Bad moods = Bad decisions
As a developer and OSINT investigator, I often come across other investigators that are researching a target online and have “hit a wall,” so to speak. “I’ve hit a dead-end, […]
Timeline Analysis | Epstein Death Reported on 4Chan Before Announced
In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to […]
Illuminating Context with Timeline Analysis
In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions […]
It’s Hard Out There for a Pimp
Human trafficking, according to Wikipedia, is the trade of humans for forced labour. With the advent of the internet and high-speed communication, traffickers have found a new way to advertise […]
Forget About Deep and Dark Web Hype
Everyone has a different use case that needs to be monitored, and we enable a vast amount of use cases for tailored collection and monitoring with OIMonitor at a very […]
Social Networks: Friends of Friends
Today we are going to look at how we can build a network from a single starting entity and use that network to identify the actors in the network that […]
OSINT Challenges & Opportunities, Methodology on starting your Hunt.
Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each […]
Continued OSINT Collection Innovation for Expansive 24/7 Monitoring on Chat Platforms, Forums, and Social Media
Catching the backscatter of conversation, keywords and data dumps have always been one of the driving goals in our OIMonitor project. While others have been quick to highlight one particular […]
Hype and the Deep Dark Web
I had previously written about how we started with our our monitoring platform and how that grew into the beast it is today. I didn’t leave much room to frame […]
DEF CON 26 Intel CTF Results! Congratulations to the DEF CON Winners
DEF CON 26, Intel CTF (iCTF) had more participants than any other capture the flag challenge. With over 100 teams showing up, a select few escalated to the top of […]
Paying It Forward at Crimes Against Children Conference (CACC)
This was my second year attending the Crimes Against Children Conference (CACC) in Dallas. CACC draws a crowd proficient in the art of finding the bad guys and protecting the […]
Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change
If the world has a plethora of investigators and the success of prosecutors is hovering around 90% success rate — why do we struggle with an increase in more complex […]
The Real Jack Ryan is Bringing the Fight Against Human Trafficking
Millions love the character Jack Ryan from Tom Clancy’s bestselling 18-book series (and a new TV show on Amazon!), but not as many folks know that there is a real, […]
Link Analysis Presentation No Nos and How Long Should I Deep Dive?
In “Understanding Link Analysis and Using it Investigations,” I detailed how to get started and some fundamentals on link analysis. What I didn’t cover was how long you should be involved […]
Intelligence Capture the Flag (iCTF) Contest at Def Con
ShadowDragon is proud to be a co-sponsor of the Mission III Advanced iCTF Contest at Defcon 2018. iCTF has crafted a compelling and challenging scenario! Participating is a great way […]
Understanding Link Analysis and Using it in Investigations
I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet. A longtime friend, Roelof from Paterva, shared his vision for a […]
Patchwork APT Group – Additional IOCs & Network Indicators
Yesterday, Matthew Meltzer, Sean Koessel, and Steven Adair @ Volexity released an excellent write-up on the Indian APT group known as Dropping Elephant. The Volexity article detailed attacks against US think […]
Alabama Cyber Now: Disrupting Human Trafficking With Digital Forensics
When most security pros think of threat intelligence, they think of cyber crime – tracking down hackers and cyber criminals aiming to compromise networks to exploit credit card information, corporate […]
Cybersecurity is Everyone’s Business: Learn How to Combat it
Attack methods targeting businesses nearly doubled from 82,000 in 2016 to at least 159,700 in 2017 (the majority of cyberattacks are never reported), according to the Online Trust Alliance. 2017 […]
Buckle up for Insight into Charming Kitten Cyberespionage Attacks
The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why […]
Insights Success Magazine names ShadowDragon one of the “The 10 Best”
ShadowDragon: Solving the Challenges of Modern Investigations Today, the internet is ubiquitous. It has revolutionized businesses and communications. It also has revolutionized crime. Unfortunately, the web has become a valuable […]
Before Threat Intelligence: How We Tailored Monitoring and Alerting
It was the end of 2010. The Packet Ninjas’ team (the predecessor of ShadowDragon) had been making mad dashes on application assessments and penetration tests while deployed to a nowhere town. The discussion was as lively […]
ShadowDragon – Maltego Transforms | Vietnamese Victims 1937CN
Votiro Labs and ClearSky CyberSecurity both based out of Israel, through use of MalNet have uncovered a slew of interesting TTPs and infrastructure believed to be used by the 1937CN […]
iHTAC Offers LE Resources to Help Children Victimized by Trafficking
Accelerating Law Enforcement Capabilities DeliverFund’s iHTAC is a unique collaboration with corporate partners who bring innovative technology tools used to accelerate law enforcement capabilities in their case work. The iHTAC […]
Tales from the Trenches: Assumptions & Out-of-Country Investigations
In one case, I found myself in a country in Latin America investigating a complicated persistent business compromise being implemented through both electronic and human means. I had already been […]
Artifacts, Speculation and Compromised Secrets
The buzz of cyber compromise has been booming since the AP released some interesting points on the Hillary Clinton email compromise. This was followed up by Brian Krebs on May […]
The Cyber Crime Chronicles: The Cyber Criminal
Perhaps the most nefarious, these attackers are driven almost exclusively by financial gain. These criminals typically target personal and corporate systems, and range in skill from Nigerian 419 phishers, to […]
MalNet Maltego Transforms with ProofPoint Data
MalNet accesses the Proofpoint ET Intelligence™ comprehensive database that contains current and historical malicious IP addresses and domains. In this blog post we share screenshots of Maltego 4 and a […]
ShadowDragon Screenshots with Maltego M4 Release
Below are a few screenshots of our flagship product SocialNet, integrated with the new Maltego M4 release. If you haven’t seen the video from Maltego, please go check it out […]
OSINT Process, SocialNet and Breaking Bad Case Files
Our first artifact, begins with the email address rumored to be used by Jesse Pinkman, pivoting on one to one correlations between his favorite social media provider and others, we […]
Tracking GozNym Campaigns with MalNet
In 2007, Don Jackson while at SecureWorks had written about the Gozi Trojan, sharing details on the modularization and monetization strategies utilized by this family of malware. More recently, (04/04/16) […]
Demonstration: Tracking Malware Campaigns and Domains Using MalNet
MalNet brings together the industry’s most up to date and extensive threat information from Proofpoint with Maltego link analysis capabilities from ShadowDragon. MalNet enables threat analysts and researchers to identify […]
The Cyber Crime Chronicles: Your Friendly Neighborhood Hacker
Just a couple of weeks ago the world was rocked by the news that CIA Director John Brennan’s AOL email account (apparently that’s still a thing) had been hacked. Immediately, […]
The Cybercrime Chronicles: Understanding The Actors
Cyber Threat Types and Motivations There are several types of cyberwars going on at any given time. There are plain old hacking attacks, criminally-targeted attacks, nation state cyberwar, and hacktivist […]
- « Previous
- 1
- 2
- 3