ShadowDragon OSINT Podcast Recap: Season 2, Episode 4

ShadowDragon OSINT Podcast Recap: Season 2, Episode 4

By Daniel Clemens | Aug 29, 2023 10:08:48 AM

In the fourth episode of season 2 of the ShadowDragon podcast, CEO Daniel Clemens, CTO Elliott Anderson, and Director of Intelligence and Innovation Collection Nico Dekens (aka Dutch OSINT Guy) sat...

Reflections on RSA Conference 2023: OSINT and Beyond

Reflections on RSA Conference 2023: OSINT and Beyond

By Daniel Clemens / Jun 5, 2023 10:19:39 AM

Now a few weeks removed and recovered from the chaos of the RSA Conference, I wanted to share my thoughts on the 2023 event (the bad and the good). As we look ahead to the rest of the year, the event...

ShadowDragon OSINT Podcast Recap: Season 2, Episode 3

ShadowDragon OSINT Podcast Recap: Season 2, Episode 3

By Daniel Clemens / May 5, 2023 11:59:43 AM

In the third episode of season 2 of the ShadowDragon podcast, CEO Daniel Clemens and Director of Intelligence and Innovation Collection (aka Dutch OSINT Guy) Nico Dekens sat down for a one-on-one...

ShadowDragon Commentary: OSINT vs Classified Secrets

ShadowDragon Commentary: OSINT vs Classified Secrets

By Daniel Clemens / Apr 11, 2023 4:40:00 PM

In a recentopinion piece for The Cipher Brief, Gregory Sims, former CIA Clandestine Service for over thirty years, including multiple field tours as Chief and Deputy Chief of CIA stations, shared his...

The Impact of Bad Energy Policy on Cybercrime

The Impact of Bad Energy Policy on Cybercrime

By Daniel Clemens / Mar 29, 2023 8:30:00 AM

Daniel Clemens, Founder & CEO, ShadowDragon Is climate change the cause of higher energy prices? Likely not. That being said, there is common confusion surrounding energy policy and basic economics....

ShadowDragon OSINT Podcast Recap: Season 2, Episode 2

ShadowDragon OSINT Podcast Recap: Season 2, Episode 2

By Daniel Clemens / Mar 3, 2023 12:30:00 PM

In the second episode of season 2 of the ShadowDragon podcast, CEO Daniel Clemens, CTO Elliott Anderson, and Director of Intelligence and Innovation Collection (aka Dutch OSINT Guy) Nico Dekens sat...

Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger

Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger

By Daniel Clemens / Jan 11, 2023 2:38:21 PM

After six weeks of investigation, on Dec. 30, 2022 authorities arrested Bryan Kohberger as the key suspect in the quadruple murders of four University of Idaho students. This case (which is ongoing)...

ShadowDragon OSINT Podcast Recap: Season 2, Episode 1

ShadowDragon OSINT Podcast Recap: Season 2, Episode 1

By Daniel Clemens / Dec 22, 2022 11:15:00 AM

Season 2 of the ShadowDragon podcast is here! In the first episode, CEO Daniel Clemens and CTO Elliott Anderson were joined by the Dutch OSINT guy, Nico Dekens.

You want to build a Platform? ..What Platform Should I use?

You want to build a Platform? ..What Platform Should I use?

By Daniel Clemens / Aug 9, 2020 12:00:00 AM

The echo’s of investors had started the buzz of the need for new investigative / intelligence platforms a great deal more than there had been in the past few years. The buzz will only gain more...

PR: Italy’s Soft Strategy & ShadowDragon Partner providing Investigative training & advanced investigative capabilities.

PR: Italy’s Soft Strategy & ShadowDragon Partner providing Investigative training & advanced investigative capabilities.

By Daniel Clemens / Jun 22, 2020 12:00:00 AM

SoftStrategy and ShadowDragon Partnership Rome, Italy JUNE 22, 2020 – SoftStrategy and ShadowDragon partner together to provide advanced investigative training. As the world has become more...

Additional Insights into Iranian Cyber Espionage | APT33

Additional Insights into Iranian Cyber Espionage | APT33

By Daniel Clemens / Apr 24, 2020 12:00:00 AM

Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment...

What Will OSINT/PAI and Collection at Scale Look like for 2020?

What Will OSINT/PAI and Collection at Scale Look like for 2020?

By Daniel Clemens / Jan 11, 2020 12:00:00 AM

2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on the...

Iran Hype - Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

Iran Hype - Past and Present Recollections and Historical Lore on Iranian Al-Qassam Cyber Fighters Assault on US Banks in 2012/2013

By Daniel Clemens / Jan 6, 2020 12:00:00 AM

On September 11th, 2012, US embassies had been hit with attacks known as the “Benghazi Attacks.” In online correlation, attacks that had been referenced as “Operation Ababil” had begun as a supposed...

Iranian Watering Holes. Target Centric Analysis & Looking for Additional IOCs Related to clear.co.ir | 79.127.125.179 with ShadowDragon MalNet & ProofPoint Data

Iranian Watering Holes. Target Centric Analysis & Looking for Additional IOCs Related to clear.co.ir | 79.127.125.179 with ShadowDragon MalNet & ProofPoint Data

By Daniel Clemens / Dec 1, 2019 12:00:00 AM

Additional information is always needed on initial indicators for a SOC analyst or incident handler. In this case, initial indicators point to [ clear. co. ir and 79.127.125.179 ] engaging in...

Job Post: Training and Curriculum Specialist

Job Post: Training and Curriculum Specialist

By Daniel Clemens / Sep 3, 2019 12:00:00 AM

ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities,...

Timeline Analysis | Epstein Death Reported on 4Chan Before Announced

Timeline Analysis | Epstein Death Reported on 4Chan Before Announced

By Daniel Clemens / Aug 10, 2019 12:00:00 AM

In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to drive home is there won’t ever...

Illuminating Context with Timeline Analysis

Illuminating Context with Timeline Analysis

By Daniel Clemens / Jul 29, 2019 12:00:00 AM

In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions will...

DataWalk And ShadowDragon Team To Enhance Investigative Capabilities

DataWalk And ShadowDragon Team To Enhance Investigative Capabilities

By Daniel Clemens / May 16, 2019 12:00:00 AM

Redwood City, California – May 16, 2019 DataWalk and ShadowDragon have formed a strategic technical alliance to facilitate more complete and detailed investigations incorporating open source...

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

OSINT Challenges & Opportunities, Methodology on starting your Hunt.

By Daniel Clemens / Apr 3, 2019 12:00:00 AM

Every investigation is different, but what never changes is how you have to treat an investigation much like the challenge of building something with a bucket of Legos. With each bread crumb, you...

Continued OSINT Collection Innovation for Expansive 24/7 Monitoring on Chat Platforms, Forums, and Social Media

Continued OSINT Collection Innovation for Expansive 24/7 Monitoring on Chat Platforms, Forums, and Social Media

By Daniel Clemens / Mar 29, 2019 12:00:00 AM

Catching the backscatter of conversation, keywords and data dumps have always been one of the driving goals in our OIMonitor project. While others have been quick to highlight one particular...

ShadowDragon Launches ConvertIt Tool

ShadowDragon Launches ConvertIt Tool

By Daniel Clemens / Dec 17, 2018 12:00:00 AM

Shadow Dragon has created an automated document conversion tool that expands analysts’ capabilities, speeds analysis and investigations, and making the electronic transmission of files between...

Hype and the Deep Dark Web

Hype and the Deep Dark Web

By Daniel Clemens / Sep 25, 2018 12:00:00 AM

I had previously written about how we started with our our monitoring platform and how that grew into the beast it is today. I didn’t leave much room to frame things in the most hip-infosec way,...

DEF CON 26 Intel CTF Results! Congratulations to the DEF CON iCTF Winners

DEF CON 26 Intel CTF Results! Congratulations to the DEF CON iCTF Winners

By Daniel Clemens / Sep 11, 2018 12:00:00 AM

DEF CON 26, Intel CTF (iCTF) had more participants than any other capture the flag challenge. With over 100 teams showing up, a select few escalated to the top of the heap showing off their skills,...

Paying It Forward at Crimes Against Children Conference (CACC)

Paying It Forward at Crimes Against Children Conference (CACC)

By Daniel Clemens / Sep 6, 2018 12:00:00 AM

This was my second year attending the Crimes Against Children Conference (CACC) in Dallas. CACC draws a crowd proficient in the art of finding the bad guys and protecting the defenseless, and I...

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

Investigator Methodology | Strategic & Tactical Vs. a Hopeful Change

By Daniel Clemens / Aug 31, 2018 12:00:00 AM

If the world has a plethora of investigators and the success of prosecutors is hovering around 90% success rate — why do we struggle with an increase in more complex crime, a rise in international...

The Real Jack Ryan is Bringing His Supranormal Skills to the Fight Against Human Trafficking

The Real Jack Ryan is Bringing His Supranormal Skills to the Fight Against Human Trafficking

By Daniel Clemens / Aug 30, 2018 12:00:00 AM

Millions love the character Jack Ryan from Tom Clancy’s bestselling 18-book series (and a new TV show on Amazon!), but not as many folks know that there is a real, live Jack Ryan living in America...

Kaseware Integrates ShadowDragon’s SocialNet Forensics Tool into Case Management Investigative Platform

Kaseware Integrates ShadowDragon’s SocialNet Forensics Tool into Case Management Investigative Platform

By Daniel Clemens / Aug 8, 2018 12:00:00 AM

Cheyenne, Wyoming and Denver, Colorado With more than 3.1 billion people across the globe actively using Social Media, it is no surprise that criminals utilize it and can be tracked down on it by...

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

Link Analysis Presentation No Nos and How Long Should I Deep Dive?

By Daniel Clemens / Aug 3, 2018 12:00:00 AM

In “Understanding Link Analysis and Using it Investigations,” I detailed how to get started and some fundamentals on link analysis. What I didn’t cover was how long you should be involved in the...

Intelligence Capture the Flag (iCTF) Contest at Def Con

Intelligence Capture the Flag (iCTF) Contest at Def Con 

By Daniel Clemens / Jul 27, 2018 12:00:00 AM

ShadowDragon is proud to be a co-sponsor of the Mission III Advanced iCTF Contest at Defcon 2018. iCTF has crafted a compelling and challenging scenario! Participating is a great way to hone your...

ALTEN Calsoft Labs Joins ShadowDragon and Cloudly to Build Cybersecurity Practices

ALTEN Calsoft Labs Joins ShadowDragon and Cloudly to Build Cybersecurity Practices

By Daniel Clemens / Jul 6, 2018 12:00:00 AM

BANGALORE, India ALTEN Calsoft Labs, a next-generation digital transformation company, rolls out a plan to Prevent Cyber Attacks and Minimize Damage by leveraging ShadowDragon’s cyber intelligence...

Understanding Link Analysis and Using it in Investigations

Understanding Link Analysis and Using it in Investigations

By Daniel Clemens / Jun 21, 2018 12:00:00 AM

I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet. A longtime friend, Roelof from Paterva, shared his vision for a...

Patchwork APT Group - Additional IOCs & Network Indicators

Patchwork APT Group - Additional IOCs & Network Indicators

By Daniel Clemens / Jun 8, 2018 12:00:00 AM

Yesterday, Matthew Meltzer, Sean Koessel, and Steven Adair @ Volexity released an excellent write-up on the Indian APT group known as Dropping Elephant. The Volexity article detailed attacks against...

ShadowDragon Significantly Enhances its Visibility and Forensic Capture Capabilities for Open and Closed Source Threat Intelligence

ShadowDragon Significantly Enhances its Visibility and Forensic Capture Capabilities for Open and Closed Source Threat Intelligence

By Daniel Clemens / May 15, 2018 12:00:00 AM

ShadowDragon, a U.S.-based cyber threat intelligence solutions company, has enhanced its OIMonitor product to include secure and customizable monitoring of forums, open, closed source, TOR and...

Alabama Cyber Now: Disrupting Human Trafficking Using Digital Forensics & Social Media Forensics

By Daniel Clemens / May 7, 2018 12:00:00 AM

When most security pros think of threat intelligence, they think of cyber crime – tracking down hackers and cyber criminals aiming to compromise networks to exploit credit card information,...

Cybersecurity is Everyone’s Business: Learn How to Combat it at Alabama Cyber Now

Cybersecurity is Everyone’s Business: Learn How to Combat it at Alabama Cyber Now

By Daniel Clemens / Apr 11, 2018 12:00:00 AM

Attack methods targeting businesses nearly doubled from 82,000 in 2016 to at least 159,700 in 2017 (the majority of cyberattacks are never reported), according to the Online Trust Alliance. 2017 was...

ShadowDragon Announces that SocialNet is Now Available Through Phantom Platform

ShadowDragon Announces that SocialNet is Now Available Through Phantom Platform

By Daniel Clemens / Mar 14, 2018 12:00:00 AM

United States – ShadowDragon, a U.S.-based cyber threat intelligence solutions company, today announced that its SocialNet App is the first Social Media Forensics & OSINT mapping app available on...

Buckle up for Step-by-Step Insight into Charming Kitten Cyberespionage Attacks

Buckle up for Step-by-Step Insight into Charming Kitten Cyberespionage Attacks

By Daniel Clemens / Jan 26, 2018 12:00:00 AM

The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why the Clear Sky report...

Insights Success Magazine names ShadowDragon one of the “The 10 Best Performing #CyberSecurity Solution Providers.”

Insights Success Magazine names ShadowDragon one of the “The 10 Best Performing #CyberSecurity Solution Providers.”

By Daniel Clemens / Jan 12, 2018 12:00:00 AM

ShadowDragon: Solving the Challenges of Modern Investigations Today, the internet is ubiquitous. It has revolutionized businesses and communications. It also has revolutionized crime....

ShadowDragon Gains New Distribution Partner to Support Businesses in the Fight Against Cybercrime

ShadowDragon Gains New Distribution Partner to Support Businesses in the Fight Against Cybercrime

By Daniel Clemens / Dec 1, 2017 12:00:00 AM

Cheyenne, Wyoming – ShadowDragon, a U.S.-based cyber threat intelligence solutions company, has entered into a distribution agreement with GuidePoint Security LLC, a Virginia-based technology...

Before Threat Intelligence: How We Forged Tailored Monitoring and Alerting... Anonymous Investigations Inspired Innovation

Before Threat Intelligence: How We Forged Tailored Monitoring and Alerting... Anonymous Investigations Inspired Innovation

By Daniel Clemens / Sep 26, 2017 12:00:00 AM

It was the end of 2010. The Packet Ninjas’ team (the predecessor of ShadowDragon) had been making mad dashes on application assessments and penetration tests while deployed to a nowhere...

ShadowDragon named to CIOReview’s 20 Most Promising Enterprise Security Solution Providers 2017

ShadowDragon named to CIOReview’s 20 Most Promising Enterprise Security Solution Providers 2017

By Daniel Clemens / Sep 5, 2017 12:00:00 AM

Cheyenne, Wyoming – ShadowDragon makes it to the list of 20 Most Promising Enterprise Security Solution Providers 2017 by CIOReview. CIOReview is a technology magazine with a mission to guide...

ShadowDragon MalNet - ProofPoint Maltego Transforms | Vietnamese Victims 1937CN

ShadowDragon MalNet - ProofPoint Maltego Transforms | Vietnamese Victims 1937CN

By Daniel Clemens / Aug 28, 2017 12:00:00 AM

Votiro Labs and ClearSky CyberSecurity both based out of Israel, through use of MalNet have uncovered a slew of interesting TTPs and infrastructure believed to be used by the 1937CN group. Votiro &...

iHTAC Offers LE Resources to Help Children Victimized by Human Trafficking

By Daniel Clemens / Aug 5, 2017 12:00:00 AM

Accelerating Law Enforcement Capabilities DeliverFund’s iHTAC is a unique collaboration with corporate partners who bring innovative technology tools used to accelerate law enforcement capabilities...

Tales from the Trenches: Assumptions & Out-of-Country Investigations

Tales from the Trenches: Assumptions & Out-of-Country Investigations

By Daniel Clemens / Feb 22, 2017 12:00:00 AM

In one case, I found myself in a country in Latin America investigating a complicated persistent business compromise being implemented through both electronic and human means. I had already been...

ShadowDragon and DeliverFund Partner to Catch Human Traffickers

ShadowDragon and DeliverFund Partner to Catch Human Traffickers

By Daniel Clemens / Dec 16, 2016 12:00:00 AM

Cheyenne, Wyoming – December 15, 2016 ShadowDragon, a company that develops specialized digital investigations technology, and DeliverFund, a nonprofit dedicated to disrupting sex trafficking...

Artifacts, Speculation and Compromised Secrets at the Democratic National Committee and more...

Artifacts, Speculation and Compromised Secrets at the Democratic National Committee and more...

By Daniel Clemens / Jun 16, 2016 12:00:00 AM

The buzz of cyber compromise has been booming since the AP released some interesting points on the Hillary Clinton email compromise. This was followed up by Brian Krebs on May 16th, 2016 noting less...

The Cyber Crime Chronicles: The Cyber Criminal

The Cyber Crime Chronicles: The Cyber Criminal

By Daniel Clemens / Jun 2, 2016 12:00:00 AM

Perhaps the most nefarious, these attackers are driven almost exclusively by financial gain. These criminals typically target personal and corporate systems, and range in skill from Nigerian 419...

MalNet Maltego Transforms with ProofPoint Data

MalNet Maltego Transforms with ProofPoint Data

By Daniel Clemens / May 10, 2016 12:00:00 AM

MalNet accesses the Proofpoint ET Intelligence™ comprehensive database that contains current and historical malicious IP addresses and domains. In this blog post we share screenshots of Maltego 4...

ShadowDragon Screenshots with Maltego M4 Release

ShadowDragon Screenshots with Maltego M4 Release

By Daniel Clemens / May 3, 2016 12:00:00 AM

Below are a few screenshots of our flagship product SocialNet, integrated with the new Maltego M4 release. If you haven’t seen the video from Maltego, please go check it out now. Email Correlations

OSINT Process, SocialNet and Breaking Bad Case Files

OSINT Process, SocialNet and Breaking Bad Case Files

By Daniel Clemens / May 2, 2016 12:00:00 AM

Our first artifact, begins with the email address rumored to be used by Jesse Pinkman, pivoting on one to one correlations between his favorite social media provider and others, we find his wish...

Tracking GozNym Campaigns with MalNet

Tracking GozNym Campaigns with MalNet

By Daniel Clemens / Apr 22, 2016 12:00:00 AM

In 2007, Don Jackson while at SecureWorks had written about the Gozi Trojan, sharing details on the modularization and monetization strategies utilized by this family of malware. More recently,...

Demonstration: Tracking Malware Campaigns and Domains Using MalNet

Demonstration: Tracking Malware Campaigns and Domains Using MalNet

By Daniel Clemens / Apr 15, 2016 12:00:00 AM

MalNet brings together the industry’s most up to date and extensive threat information from Proofpoint with Maltego link analysis capabilities from ShadowDragon. MalNet enables threat analysts and...

ShadowDragon Announces Partnership with Proofpoint

ShadowDragon Announces Partnership with Proofpoint

By Daniel Clemens / Mar 8, 2016 12:00:00 AM

Cheyenne, Wyoming – March 8, 2016 ShadowDragon, a U.S.-based cyber threat intelligence solutions company, has entered into a partnership with Proofpoint, a leading next-generation cybersecurity...

Packet Ninjas Formally Announces the Formation of ShadowDragon

Packet Ninjas Formally Announces the Formation of ShadowDragon

By Daniel Clemens / Feb 16, 2016 12:00:00 AM

Cheyenne, Wyoming – February 16, 2016 Packet Ninjas, a niche cyber security consulting and services company, today announced the formation of a sister company named ShadowDragon. ShadowDragon will...

The Cyber Crime Chronicles: Your Friendly Neighborhood Hacker

The Cyber Crime Chronicles: Your Friendly Neighborhood Hacker

By Daniel Clemens / Nov 28, 2015 12:00:00 AM

Just a couple of weeks ago the world was rocked by the news that CIA Director John Brennan’s AOL email account (apparently that’s still a thing) had been hacked. Immediately, speculation began. Had...

The Cybercrime Chronicles: Understanding The Actors

The Cybercrime Chronicles: Understanding The Actors

By Daniel Clemens / Nov 27, 2015 12:00:00 AM

Cyber Threat Types and Motivations There are several types of cyberwars going on at any given time. There are plain old hacking attacks, criminally-targeted attacks, nation state cyberwar, and...

Why OSINT?

Why OSINT?

By Daniel Clemens / Nov 26, 2015 12:00:00 AM

Ordinary Info to You; Opportunity to a Cyber Criminal As its name suggests, OSINT is intelligence gleaned from publicly available sources such as social media, company websites, news sites, even...

Scroll to Top