Blog

Unmasking the Fentanyl Trade in Illicit Online Marketplaces

By ShadowDragon | March 3, 2025

Illicit fentanyl continues to ravage communities across North America, with new details emerging on how Chinese money brokers help Mexican drug cartels launder massive profits. Below, we weave together these sources and insights from CACI’s DarkBlue Intelligence Suite and ShadowDragon, illustrating how supply chain, financial flows, and investigative technology converge.

bad yelp review copy

Bad moods = Bad decisions

By Elliott Anderson / August 25, 2019

As a developer and OSINT investigator, I often come across other investigators that are researching a target online and have “hit a wall,” so to speak.  “I’ve hit a dead-end, […]

1 1

Timeline Analysis | Epstein Death Reported on 4Chan Before Announced

By Daniel Clemens / August 10, 2019

In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to […]

Illuminating Context with Timeline Analysis

By Daniel Clemens / July 29, 2019

In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions […]

phone numbers search scrubbed

It’s Hard Out There for a Pimp

By Brooks M / June 24, 2019

Human trafficking, according to Wikipedia, is the trade of humans for forced labour. With the advent of the internet and high-speed communication, traffickers have found a new way to advertise […]

Forget About Deep and Dark Web Hype

By Elliott Anderson / June 12, 2019

Everyone has a different use case that needs to be monitored, and we enable a vast amount of use cases for tailored collection and monitoring with OIMonitor at a very […]

image 1

Social Networks: Friends of Friends

By Josh C / May 31, 2019

Today we are going to look at how we can build a network from a single starting entity and use that network to identify the actors in the network that […]

Lego Bricks Colorful

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

By Daniel Clemens / April 3, 2019

Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each […]

telegram

Continued OSINT Collection Innovation for Expansive 24/7 Monitoring on Chat Platforms, Forums, and Social Media

By Daniel Clemens / March 29, 2019

Catching the backscatter of conversation, keywords and data dumps have always been one of the driving goals in our OIMonitor project. While others have been quick to highlight one particular […]

Bank Accounts

Hype and the Deep Dark Web

By Daniel Clemens / September 25, 2018

I had previously written about how we started with our our monitoring platform and how that grew into the beast it is today.  I didn’t leave much room to frame […]

DEF CON 26 Intel CTF Results! Congratulations to the DEF CON Winners

By Daniel Clemens / September 11, 2018

DEF CON 26, Intel CTF (iCTF) had more participants than any other capture the flag challenge. With over 100 teams showing up, a select few escalated to the top of […]

cacc

Paying It Forward at Crimes Against Children Conference (CACC)

By Daniel Clemens / September 6, 2018

This was my second year attending the Crimes Against Children Conference (CACC) in Dallas.  CACC draws a crowd proficient in the art of finding the bad guys and protecting the […]

wolf

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

By Daniel Clemens / August 31, 2018

If the world has a plethora of investigators and the success of prosecutors is hovering around 90% success rate  — why do we struggle with an increase in more complex […]

2018 08 28 16 26 51

The Real Jack Ryan is Bringing the Fight Against Human Trafficking

By Daniel Clemens / August 30, 2018

Millions love the character Jack Ryan from Tom Clancy’s bestselling 18-book series (and a new TV show on Amazon!), but not as many folks know that there is a real, […]

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

By Daniel Clemens / August 3, 2018

In “Understanding Link Analysis and Using it Investigations,” I detailed how to get started and some fundamentals on link analysis. What I didn’t cover was how long you should be involved […]

Intelligence Capture the Flag (iCTF) Contest at Def Con 

By Daniel Clemens / July 27, 2018

ShadowDragon is proud to be a co-sponsor of the Mission III Advanced iCTF Contest at Defcon 2018. iCTF has crafted a compelling and challenging scenario! Participating is a great way […]

BostonBomber

Understanding Link Analysis and Using it in Investigations

By Daniel Clemens / June 21, 2018

I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet.  A longtime friend, Roelof from Paterva, shared his vision for a […]

Patchwork APT Group – Additional IOCs & Network Indicators

By Daniel Clemens / June 8, 2018

Yesterday, Matthew Meltzer, Sean Koessel, and Steven Adair @ Volexity released an excellent write-up on the Indian APT group known as Dropping Elephant.   The Volexity article detailed attacks against US think […]

Alabama Cyber Now: Disrupting Human Trafficking With Digital Forensics

By Daniel Clemens / May 7, 2018

When most security pros think of threat intelligence, they think of cyber crime – tracking down hackers and cyber criminals aiming to compromise networks to exploit credit card information, corporate […]

Cybersecurity is Everyone’s Business: Learn How to Combat it

By Daniel Clemens / April 11, 2018

Attack methods targeting businesses nearly doubled from 82,000 in 2016 to at least 159,700 in 2017 (the majority of cyberattacks are never reported), according to the Online Trust Alliance. 2017 […]

Charming Kitten Cyberespionage

Buckle up for Insight into Charming Kitten Cyberespionage Attacks

By Daniel Clemens / January 26, 2018

The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why […]

logo Cyber Security

Insights Success Magazine names ShadowDragon one of the “The 10 Best”

By Daniel Clemens / January 12, 2018

ShadowDragon: Solving the Challenges of Modern Investigations Today, the internet is ubiquitous. It has revolutionized businesses and communications. It also has revolutionized crime. Unfortunately, the web has become a valuable […]

LOIcPreview

Before Threat Intelligence: How We Tailored Monitoring and Alerting

By Daniel Clemens / September 26, 2017

It was the end of 2010. The Packet Ninjas’ team (the predecessor of ShadowDragon) had been making mad dashes on application assessments and penetration tests while deployed to a nowhere town. The discussion was as lively […]

692504 40d22ae800434a5baacef2d4fdc57d49 mv2

ShadowDragon – Maltego Transforms | Vietnamese Victims 1937CN

By Daniel Clemens / August 28, 2017

Votiro Labs and ClearSky CyberSecurity both based out of Israel, through use of MalNet have uncovered a slew of interesting TTPs and infrastructure believed to be used by the 1937CN […]

iHTAC Offers LE Resources to Help Children Victimized by Trafficking

By Daniel Clemens / August 5, 2017

Accelerating Law Enforcement Capabilities DeliverFund’s iHTAC is a unique collaboration with corporate partners who bring innovative technology tools used to accelerate law enforcement capabilities in their case work. The iHTAC […]

Featured Tales from the Trenches Assumptions

Tales from the Trenches: Assumptions & Out-of-Country Investigations

By Daniel Clemens / February 22, 2017

In one case, I found myself in a country in Latin America investigating a complicated persistent business compromise being implemented through both electronic and human means. I had already been […]

Featured Artifacts Speculation and Compromised Secrets

Artifacts, Speculation and Compromised Secrets

By Daniel Clemens / June 16, 2016

The buzz of cyber compromise has been booming since the AP released some interesting points on the Hillary Clinton email compromise. This was followed up by Brian Krebs on May […]

The Cyber Crime Chronicles: The Cyber Criminal

By Daniel Clemens / June 2, 2016

Perhaps the most nefarious, these attackers are driven almost exclusively by financial gain. These criminals typically target personal and corporate systems, and range in skill from Nigerian 419 phishers, to […]

Featured MalNet Maltego Transforms with Proofpoint Data

MalNet Maltego Transforms with ProofPoint Data

By Daniel Clemens / May 10, 2016

MalNet accesses the Proofpoint ET Intelligence™ comprehensive database that contains current and historical malicious IP addresses and domains. In this blog post we share screenshots of Maltego 4 and a […]

Featured ShadowDragon Screenshots with Maltego M4 Release

ShadowDragon Screenshots with Maltego M4 Release

By Daniel Clemens / May 3, 2016

Below are a few screenshots of our flagship product SocialNet, integrated with the new Maltego M4 release. If you haven’t seen the video from Maltego, please go check it out […]

Featured OSINT Process SocialNet and Breaking Bad Case Files v2

OSINT Process, SocialNet and Breaking Bad Case Files

By Daniel Clemens / May 2, 2016

Our first artifact, begins with the email address rumored to be used by Jesse Pinkman, pivoting on one to one correlations between his favorite social media provider and others, we […]

Featured Tracking GozNym Campaigns with MalNet

Tracking GozNym Campaigns with MalNet

By Daniel Clemens / April 22, 2016

In 2007, Don Jackson while at SecureWorks had written about the Gozi Trojan, sharing details on the modularization and monetization strategies utilized by this family of malware. More recently, (04/04/16) […]

Featured Demonstration Tracking Malware Campaigns and Domains Using MalNet v2

Demonstration: Tracking Malware Campaigns and Domains Using MalNet

By Daniel Clemens / April 15, 2016

MalNet brings together the industry’s most up to date and extensive threat information from Proofpoint with Maltego link analysis capabilities from ShadowDragon. MalNet enables threat analysts and researchers to identify […]

The Cyber Crime Chronicles: Your Friendly Neighborhood Hacker

By Daniel Clemens / November 28, 2015

Just a couple of weeks ago the world was rocked by the news that CIA Director John Brennan’s AOL email account (apparently that’s still a thing) had been hacked. Immediately, […]

The Cybercrime Chronicles: Understanding The Actors

By Daniel Clemens / November 27, 2015

Cyber Threat Types and Motivations There are several types of cyberwars going on at any given time. There are plain old hacking attacks, criminally-targeted attacks, nation state cyberwar, and hacktivist […]

Scroll to Top