A Compilation of Known Conti Ransomware Malicious Domains – An OSINT Analysis

I’ve decided to dig a little bit deeper in terms of the recently leaked Conti ransomware gang leaked internal communication and I’ve decided to share a set of known Conti ransomware malicious domains found the original leaked communication of the gang. Sample Conti ransomware malicious domains known to have been involved in various malicious andRead More

A Compilation of Known Conti Ransomware Gang Malicious Executable Download Locations – An OSINT Analysis

I’ve decided to continue data mining the recently leaked Conti Ransomware Gang internal communications on my way to find and share more actionable intelligence in terms of their Internet-connected infrastructure and in this post I’ve decided to share a set of currently active malicious executable download locations courtesy of the Conti Ransomware gang which youRead More

A Compilation of Known Conti Ransomware Gang Personal Email Address Accounts – An OSINT Analysis

How does going through the recently leaked internal Conti Ransomware gang communication really feels in terms of data mining? Keep reading. I’ve decided to dig a little bit deeper based on the original leaked internal Conti Ransomware Gang communication and share personal email address accounts found in the actual leaked communication with the idea toRead More

A Compilation of Known Conti Ransomware Themed Malicious and Fraudulent MD5s – An OSINT Analysis

I’ve decide to dig a little bit deeper and find an additional set of known malicious MD5s known to have been used by the Conti Ransomware gang in an attempt to assist fellow researchers and the security industry including U.S Law Enforcement on its way to track down monitor and prosecute the cybercriminals behind theseRead More

A Compilation of Conti Ransomware Gang BitCoin Transaction IDs – An OSINT Analysis

I’ve recently decided to take a deeper peek inside the Conti Ransomware Gang’s known BitCoin transaction IDs using public sources and I’ve decided to come up with a compilation of known Conti Ransomware Gang’s BitCoin transaction IDs for the purpose of assisting fellow researchers including the security industry and U.S Law Enforcement on its wayRead More

How to Take Down the Conti Ransomware Gang – A Practical And Relevant Case Study on Taking Down Cybercriminal Infrastructure – A Practical Example

I’ve recently took the time and effort to obtain access to and data mine the recently leaked Conti ransomware gang internal communication looking for IoCs (Indicators of Compromise) including relevant OSINT artifacts which lead me to custom-tailored fashion brands courtesy of some of the gang members including several “in the works” re-branded upcoming ransomware asRead More

Exposing the Conti Ransomware Gang – An OSINT Analysis

UPDATE: The following set of graphics aims to visualize the recently leaked Conti ransomware gang members conversations. UPDATE: The following is a complete list of all the Bitcoin addresses used by the Conti ransomware gang members obtained using public sources. bc1qnj6yephp3jt204f8yn02wvydn47yd42w63587c bc1qvpt6tnce3knl5vr5v3k985uwr4mm85hc62ydqs bc1qmjavw2hsqdfet4mv5j83evy0z3w06rantrs6an bc1q65njz3pfw9kjjvcetkexsl0l922wtd2wz2p46p 1JWnZmkJwJSK6F21nypCAGzsR6TVhPRA4P 1MuBnT25CQeTFYkx1tHP4Fa5rKbc4rC9uF bc1qtcld00s09n944yjgyjfd6ujy5gespztc0umy2e bc1q7ld076gjadenuvuknv2c5a9lqslfk8verdkf07 bc1qq0mn6wgm8wxr7j2af4j2q3t7stscesqf2afv6v bc1q2muhfugejgft7smu0ejze22het2rkmnpdccx5j bc1qzwe9gedyc88hnm8m265g780qy0ezh7z4va0z5c bc1qvpt6tnce3knl5vr5v3k985uwr4mm85hc62ydqs bc1qmjavw2hsqdfet4mv5j83evy0z3w06rantrs6an bc1q65njz3pfw9kjjvcetkexsl0l922wtd2wz2p46p 1JWnZmkJwJSK6F21nypCAGzsR6TVhPRA4PRead More

Exposing the Conti Ransomware Gang – An OSINT Analysis

Awesome! Based on the recently leaked internal communication of the infamous Russia based Conti ransomware gang in this post I’ll provide actionable intelligence on the Conti ransomware gang in-depth and discuss and offer practical actionable intelligence on their Internet connected infrastructure in terms of providing Dark Web onion Web sites personal email address accounts IPsRead More

Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses – Part Four

Dear blog readers, Continuing the “Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses – Part Three” blog posts series I’ve decided to share yet another currently active portfolio of ransomware themed email address accounts currently involved in a variety of campaigns. Sample ransomware-themed personal email address accounts known to have beenRead More

Profiling Yaroslav Vasinskyi from the Kaseya Ransomware Attack Campaign – An OSINT Analysis

It appears that the U.S Justice Department has recently made arrests in the Kaseya ransomware dropping campaign and I’ve decided to dig a little bit deeper and actually offer and provide the necessary actionable intelligence in the context of exposing the individuals behind these campaigns in the context of assisting U.S Law Enforcement on itsRead More

Unit-123.org E-shop Owner Information

Who is Dancho Danchev?

Unit-123.org

Focused on delivering daily batches of personally-produced never-ending supply of high-quality and never-published and released before classified and sensitive Intelligence Deliverables.

Latest Products