Exposing a Currently Active Portfolio of High-Profile Cybercriminal Email Addresses – Part Six

Dear blog readers, Continuing the “Exposing a Currently Active Portfolio of High-Profile Cybercriminal Email Addresses” series I’ve decided to share yet another batch of currently active high-profile email addresses of high-profile cybercriminals with the idea to assist U.S Law Enforcement and the U.S Intelligence Community on its way to track down and prosecute the cybercriminalsRead More

Exposing GRU’s Involvement in U.S Election Interference – 2016 – An OSINT Analysis

Dear blog readers, Continuing the “FBI’s Most Wanted Cybercriminals” series I’ve decided to share some of the actionable intelligence that I have on GRU’s involvement in the 2016 U.S Election interference with the idea to assist U.S Law Enforcement and the U.S Intelligence Community on its way to track down and prosecute the cybercriminals behindRead More

Exposing the Solarwinds Malware Campaign – An OSINT Analysis

It has recently became evident that the Solarwinds enterprise which is basically an IT monitoring and management tool suffered a major backdoor attack where malicious attackers managed to obtain access to and actually backdoor a decent portion of Solarwinds infrastructure potentially compromising key network assets and compromising the integrity confidentiality and availability of the targeted infrastructureRead More

U.S Justice Department Releases “Legal Considerations when Gathering Online Cyber Threat Intelligence” – Where’s the Meat?

Surprise, surprise! The U.S DoJ has recently released a detailed “Legal Considerations when Gathering Online Cyber Threat Intelligence” guide which aims to educate security practitioners on their way to gather threat intelligence and how to actually utilize the information to further assist U.S Law Enforcement on its way to track down and prosecute the cybercriminalsRead More

Exposing a “Fast-Flux” Name Server Based Rogue Fraudulent and Malicious Online Infrastructure – An Analysis

Dear blog readers, I’ve decided a diverse portfolio of fast flux name servers which basically act as a bulletproof botnet C&C communication technique allowing the cybercriminals behind the campaigns to increase the average time for which their campaigns remain online.  In this post I’ll provide actionable intelligence on the infrastructure behind a network of fast-fluxRead More

Exposing a Diverse Portfolio of Malicious and Fraudulent Name Servers – An Analysis

Dear blog readers, In this post I’ve decided to share a diverse portfolio of fraudulent and malicious name servers circa 2008 that are known to have participated in various rogue and malicious software serving campaigns.  Sample portfolio of rogue fraudulent and malicious name servers known to have participated in rogue and malicious campaigns circa 2008:Read More

Exposing a Massive and Diverse Portfolio of “Tax Forms” Themed Malware and Blackhat SEO Serving Domains

Dear blog readers, I’ve decided to share a massive and diverse portfolio of rogue and potentially malicious domains portfolio utilized by cybercriminals while participating in a blackhat SEO tax forms themed rogue and malicious software serving campaigns circa 2008. In this post I’ll provide actionable intelligence on the infrastructure behind it and discuss in-depth theRead More

Exposing Modern Client-Side Exploits Serving Kits – An AV and Snort IDS MD5 List Compilation – Part Seventh

Dear blog readers, This is the seventh post part of my “Exposing Modern Client-Side Exploits Serving Kits – An AV and Snort IDS MD5 List Compilation – Part Six” blog post series where I intend to share actionable threat intelligence with vendors and organizations with the idea to assist them in protecting their networks andRead More

Exposing a Diverse Portfolio of Malicious and Fraudulent Name Servers – An Analysis

Dear blog readers, In this post I’ve decided to share a diverse portfolio of fraudulent and malicious name servers circa 2008 that are known to have participated in various rogue and malicious software serving campaigns.  Sample portfolio of rogue fraudulent and malicious name servers known to have participated in rogue and malicious campaigns circa 2008:Read More

Exposing a Diverse Portfolio of Malicious and Fraudulent Name Servers – An Analysis

Dear blog readers, In this post I’ve decided to share a diverse portfolio of fraudulent and malicious name servers circa 2008 that are known to have participated in various rogue and malicious software serving campaigns.  Sample portfolio of rogue fraudulent and malicious name servers known to have participated in rogue and malicious campaigns circa 2008:Read More

Unit-123.org E-shop Owner Information

Who is Dancho Danchev?

Unit-123.org

Focused on delivering daily batches of personally-produced never-ending supply of high-quality and never-published and released before classified and sensitive Intelligence Deliverables.

Latest Products