Exposing Modern Client-Side Exploits Serving Kits – An AV and Snort IDS MD5 List Compilation – Part Five

Dear blog readers, This is the fifth post part of my “Exposing Modern Client-Side Exploits Serving Kits – An AV and Snort IDS MD5 List Compilation – Part Four” blog post series where I intend to share actionable threat intelligence with vendors and organizations with the idea to assist them in protecting their networks andRead More

Exposing Modern Client-Side Exploits Serving Kits – An AV and Snort IDS MD5 List Compilation – Part Four

Dear blog readers, This is the fourth post part of my “Exposing Modern Client-Side Exploits Serving Kits – An AV and Snort IDS MD5 List Compilation – Part Three” blog post series where I intend to share actionable threat intelligence with vendors and organizations with the idea to assist them in protecting their networks andRead More

Exposing Modern Client-Side Exploits Serving Kits – An AV and Snort IDS MD5 List Compilation – Part Two

Dear blog readers, This is the second post part of the “Exposing Modern Client-Side Exploits Serving Kits – An AV and Snort IDS MD5 List Compilation” series where I intend to share actionable threat intelligence with vendors and organizations in the context of offering and providing actionable MD5s for high-profile and popular hacking tools currentlyRead More

From the “Definitely Malicious” Department – Exposing a CoolWebSearch Domains Portfolio

Remember CoolWebSearch? Check this out. This is definitely “from the malicious software department”.  Sample CoolWebSearch domains portfolio known to have participated in various campaigns throughout the years: 0-29.com 0-2u.com 0-days.net 000info.com 001soft.cn 001y.com 001y1.com 007arcadegames.com 007ground.com 008.net 008i.com 008k.com 00hq.com 00info.com 00nff.info 00ting.com 00z70az77mnsa-00swj1zzprh.com 010402.com 0190-dialer.com 01q-09.info 02d07ftfie2.info 02pmnzy5eo29bfk4.com 032439.com 04080.com 05p.com 070808.net 07ic5do2myz3vzpk.com 086orfqz.infoRead More

Exposing Emotet’s Modern Infrastructure – A Case Study on Tracking Down and Shutting Down Abusive Malware In Direct Cooperation with Abuse Departments

In this post I’ll officially attempt to bring down and take offline the Emotet botnet including to actually provide never-published before OSINT type of research analysis on the actual C&C infrastructure behind the Emotet botnet which is one of the most prolific botnets up to present day with the idea to attempt a coordinated takeRead More

Unit-123.org E-shop Owner Information

Who is Dancho Danchev?

Unit-123.org

Focused on delivering daily batches of personally-produced never-ending supply of high-quality and never-published and released before classified and sensitive Intelligence Deliverables.

Latest Products