Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger

Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger

By Daniel Clemens / Jan 11, 2023 2:38:21 PM

After six weeks of investigation, on Dec. 30, 2022 authorities arrested Bryan Kohberger as the key suspect in the quadruple murders of four University of Idaho students. This case (which is ongoing)...

ShadowDragon Expands Partnership Programs to Meet Global Demand for OSINT Collection

ShadowDragon Expands Partnership Programs to Meet Global Demand for OSINT Collection

By Admin / Sep 7, 2022 7:00:00 AM

Hoover, AL – As the sophistication of organized cyber threats increases, so does the need for cooperation to catch the perpetrators of these malicious acts. ShadowDragon™, a leading provider of cyber...

You want to build a Platform? ..What Platform Should I use?

You want to build a Platform? ..What Platform Should I use?

By Daniel Clemens / Aug 9, 2020 12:00:00 AM

The echo’s of investors had started the buzz of the need for new investigative / intelligence platforms a great deal more than there had been in the past few years. The buzz will only gain more...

Hacking in the Middle East

Hacking in the Middle East

By Josh C / Apr 24, 2020 12:00:00 AM

In the past, we have looked into a hacker who comes from Iran by the name of Mrb3hz4d. Now if we take some of the information we saw from his defacement, we can create an extremely simple OIMonitor...

Filtering Out Noise

Filtering Out Noise

By Brooks M / Mar 25, 2020 12:00:00 AM

When starting a project in OIMonitor, you are tempted to cast a wide net and grab from every source. This will bring in a lot of hits and you may even think, “Wow, this is awesome! I am awesome! My...

Unmasking a carder with OSINT

Unmasking a carder with OSINT

By Elliott Anderson / Feb 19, 2020 12:00:00 AM

Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder.I spent about an hour on the basics of the investigation. The...

Tracking an Outbreak

Tracking an Outbreak

By Brooks M / Jan 29, 2020 12:00:00 AM

I recently setup a project in OIMonitor to track the mentions of infectious diseases mentioned in the news. I immediately got results, though not all of it was good. One thing that did pop up...

ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

ShadowDragon Podcast #07 - Matt Devost Interview | Disinformation Attacks Against Institutions of Trust, Turing Assessments for Datasets, Exploration of Red Teaming Innovation

By Admin / Jan 21, 2020 10:20:04 AM

Risk management strategies that work are hard to find in such a noisy infosec buzzword filled industry. Our guest Matt Devost, offers perspective on subjects which will be helpful for beginners,...

ShadowDragon Podcast #06 - COVID19 Conversation and Observations

ShadowDragon Podcast #06 - COVID19 Conversation and Observations

By Admin / Jan 21, 2020 10:20:04 AM

We have been monitoring COVID19 and observed that we need to dig in deeper with experts in the field. In this episode we explore that dialogue. In our podcast, we aren’t always the experts in...

Iran and OSINT Hunting for Fun & Profit.

Iran and OSINT Hunting for Fun & Profit.

By Elliott Anderson / Jan 15, 2020 12:00:00 AM

Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”. There’s no deep takeaway here –– just some basic searching and the techniques involved. Iran...

What Will OSINT/PAI and Collection at Scale Look like for 2020?

What Will OSINT/PAI and Collection at Scale Look like for 2020?

By Daniel Clemens / Jan 11, 2020 12:00:00 AM

2020 will be eventful and likely one of the most historical years containing change, balancing the tension between change, conflict, and hopefully peace in a long time. When reflecting on the...

The Problem with Technology Keywords

The Problem with Technology Keywords

By Josh C / Dec 4, 2019 12:00:00 AM

Big data, AI, machine learning, block chain, and every other cool new tech words are all really just that–words. To a developer or computer scientist, they are a type of tool to solve specific...

Iranian Watering Holes. Target Centric Analysis & Looking for Additional IOCs Related to clear.co.ir | 79.127.125.179 with ShadowDragon MalNet & ProofPoint Data

Iranian Watering Holes. Target Centric Analysis & Looking for Additional IOCs Related to clear.co.ir | 79.127.125.179 with ShadowDragon MalNet & ProofPoint Data

By Daniel Clemens / Dec 1, 2019 12:00:00 AM

Additional information is always needed on initial indicators for a SOC analyst or incident handler. In this case, initial indicators point to [ clear. co. ir and 79.127.125.179 ] engaging in...

The Vital Few and the Useful Many

The Vital Few and the Useful Many

By Brooks M / Oct 1, 2019 12:00:00 AM

In 1896, at the University of Lausanne in Switzerland, a young economist by the name of Vilfredo Pareto published a paper showing how 80% of the land in Italy was owned by 20% of the population....

Job Post: Training and Curriculum Specialist

Job Post: Training and Curriculum Specialist

By Daniel Clemens / Sep 3, 2019 12:00:00 AM

ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities,...

Bad moods = Bad decisions

Bad moods = Bad decisions

By Elliott Anderson / Aug 25, 2019 12:00:00 AM

As a developer and OSINT investigator, I often come across other investigators that are researching a target online and have “hit a wall,” so to speak. “I’ve hit a dead-end, I can’t figure anything...

Illuminating Context with Timeline Analysis

Illuminating Context with Timeline Analysis

By Daniel Clemens / Jul 29, 2019 12:00:00 AM

In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions will...

It’s Hard Out There for a Pimp

It’s Hard Out There for a Pimp

By Brooks M / Jun 24, 2019 12:00:00 AM

Human trafficking, according to Wikipedia, is the trade of humans for forced labour. With the advent of the internet and high-speed communication, traffickers have found a new way to advertise their...

Forget About Deep and Dark Web Hype

Forget About Deep and Dark Web Hype

By Elliott Anderson / Jun 12, 2019 12:00:00 AM

Everyone has a different use case that needs to be monitored, and we enable a vast amount of use cases for tailored collection and monitoring with OIMonitor at a very high scale and have been doing...

Social Networks: Friends of Friends

Social Networks: Friends of Friends

By Josh C / May 31, 2019 12:00:00 AM

Today we are going to look at how we can build a network from a single starting entity and use that network to identify the actors in the network that are the most connected. For this example, we...

DataWalk And ShadowDragon Team To Enhance Investigative Capabilities

DataWalk And ShadowDragon Team To Enhance Investigative Capabilities

By Daniel Clemens / May 16, 2019 12:00:00 AM

Redwood City, California – May 16, 2019 DataWalk and ShadowDragon have formed a strategic technical alliance to facilitate more complete and detailed investigations incorporating open source...

Buckle up for Step-by-Step Insight into Charming Kitten Cyberespionage Attacks

Buckle up for Step-by-Step Insight into Charming Kitten Cyberespionage Attacks

By Daniel Clemens / Jan 26, 2018 12:00:00 AM

The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why the Clear Sky report...

Insights Success Magazine names ShadowDragon one of the “The 10 Best Performing #CyberSecurity Solution Providers.”

Insights Success Magazine names ShadowDragon one of the “The 10 Best Performing #CyberSecurity Solution Providers.”

By Daniel Clemens / Jan 12, 2018 12:00:00 AM

ShadowDragon: Solving the Challenges of Modern Investigations Today, the internet is ubiquitous. It has revolutionized businesses and communications. It also has revolutionized crime....

ShadowDragon Gains New Distribution Partner to Support Businesses in the Fight Against Cybercrime

ShadowDragon Gains New Distribution Partner to Support Businesses in the Fight Against Cybercrime

By Daniel Clemens / Dec 1, 2017 12:00:00 AM

Cheyenne, Wyoming – ShadowDragon, a U.S.-based cyber threat intelligence solutions company, has entered into a distribution agreement with GuidePoint Security LLC, a Virginia-based technology...

Before Threat Intelligence: How We Forged Tailored Monitoring and Alerting... Anonymous Investigations Inspired Innovation

Before Threat Intelligence: How We Forged Tailored Monitoring and Alerting... Anonymous Investigations Inspired Innovation

By Daniel Clemens / Sep 26, 2017 12:00:00 AM

It was the end of 2010. The Packet Ninjas’ team (the predecessor of ShadowDragon) had been making mad dashes on application assessments and penetration tests while deployed to a nowhere...

ShadowDragon named to CIOReview’s 20 Most Promising Enterprise Security Solution Providers 2017

ShadowDragon named to CIOReview’s 20 Most Promising Enterprise Security Solution Providers 2017

By Daniel Clemens / Sep 5, 2017 12:00:00 AM

Cheyenne, Wyoming – ShadowDragon makes it to the list of 20 Most Promising Enterprise Security Solution Providers 2017 by CIOReview. CIOReview is a technology magazine with a mission to guide...

ShadowDragon MalNet - ProofPoint Maltego Transforms | Vietnamese Victims 1937CN

ShadowDragon MalNet - ProofPoint Maltego Transforms | Vietnamese Victims 1937CN

By Daniel Clemens / Aug 28, 2017 12:00:00 AM

Votiro Labs and ClearSky CyberSecurity both based out of Israel, through use of MalNet have uncovered a slew of interesting TTPs and infrastructure believed to be used by the 1937CN group. Votiro &...

iHTAC Offers LE Resources to Help Children Victimized by Human Trafficking

By Daniel Clemens / Aug 5, 2017 12:00:00 AM

Accelerating Law Enforcement Capabilities DeliverFund’s iHTAC is a unique collaboration with corporate partners who bring innovative technology tools used to accelerate law enforcement capabilities...

Tales from the Trenches: Assumptions & Out-of-Country Investigations

Tales from the Trenches: Assumptions & Out-of-Country Investigations

By Daniel Clemens / Feb 22, 2017 12:00:00 AM

In one case, I found myself in a country in Latin America investigating a complicated persistent business compromise being implemented through both electronic and human means. I had already been...

Artifacts, Speculation and Compromised Secrets at the Democratic National Committee and more...

Artifacts, Speculation and Compromised Secrets at the Democratic National Committee and more...

By Daniel Clemens / Jun 16, 2016 12:00:00 AM

The buzz of cyber compromise has been booming since the AP released some interesting points on the Hillary Clinton email compromise. This was followed up by Brian Krebs on May 16th, 2016 noting less...

The Cyber Crime Chronicles: The Cyber Criminal

The Cyber Crime Chronicles: The Cyber Criminal

By Daniel Clemens / Jun 2, 2016 12:00:00 AM

Perhaps the most nefarious, these attackers are driven almost exclusively by financial gain. These criminals typically target personal and corporate systems, and range in skill from Nigerian 419...

MalNet Maltego Transforms with ProofPoint Data

MalNet Maltego Transforms with ProofPoint Data

By Daniel Clemens / May 10, 2016 12:00:00 AM

MalNet accesses the Proofpoint ET Intelligence™ comprehensive database that contains current and historical malicious IP addresses and domains. In this blog post we share screenshots of Maltego 4...

ShadowDragon Screenshots with Maltego M4 Release

ShadowDragon Screenshots with Maltego M4 Release

By Daniel Clemens / May 3, 2016 12:00:00 AM

Below are a few screenshots of our flagship product SocialNet, integrated with the new Maltego M4 release. If you haven’t seen the video from Maltego, please go check it out now. Email Correlations

OSINT Process, SocialNet and Breaking Bad Case Files

OSINT Process, SocialNet and Breaking Bad Case Files

By Daniel Clemens / May 2, 2016 12:00:00 AM

Our first artifact, begins with the email address rumored to be used by Jesse Pinkman, pivoting on one to one correlations between his favorite social media provider and others, we find his wish...

Tracking GozNym Campaigns with MalNet

Tracking GozNym Campaigns with MalNet

By Daniel Clemens / Apr 22, 2016 12:00:00 AM

In 2007, Don Jackson while at SecureWorks had written about the Gozi Trojan, sharing details on the modularization and monetization strategies utilized by this family of malware. More recently,...

Demonstration: Tracking Malware Campaigns and Domains Using MalNet

Demonstration: Tracking Malware Campaigns and Domains Using MalNet

By Daniel Clemens / Apr 15, 2016 12:00:00 AM

MalNet brings together the industry’s most up to date and extensive threat information from Proofpoint with Maltego link analysis capabilities from ShadowDragon. MalNet enables threat analysts and...

The Cyber Crime Chronicles: Your Friendly Neighborhood Hacker

The Cyber Crime Chronicles: Your Friendly Neighborhood Hacker

By Daniel Clemens / Nov 28, 2015 12:00:00 AM

Just a couple of weeks ago the world was rocked by the news that CIA Director John Brennan’s AOL email account (apparently that’s still a thing) had been hacked. Immediately, speculation began. Had...

The Cybercrime Chronicles: Understanding The Actors

The Cybercrime Chronicles: Understanding The Actors

By Daniel Clemens / Nov 27, 2015 12:00:00 AM

Cyber Threat Types and Motivations There are several types of cyberwars going on at any given time. There are plain old hacking attacks, criminally-targeted attacks, nation state cyberwar, and...

Why OSINT?

Why OSINT?

By Daniel Clemens / Nov 26, 2015 12:00:00 AM

Ordinary Info to You; Opportunity to a Cyber Criminal As its name suggests, OSINT is intelligence gleaned from publicly available sources such as social media, company websites, news sites, even...

Scroll to Top