Profiling FBI’s Most Wanted Iran-based Cybercriminals – Mohammad Sagegh Ahmadzadegan – An OSINT Analysis

In this post I’ve decided to expose and offer personally identifiable information on Iran’s based cybercriminal known as Mohammad Sagegh Ahmadzadegan for the purpose of assisting U.S Law Enforcement on its way to track down and prosecute the cybercriminals behind these campaigns. Sample personally identifiable information on Mohammad Sagegh Ahmadzadegan includes: Name: Mohammad Sagegh AhmadzadeganRead More

Profiling a Currently Active Personal Email Address Portfolio of Members of Iran’s Ashiyane Digital Security Team – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone a currently active personal email portfolio belonging to members of Iran’s  Ashiyane Digital Security Team with the idea to assist everyone in their cyber attack or cyber threat actor attribution campaigns. Sample currently active personal emails known to belong to members of Iran’s Ashiyane Digital SecurityRead More

Profiling a Currently Active Personal Email Address Portfolio of Members of Iran’s Ashiyane Digital Security Team – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone a currently active personal email portfolio belonging to members of Iran’s  Ashiyane Digital Security Team with the idea to assist everyone in their cyber attack or cyber threat actor attribution campaigns. Sample currently active personal emails known to belong to members of Iran’s Ashiyane Digital SecurityRead More

Exposing Behrooz Kamalian’s Ashiyane ICT Company – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone some practical and actionable threat intelligence information regarding members of the Ashiyane Digital Security Team also known as Behrooz Kamalian’s Ashiyane ICT Company for the purpose of assisting everyone in their cyber attack and cyber attack attribution campaigns. Name: Behrooz Kamalian Postal address: Tajrish Sq, FanaRead More

Exposing FBI’s Most Wanted Iran’s Mabna Hackers – An OSINT Analysis

Dear blog readers, In this post I’ve decided to share actionable intelligence on the online infrastructure of FBI’s Most Wanted Iran’s Mabna Hackers for the purpose of assisting everyone in their cyber attack and cyber threat actor attribution campaigns. mlibo[.]ml blibo[.]ga azll[.]cf azlll[.]cf lzll[.]cf jlll[.]cf elll[.]cf lllib[.]cf tsll[.]cf ulll[.]tk tlll[.]cf libt[.]ga libk[.]ga libf[.]ga libe[.]ga liba[.]gqRead More

Exposing a Currently Active Domain Portfolio Managed and Operated by Members of the Ashiyane Digital Security Team – An OSINT Analysis

Note: This OSINT analysis has been originally published at my current employer’s Web site – https://whoisxmlapi.com where I’m currently acting as a DNS Threat Researcher since January, 2021. We’ve decided to take a closer look at the current and historical domain portfolio managed and operated by members of Iran’s Ashiyane Digital Security Team using Maltego in combination withRead More

Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone a currently active list of Iran-based hacker and hacker team’s handles which could greatly assist in possible cyber attack attribution campaigns including cyber threat actor attribution campaigns. Sample currently active Iran-based hacker and hacker team’s handles currently used in massive or targeted Web site defacement campaigns:Read More

Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone a currently active list of Iran-based hacker and hacker team’s handles which could greatly assist in possible cyber attack attribution campaigns including cyber threat actor attribution campaigns. Sample currently active Iran-based hacker and hacker team’s handles currently used in massive or targeted Web site defacement campaigns:Read More

Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone a currently active list of Iran-based hacker and hacker team’s handles which could greatly assist in possible cyber attack attribution campaigns including cyber threat actor attribution campaigns. Sample currently active Iran-based hacker and hacker team’s handles currently used in massive or targeted Web site defacement campaigns:Read More

Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone a currently active list of Iran-based hacker and hacker team’s handles which could greatly assist in possible cyber attack attribution campaigns including cyber threat actor attribution campaigns. Sample currently active Iran-based hacker and hacker team’s handles currently used in massive or targeted Web site defacement campaigns:Read More

Unit-123.org E-shop Owner Information

Who is Dancho Danchev?

Unit-123.org

Focused on delivering daily batches of personally-produced never-ending supply of high-quality and never-published and released before classified and sensitive Intelligence Deliverables.

Latest Products