Edward Snowden’s IoCs

Edward Snowden’s IoCs I’m retiring. Personal domain: hxxp://lavabit.com Personal email address account: Ed_Snowden@lavabit.com edsnowden@lavabit.com Lavabit’s BitCoin address: 1Bqqy3SxZ27ZUogEeiKHYqPsmFwuRTErMu Known domain registration: hxxp://ismtgoxsolvent.com – 97.74.42.79; 50.63.202.93 Possible related domain registrations: hxxp://mtgox-creditors.com hxxp://mtgox-prod.net hxxp://mtgox-reabilitation.com hxxp://mtgox-rehabilitation.com hxxp://mtgox-claim.xyz – Email: johndoe77887@gmail.com hxxp://mtgox-legal.com hxxp://mtgox-recovery.com hxxp://mtgox-gift.pro Read more…

Where Is Anton Nikolaevich Korotchenko (Антон Николаевич Коротченко) Also Known as Koobface Botnet Master KrotReal? – Part Four

Where Is Anton Nikolaevich Korotchenko (Антон Николаевич Коротченко) Also Known as Koobface Botnet Master KrotReal? – Part Four An image is worth a thousand words. Related on the Koobface botnet here. Sample photos: Related posts: Where Is Anton Nikolaevich Korotchenko Read more…

Dancho Danchev’s Blog – Mind Streams of Information Security Knowledge: A URL Portfolio of DDoS Attack Stressers

Dancho Danchev’s Blog – Mind Streams of Information Security Knowledge: A URL Portfolio of DDoS Attack Stressers Dear blog readers, The following is a compilation of URLs of known DDoS attack stresser tools. Sample URLs: hxxp://str3ssed[.]comhxxp://dream-stresser[.]suhxxp://zdstresser[.]nethxxp://darkvr[.]iohxxp://tresser[.]iohxxp://xstress[.]tophxxp://blaststress[.]ruhxxp://dreams-stresser[.]cohxxp://dreams-stresser[.]suhxxp://hatter[.]cloudhxxp://undisclosed[.]ishxxp://mythicalstress[.]xyzhxxp://dragonstresser[.]nethxxp://inverse[.]shhxxp://stresser[.]zonehxxp://ipstresser[.]mehxxp://blaze-api[.]cchxxp://vacstresser[.]orghxxp://stressers[.]iohxxp://stresslab[.]cchxxp://stresser[.]sthxxp://tokenview[.]lifehxxp://stressthem[.]tohxxp://stresshit[.]clubhxxp://stresser[.]ishxxp://cyberbooter[.]nethxxp://stresser[.]gahxxp://metastresser[.]iohxxp://stresser[.]suhxxp://wrldsecurity[.]nethxxp://hexstresser[.]orghxxp://ipstresser[.]ltdhxxp://urgstresser[.]comhxxp://cryptostresser[.]viphxxp://silentstress[.]cchxxp://freestresser[.]tophxxp://joker[.]shhxxp://ddoser[.]viphxxp://stresser[.]websitehxxp://liquidsec[.]spacehxxp://quickdown[.]prohxxp://demonicstresser[.]xyzhxxp://stressed[.]suhxxp://ddos[.]schxxp://panel[.]ddos[.]schxxp://mao-stress[.]techhxxp://neostress[.]nethxxp://crazystresser[.]nethxxp://susstresser[.]xyzhxxp://stresse[.]rehxxp://ddosstresser[.]comhxxp://redstresser[.]nethxxp://zeusstress[.]funhxxp://getstress[.]ushxxp://ipstresser[.]prohxxp://thunderstresser[.]suhxxp://ipstresser[.]sxhxxp://lkxstress[.]suhxxp://starkstresser[.]nethxxp://stresser[.]techhxxp://io9[.]suhxxp://stresser[.]mediahxxp://nkstresser[.]nethxxp://vanishstress[.]comhxxp://booter[.]cchxxp://quantum-stresser[.]orghxxp://Freeddos[.]pwhxxp://cfxsecurity[.]ruhxxp://stresse[.]ruhxxp://ddg[.]lolhxxp://1981[.]rehxxp://mythicalstress[.]nethxxp://stresser[.]pehxxp://packetsto[.]mehxxp://quantum-stress[.]orghxxp://shock-stresser[.]orghxxp://stresser[.]cityhxxp://stresslab[.]sxhxxp://sunstresser[.]nethxxp://informants[.]suhxxp://zerostresser[.]nethxxp://elitesecurity[.]cchxxp://orbitalstress[.]orghxxp://stresser[.]ovhhxxp://wrldsecurity[.]orghxxp://warapi[.]nethxxp://volitystress[.]viphxxp://infinity-studios[.]icuhxxp://stressednet[.]xyzhxxp://stresse[.]apphxxp://solostress[.]nethxxp://silentstress[.]nethxxp://downed[.]ishxxp://cryptostresser[.]orghxxp://rocket-stress[.]comhxxp://ipstresser[.]gghxxp://spacestresser[.]comhxxp://stresseruno[.]nethxxp://royalstresser[.]nethxxp://lkxstress[.]ushxxp://stresser[.]aihxxp://stresser[.]funhxxp://neostresser[.]ushxxp://webstress[.]xyzhxxp://999stresser[.]gayhxxp://l7stresser[.]comhxxp://nukebooter[.]orghxxp://stresser[.]unohxxp://virtualstress[.]nethxxp://TarkovStresser[.]comhxxp://rolexapi[.]xyzhxxp://quez[.]inhxxp://redstresser[.]orghxxp://atomic-stresser[.]xyzhxxp://bootcaat[.]frhxxp://apinigger[.]buzzhxxp://alya[.]devhxxp://ackflood[.]ishxxp://stresserhub[.]orghxxp://inverse[.]besthxxp://securityhide[.]nethxxp://stresse[.]cathxxp://ripstresser[.]tophxxp://digitalstress[.]nethxxp://topstresser[.]tophxxp://scystress[.]xyzhxxp://silentstress[.]wtfhxxp://powerstresser[.]prohxxp://destroyersv[.]besthxxp://sunipstresser[.]comhxxp://stressergg[.]comhxxp://atom-stresser[.]nethxxp://anonstress[.]comhxxp://zxstresser[.]xyzhxxp://ciasecrets[.]suhxxp://cloudleague[.]dehxxp://intelsecrets[.]suhxxp://downon[.]clickhxxp://prostress[.]prohxxp://ipstress[.]viphxxp://pluto[.]cxhxxp://ovhstresser[.]comhxxp://orbital-solutions[.]xyzhxxp://nulling[.]ithxxp://minecraftstresser[.]nethxxp://loudstresser[.]nethxxp://inversecurity[.]orghxxp://exoticbooter[.]comhxxp://spacestresser[.]nethxxp://hkstresser[.]nethxxp://hirestresser[.]nethxxp://high-stress[.]comhxxp://heydos[.]cchxxp://freestresser[.]net https://ddanchev.blogspot.com/2024/09/a-url-portfolio-of-ddos-attack-stressers.html

Dancho Danchev’s Blog – Mind Streams of Information Security Knowledge: Personally Identifiable Email Address Accounts Known to Have Been Involved in Cybercrime Campaigns in 2009

Dancho Danchev’s Blog – Mind Streams of Information Security Knowledge: Personally Identifiable Email Address Accounts Known to Have Been Involved in Cybercrime Campaigns in 2009 The following is a list of personally identifiable email address accounts that are known to Read more…