Historical OSINT - Profiling the Loads.cc Enterprise

Remember loads.cc? In this post I’ll provide actionable intelligence on the popular DDoS for hire service circa 2008 and offer in-depth perspective on the tactics utilized by the gang behind the service for the purpose of earning fraudulent revenue in the process of monetizing access to malware-infected hosts.

Sample malicious and fraudulent infrastructure known to have participated in the


Article Link: http://feedproxy.google.com/~r/DanchoDanchevOnSecurityAndNewMedia/~3/UoaU9JAgy0s/historical-osint-profiling-loadscc.html