber Warfare (1) Omerta (1) One-Time Password (1) OneCare (1) Online Propaganda Campaign (1) Operation EQUALIZER (1) Osama Bin Laden (1) Over-The-Counter (1) POS (1) PR (1) Packers (1) Parked Domains (1) Pavlin Georgiev (1) PayPal (1) Perplex City (1) Persistent Cookies (1) Personal Career (1) Pharmaceutical Scams (1) Phileas Crawler (1) PhishTube (1) Phishing Domain Farm (1) Phreedom (1) Physical Security (1) Pinterest (1) Piracy (1) PlushForums (1) Point of Sale Terrminal (1) Politics (1) PornTube (1) Press Coverage (1) Project RAHAB (1) Prolexic (1) Proxy Service (1) RAT (1) RBN (1) REvil Ransomware Group (1) RIPA (1) RSA (1) RSA Conference (1) Radicati Group (1) Ray Kurzweil (1) Red Joan (1) Regulation (1) Reporters Without Borders (1) Revolution in Militvry Affairs (1) Rogue Account (1) Rogue Chrome Extension (1) Rogue Facebook Appeal (1) Rogue Video Codec (1) Rogue YouTube Player (1) Roman Polesek (1) Rootkit (1) Russia Small Group (1) Russian (1) Russian Bomber (1) Russian Submarine (1) SEC (1) SITE Institute (1) SSN (1) Safe Harbor (1) Satellite Jamming (1) Satellite SIGINT (1) ScanSafe (1) Scandoo (1) Scientific Intelligence (1) Scribd (1) Secret Service (1) Secure Communication (1) SecureDrop (1) Securities and Exchange Commission (1) Security Book (1) Security Directory (1) Security Education (1) Security Forum (1) Security Game (1) Security Project (1) Security Research (1) Security Training (1) Shadow Server (1) Silent Circle (1) Sipco Systems (1) Sniffing (1) SocialMediaSystem (1) Software Piracy (1) Solarwinds (1) Sophos (1) Soviet Union (1) Space Weapons (1) Spoofing (1) Sprott Asset Management (1) Stalkware (1) Starlight (1) Stealth Ideas Inc (1) Steganography (1) Stolen Gift Cards (1) Strider Crawler (1) Sub7 (1) Suri Pluma (1) Swine Flu (1) Symbian (1) Syrian Electronic Army (1) Syrian Embassy (1) TAN (1) TDoS (1) THAAD (1) Taia Global (1) Team Code Zero (1) Team Code Zero Hacking Group (1) Tech Support Scam (1) Technical Mujahid (1) Telephony Denial of Service Attack (1) The Bunker (1) The Immortals (1) Thought Leadership (1) Thousand Talents Program (1) Threat Intelligence Report (1) Tipping Point (1) Top Secret Program (1) Tor (1) Tor Project (1) Torrent (1) TorrentReactor (1) Trickbot (1) Trickbot Gang (1) Trickbot Malware (1) Trickbot Malware Gang (1) Trifinite Group (1) Two Factor Authentication (1) U.K National Cyber Security Centre (1) U.S Cyber Command (1) U.S Driving License (1) U.S Sanctions (1) U.S Secret Service (1) Underground Search Engine (1) University ID Card (1) Vasil Moev Gachevski (1) Vault 7 (1) VeriSign (1) Vertex Net Loader (1) Virus (1) Virus Map (1) Virus Recovery Button (1) Virus for You (1) VirusTotal (1) Visa (1) Void Balaur Malware Gang (1) WHGDG (1) War Driving (1) War Games (1) Weapon Systems (1) Web Application Worm (1) Web Inject (1) Web Proxy Service (1) Web Shells (1) WhoisXML API Jabber ZeuS Gang (1) Wireless Hacking (1) World Hacker Global Domination Group (1) X-Tunnel (1) XSS (1) Yaroslav Vasinskyi (1) Yavor Kolev (1) YouTube (1) ZDNet (1) ZDNet Zero Day Blog (1) Zerodium (1) Zotob (1) bother (1) eID (1) iPowerWeb (1) th3j35t3r (1) Powered by Blogger. Diese Website verwendet Cookies von Google, um Dienste anzubieten und Zugriffe zu analysieren. Deine IP-Adresse und dein User-Agent werden zusammen mit Messwerten zur Leistung und Sicherheit für Google freigegeben. So können Nutzungsstatistiken generiert, Missbrauchsfälle erkannt und behoben und die Qualität des Dienstes gewährleistet werden.Weitere InformationenOk