Exposing the Trickbot Malware Gang – An OSINT Analysis

Based on a yet another recently leaked batch of internal Trickbot malware gang’s communication channels I’ve decided to come up with a proper OSINT analysis on the topic and actually enrich and actually enrich the original information data set including to elaborate more and provide actionable intelligence on the online whereabouts of the Trickbot malwareRead More

Dancho Danchev’s Second Edition of “Cybercrime Forum Data Set for 2022” Available – 113GB Direct Torrent Download Available! Grab a Free Copy Today!

Here we go. https://academictorrents.com/details/131080b57d568ca3d05794cde5a3d7774f890373 – Dancho Danchev’s Research Compilation 2005-2022 – Direct Torrent Download Available! https://academictorrents.com/details/e1b755efb9cb7ec5d5bcea4e60911e2a70a86201 – Dancho Danchev’s Cybercrime Forum Data Set for 2022 – Second Edition – Direct Torrent Download Available! https://academictorrents.com/download/131080b57d568ca3d05794cde5a3d7774f890373.torrent – Dancho Danchev’s Research Compilation 2005-2022 – Direct Torrent Download Available! https://academictorrents.com/download/e1b755efb9cb7ec5d5bcea4e60911e2a70a86201.torrent – Dancho Danchev’s Cybercrime Forum Data Set for 2022 – SecondRead More

Exposing FBI’s Most Wanted Cybercriminal Mujtaba Raza from Forwarderz and SecondEye Solution – An OSINT Analysis – Maltego Technical Details Video Demonstration

Google is your best friend! Here’s the original analysis. Check out the actual Maltego technical details video demonstration here: Enjoy!

Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Three – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone yet another batch of currently active rogue and malicious CoolWebSearch domains with the idea to assist everyone in their cyber attack attribution campaigns including cyber threat actor attribution campaigns[.] Sample currently active rogue and malicious CoolWebSearch domains portfolio: smartupdater[.]com cash[.]pornocruto[.]nu pornocruto[.]nu ADASEARCH[.]COM ELITE-VIDEO-FEEDS[.]COM FUCKING-MACHINE[.]NET GREATDILDOS[.]COM TEEN-NUDE-PICTURE[.]COMRead More

Profiling a Currently Active Personal Email Address Portfolio of Members of Iran’s Ashiyane Digital Security Team – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone a currently active personal email portfolio belonging to members of Iran’s  Ashiyane Digital Security Team with the idea to assist everyone in their cyber attack or cyber threat actor attribution campaigns. Sample currently active personal emails known to belong to members of Iran’s Ashiyane Digital SecurityRead More

Exposing a Currently Active CoolWebSearch Rogue and Malicious Domains Portfolio – Part Two – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone yet another batch of currently active rogue and malicious CoolWebSearch domains with the idea to assist everyone in their cyber attack attribution campaigns including cyber threat actor attribution campaigns. Sample currently active rogue and malicious CoolWebSearch domains portfolio: smartupdater[.]com cash[.]pornocruto[.]nu pornocruto[.]nu ADASEARCH[.]COM ELITE-VIDEO-FEEDS[.]COM FUCKING-MACHINE[.]NET GREATDILDOS[.]COM TEEN-NUDE-PICTURE[.]COMRead More

Exposing Behrooz Kamalian’s Ashiyane ICT Company – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone some practical and actionable threat intelligence information regarding members of the Ashiyane Digital Security Team also known as Behrooz Kamalian’s Ashiyane ICT Company for the purpose of assisting everyone in their cyber attack and cyber attack attribution campaigns. Name: Behrooz Kamalian Postal address: Tajrish Sq, FanaRead More

Profiling the Emotet Botnet C&C Infrastructure – An OSINT Analysis

Dear blog readers, I’ve decided to share a recently obtained Emotet botnet C&C server IPs for the purpose of empowering everyone with the necessary technical information on their way to track down and monitor the botnet including to possibly assist and help where necessary in terms of cyber attack campaign attribution including cyber threat actorRead More

Unit-123.org E-shop Owner Information

Who is Dancho Danchev?

Unit-123.org

Focused on delivering daily batches of personally-produced never-ending supply of high-quality and never-published and released before classified and sensitive Intelligence Deliverables.

Latest Products