Welcome to Astalavista.box.sk - Official Project Re-Launch courtesy of Dancho Danchev a.k.a tHe mAnIaC circa the 90's - a revolution in technological warfare privacy and security!
What is Astalavista.box.sk? Astalavista.box.sk is one of the Web's most popular and primary destinations for hackers and security experts in the World since 1994 and is also known as the original search engine for hackers circa the 90's and continues to attract thousands of loyal and long-time visitors across the globe on a daily basis.
In 2021 we're proud to officially re-launch the project under the supervision of the primary project operator Dancho Danchev a.k.a tHe mAnIaC circa the 90's and to introduce a variety of new features and community oriented services which include a Wordpress blog a hacking and security forum including a security newsletter and an IRC server including a flagship E-Zine for hackers and security experts called "Wisdom Kings" under the super vision of the World's leading expert in the field of cybercrime research and threat intelligence gathering who aims to offer high-profile and high-value hacking and security content including a flagship search engine for hackers and security experts including a flagship Dark Web search engine targeting and serving the needs of thousands of loyal users on a daily basis.
Primary Project Email Contact Point - email@example.com - typical response time includes 2 hours and updates to this Web site will be issued on a weekly basis including the following XMPP/Jabber/OMEMO account ID firstname.lastname@example.org
Keywords: Dark Web, Dark Web Onion, Hacking, Hacker, Hackers, Dancho Danchev, Intelligence, Intelligence Studies, Intelligence Community, NSA, GCHQ, Cyber Intelligence, Malicious Software, Malware, Cyber Surveillance, Eavesdropping, Wiretapping, Top Secret, Classified, Top Secret Program, Classified Program, Cybercrime, Data Mining, Big Data, Cybercrime Research, Threat Intelligence, Security Industry, Information Security, Information Security Industry, Computer Security, Computer Hacking, Network Security, Network Hacking, OSINT, Russia, Iran, Russian Hackers, Iranian Hackers, Russian Cybercriminal, Cybercrime Forum, Cybercrime Forum Community, Astalavista, Astalavista.box.sk, Box.sk, Box.sk Network, Cracks, Serials, Keygens, Key Generators, Hacker Search Engine, Cracks Search Engine, Serials Search Engine, Threat Intelligence, Cybercrime Research, Malware, Malicious Software, Botnet, Botnets, Reverse Engineering
Search Engine for hackers security experts programmers reverse engineers cracks/serials/key generators/lyrics/torrents and adult content
Dark Web Search Engine
Primary Project Links:
https://astalavista.box.sk | https://astalavista.box.sk/phpBB3 | https://astalavista.box.sk/wordpress | Cybertronics - VR for Hackers | Old Web Site
Personal Photos from the Lab circa 2006-2021 courtesy of Astalavista.box.sk Project Operator Dancho Danchev:
PGP Key for email@example.com
-----BEGIN PGP PUBLIC KEY BLOCK-----
-----END PGP PUBLIC KEY BLOCK-----
Personal Conference Event photos courtesy of Astalavista.box.sk Project Operator Dancho Danchev:
Introducing Astalavista.box.sk official Call for Papers and Call for Innovation:
Currently we offer files and seek documents and tools and releases in the following categories:
- Hacking – Tools/Programs/Viruses/Trojans/Worms
- Cracking – Tools/Programs/Source Code
- Phreaking – Tools/Programs/Papers/Documents
- Anarchy – Papers/Documents/Tutorials/Guides/Manuals
- Hacktivism – Web Defacements/Group Home Pages/Group Statements
- Podcasts – Exclusive audio podcasts from leading hacking/cracking/phreaking/anarchy groups
- Interviews – Exclusive interviews with people from the Scene including hacking/cracking/phreaking/anarchy groups
- Videos – Exclusive videos from leading hacking/cracking/phreaking/anarchy groups including group statements
Call for Action – Do you produce quality and high-profile hacker and security documentation papers tools and research articles including releases including videos? Do you know a lot of people from the Scene? Do you want to participate and take the portal to a new level? Approach us with data information and knowledge including the associate PoC where applicable using firstname.lastname@example.org
Call for Papers – We’re currently seeking unique and never-published before documentation and manuals in the following categories and you can begin submitting content to us right away.Honeypot Technologies – here we accept papers falling under the following categories:
- Honeypot Technologies – section covering development and implementation including novel network traffic and persona data interception and acqusition technologies including novel approaches to implement spam-trap on a large-scale including novel approaches to manage run and operate large-scale honey-farms and building and implementation Large Scale Network-based Honeypot systems
- Privacy Technologies – here we accept papers documents PoC (Proof of Concept) tools covering new current and emerging privacy and anonymization technologies including research and evaluation examples and PoC (Proof of Concept) tools covering current and emerging privacy and anonymization technologies.
- Malicious Software and Botnet Technologies – here we accept novel and never-published before research documents manuals and tutorials covering novel malicious software releases and botnet analysis including command and control (C&C) infrastructure analysis passive and active sensor monitoring including command and control (C&C) infrastructure “take-down” and active personalization and “real-life” botnet and malware release author identification and tracking down mechanisms and technologies
- Automated OSINT and Social Media Analysis – here we accept novel and never-published before research documents and papers including tutorials in the area of building Large Scale Automated OSINT and Social Media Analysis tools including practical and never-published before research covering passive and active OSINT data acquisition dissemination and enrichment PoC (Proof of Concept) tools documents papers and technology proposals.
- Threat Intelligence Technologies – here we accept novel and never-published research in the area of Threat Intelligence acquisition dissemination and enrichment including IoC (Indicator of Compromise) enrichment technologies documents papers and tutorials
- Online Persona De-Anonymization Technologies – here we accept novel and never-published before research in the area of online persona de-anonymization technologies including passive and active including automated “real-life” personalization and tracking and taking-down of network assets including documents papers and tutorials.
Call for Tools and Services – We’re currentlty seeking proprietary and never-published before tools in the following categories and you can begin submitting content to us right away.
- Penetration Testing – here we accept proprietary and never-published before both passive and active penetration testing tools including network reconnaissance passive and active network enumeration including exploit payload development and exploit targeting platforms including collaborative penetration-testing environments available as a managed SaaS (Software-as-a-Service) or as a on-premises appliance-based basis
- Exploit Development – here we accept proprietary and never-published before expoit development tools including payload development public and private repositiory payload acquisition and actual payload delivery mechanisms tools of the trade
- OSINT (Open Source Intelligence) – here we accept passive and active OSINT gathering processing and disseminating public and proprietary and never-published before tools in the area of person or network mapping and reconnaissance including possible passive and active social media network exploitation
- Vulnerability Discovery – here we accept never-published before tools assisting researchers in finding new flaws and vulnerabilities and actually allowing them to actually craft the payload spread and execute it such as for instance static and dynamic source code analysis tools including passive and active network infrastructure vulnerability exposure enumeration and detection
- Threat Intelligence Tools – here we accept never-published before Threat Intelligence gathering processing and disseminating tools and SaaS (Software-as-a-Service) type of Scene and community-driven services such as for instance passive and active Threat Intelligence IoC (Indicator of Compromise) aggregation collection and dissemination type of tools including central repositories and emerging modern Threat Intelligence platform toolkits
- Malware Analysis – here we accept never-published before malware analysis source code analysis and actual sample repositories tools and source code that would greatly assist an analyst including the Scene and the community in detecting responding to and proactively and actively analyzing and exposing the inner workings behind a particular piece of malicious software including a specific botnet
- Covert Channel Technologies – here we accept novel and never-published before covert channel type of technology tools assisting a hacker or a penetration tester including a government official into ensuring and maintaining access on a single-point access basis including multi-peer cover channel communication network eventually used by a group of individuals whose idea is to ensure that their communication channel remains largely impossible to spy and eavesdrop on including possible deep-packet inspection type of surveillance and censorship attempts
- Anonymization Technologies – Custom Private Privacy and Anti-Fingerprint and Anti-Exploit Prevention Techniques Enabled browser solution including the associated PoC (Proof of Concept) including the necessary documentation and manual
Call for Research – We’re seeking content under the following categories including the following topics and you can begin submitting content to us right away.
- Hacking – here we accept tools, trojan horses, worms, RATs (Remote Access Tools) text files tutorials manuals documentation and invite-only private event presentation content including custom-made and never published before tools documents and manuals including live hacking exampes and live hacking scenarios
- Cracking – here we accept reverse engineering tools documents manuals and tutorials including live video tutorials guides and manuals including live-cracking examples and invite-only private event presentations
- Phreaking – here we accept tools documents videos and tutorials covering telecommunication network hacking including VoIP hacking and defense mechanisms including documents guides and PoC (Proof of Concept) tools including invite-only private event presentations and never-published before research
- Anarchy – here we accept “real-life” and “virtual life” oriented anarchy material including manuals guides and general recommendation and advice including personal statements and “how-to” manuals and guides incuding never-published before anarchy-themed material including images and group statements and presentations where applicable
- Hacktivism – here we accept the very latest Web Site Defacements personal group photos video group statements new groups emerging statements greets and shouts including personal and private never-published before hacking and Web site defacement tools manuals documentation and PoC (Proof of Concept) tools where applicable
- Intelligence Community – here we accept general advice documents and manuals including PoC (Proof of Concept) tools where applicable including private and never published before UFO and “classified” and “secret” personal including public and private satellite photos and images including guides and manuals covering Virtual SIGINT Offensive Cyber Warfare PoC (Proof of Concept) tools and research analysis documents including “leaked” and visitor-produced documents guides and manuals that will help new visitors and the Community get a better picture of how to become a spook and how to work with sensitive and classified material including the basics of the Intelligence Community
- Podcasts – here we accept private and public group’s personal audio statements in the form of podcasts on current and future group developments personal statements incuding current and future hacking and security trends discussion and general tips and advice and recommendation
- Videos – here we currently accept hacking videos hacking training videos hacking tutorials live hacking video examples including group statement and group-oriented private event presentation and research videos
Call for Innovation: We’re currently seeking your expertise and experience in the following community and Scene oriented services and solutions including the following commercial services and solutions that we would like to bring to life courtesy of our experts and daily visitors in a free Community and Scene-oriented fashioned including a possible commercial venture-based type of project funding courtesy of World Hacker Global Domination Group.
U.S Intelligence Community and Private Sector Community Solutions that we’re currently seeking your expertise and experience on:
- Building and Managing Large Scale Honeyfarms including efficient and cost-effective cloud-based honeypot deployment research and innovation technical papers and documentation including PoC (Proof of Concept) tools where applicable including manuals and documentation and associated tutorials
- Large-Scale Surveillance and Eavesdropping Public and Private Social Media Data Acquisition Enrichment and Dissemination Solutions targeting “Lawful Surveillance” and “Lawful Interception” solution including the associated PoC (Proof of Concept) tool and solution demonstration
- Passive and Active CYBERINT (Virtual SIGINT) Service Solutions Development Data Acquisition and Enrichment Methodology Proposal including the associated PoC (Proof of Concept) including the necessary documentation and manual
- Threat Intelligence Central Repository of Data including modern aggregation and passive and active data and IOC (Indicator of Compromise) aggregation and acquisition development methodology including the necessary PoC (Proof of Concept) where applicable including the necessary documentation and manual
- Tailored Access Operations Suite and Modern Target Acquisition and Exploitation Platform development including the necessary PoC (Proof of Concept) where applicable including the necessary documentation and manual
- Lawful surveillance and Lawful Interception Suite targeting multiple platforms including Windows, Linux, Mac OS X and Android including Symbian and Blackberry mobile operating systems capable of active payload delivery target acquisition and targeting including active target exploitation and target retention in the context of maintaining access to the targeted device including the associated PoC (Proof of Concept) including the necessary documentation and manual
- Offensive Military-Grade Nation-State Targeting Cyber Warfare platform capable of network reconnaissance network mapping targeting acquisition and target enrichment capabilities including the necessary PoC (Proof of Concept) including the necessary documentation and manual
Introducing Astalavista.box.sk flagship IRC server - irc.astalavista.box.sk - Join Us Today!
Featured flagship Astalavista.box.sk crypto-currency earning hardware IPS/IDS appliance - "Earn Revenue for Catching the Bad Guys":
Recommended flagship search engine for hackers and security experts keywords:
- Kali Linux
- Social Engineering
- SQL Injection
- Secure Coding
- Bug Bounty
- Exploit Kit
- Zero Day
- Patch Tuesday
- Remote Code Execution
- Dark Web
- Deep Web
- Indicator of Compromise
- Advanced Persistent Threat
- Malware Tracker
- Malware Blocklist
- Threat Intelligence Feed
- Threat Intelligence API
- Command and Control
- Malware Feed
- Malware Sandbox
- Reverse Engineering
- Malware Sample
- Passive DNS
- IP Reputation
- Spam Filtering
- Spam Solution
- Spam Feed
- Bayesian Filter
- Heuristic Filter
- Temporary Email
- Blackhat SEO
- Phishing Framework
- Phishing Template
- Spear Phishing
- Phishing Report
- Security Training
- Domain Reputation
- Phishing Kit
- P2P Botnet
- Botnet Shutdown
- Botnet Sinkole
- IRC Botnet
- ASN Monitoring
- Linux Malware
- Botnet Mitigation
- Spam Botnet
- DDoS Botnet
- Botnet Tracker
- SSL Encryption
- Full Disk Encryption
- End-to-End Encryption
- Cookie Tracking
- Do Not Track
- Tor Network
- Browser Finterprint
- Encrypted Email
- Encryption Tool
- Zero Knowledge Backup
- Ethernet Encryption
- Money Mule
- Re-Shipping Fraud
- Credit Card Fraud
- Hacker Group
- Web Site Defacement
- Mobile Botnet
- IoT Botnet
- Router Botnet
- Exit Node
- VPN Jurisdiction
- VPN No Logs
- VPN Router
- Free VPN
- VPN Trial
- VPN Technology
Introduction to Astalavista.box.sk's flagship hacking and security E-Zine called "Wisdom Kings":
01. Introduction........................................by Phenomix
02. 10 years back in the future.........................by Phenomix
02. Back to basics .....................................by Phenomix
03. The basics of Social engineering....................by Phenomix
04. How to make anarchy for beginners...................by Phenomix
05. How to hack for fun.................................by Phenomix
06. The ultimate guide to getting a girlfriend..........by Phenomix
07. Exploiting the scene for fun and profit.............by Phenomix
08. Hacking your school for fun and profit..............by Phenomix
09. Exposing the "Data Leaks" Paradise..................by Phenomix
10. How not to get "caught".............................by Phenomix
11. CYBERINT and Virtual SIGINT Exposed.................by Phenomix
12. From Cybercrime to Multi-Billion Dollar Industry....by Phenomix
13. The "Dark Web" Exposed and Profiled.................by Phenomix
14. Exposing the Bastards who stole the Scene...........by Phenomix
15. Top 20 Hacking Sites and Hacking Forums.............by Phenomix
16. Greetz and Shouts go out to.........................by Phenomix
17. Conclusion..........................................by Phenomix
A Brief History of the Hacking and Security Scene through the prism of the Project Operator Dancho Danchev's experience in the Scene:
Dancho Danchev (https://ddanchev.blogspot.com) is the world's leading expert in the field of cybercrime fighting and threat intelligence gathering having actively pioneered his own methodlogy for processing threat intelligence leading to a successful set of hundreas of high-quality anaysis and research articles published at the industry's leading threat intelligence blog - ZDNet's Zero Day, Dancho Danchev's Mind Streams of Information Security Knowledge and Webroot's Threat Blog with his research featured in Techmeme, ZDNet, CNN, PCWorld, SCMagazine, TheRegister, NYTimes, CNET, ComputerWorld, H+Magazine currently producing threat intelligence at the industry's leading threat intelligence blog - Dancho Danchev's - Mind Streams of Information Security Knowledge.
With his research featured at RSA Europe, CyberCamp, InfoSec, GCHQ and Interpol the researcher continues to actively produce threat intelligence at the industry's leading threat intelligence blog - Dancho Danchev's - Mind Streams of Information Security Knowledge publishing a diverse set of hundreds of high-quality research analysis detailing the malicious and fraudulent activities at nation-state and malicious actors across the globe.
We would like to thank the following people for contributing to the Scene throughout the 90's up to present day and for keeping up the good work!
Link back to us:
Project Operator Introduction:
Dear Astalavista.box.sk user,
This is Dancho Danchev (https://ddanchev.blogspot.com) where you might know me and my research circa 2005-2020 from my Clearnet personal blog an ex-hacker from Bulgaria during the inframous hacker spree circa the 90's today's leading expert in the field of cybercrime research and threat intelligence gathering currently running one of the security industry's leading security publications which has already receive 5.6M page views since December, 2005 when I originally launched it while I was busy working on https://astalavista.com as a Managing Director where I produced the following high-quality newsletter - https://packetstormsecurity.com/groups/astalavista.
The primary reason for taking to time an effort and work on this Dark Web Onion is to properly present one of the Dark Web largest and most popular cybercrime research and threat intelligence gathering including Intelligence Community 2.0 type of project to thousands of Dark Web users potentially communicating a vast portion of my research with a new set of folks who might be interested in digging deeper into the world of cybercrime and who's behind it including to actually land a career position as cybercrime researchers or U.S Intelligence Community intelligence analysts.
The project aims to provide in-depth and never-released before technical and personally identifiable information on some of the Web's primary and most important cybercriminals internationally including an in-depth overview of all the currency active U.K'S GCHQ and NSA cyber surveillance and cyber intelligence programs and how they can work better including how you can protect yourself from them including an in-depth discussion on various Intelligence Community 2.0 scenario building methodologies which could easily undermine the current state of the security industry including in-depth dossiers on some of the key individuals behind the U.S and international security industry with the idea to present a picture where Tailored Access and credibility operations can take place and possibly propose actual Tailored Access Operations including methods and techniques to protect yourself from such type of attacks.
Sample Logo of Dancho Danchev's Personal Hacking Web Site Project circa the 90's called "Security is Futile"
Dancho Danchev is the world's leading expert in the field of cybercrime fighting and threat intelligence gathering having actively pioneered his own methodlogy for processing threat intelligence leading to a successful set of hundreas of high-quality anaysis and research articles published at the industry's leading threat intelligence blog - ZDNet's Zero Day, Dancho Danchev's Mind Streams of Information Security Knowledge and Webroot's Threat Blog with his research featured in Techmeme, ZDNet, CNN, PCWorld, SCMagazine, TheRegister, NYTimes, CNET, ComputerWorld, H+Magazine currently producing threat intelligence at the industry's leading threat intelligence blog - Dancho Danchev's - Mind Streams of Information Security Knowledge.
With his research featured at RSA Europe, CyberCamp, InfoSec, GCHQ and Interpol the researcher continues to actively produce threat intelligence at the industry's leading threat intelligence blog - Dancho Danchev's - Mind Streams of Information Security Knowledge publishing a diverse set of hundreds of high-quality research analysis detailing the malicious and fraudulent activities at nation-state and malicious actors across the globe.
Current and Past Professional Affiliations:
- A Member to WarIndustries (http://warindustries.com)
- List Moderator at BlackCode Ravers (http://blackcode.com)
- Contributor Black Sun Research Facility (http://blacksun.box.sk) (BSRF)
- List Moderator Software Contributor (TDS-2 Trojan Information Database) (https://packetstormsecurity.com/files/25533/tlibrary.zip.html) DiamondCS Trojan Defense (http://tds.diamondcs.com.au)
- Contributor to LockDownCorp (http://lockdowncorp.com)
- Contributor to HelpNetSecurity (http://forbidden.net-security.org)
- A Security Consultant for Frame4 Security Systems (http://frame4.com)
- Contributor to TechGenix’s WindowSecurity.com (http://www.windowsecurity.com/authors/dancho-danchev/)
- Technical Collector - LockDownCorp - (https://lockdowncorp.com)
- Managing Director - Astalavista Security Group - (https://astalavista.com)
- Security Consultant - Wandera - (https://wandera.com)
- Threat Intelligence Analyst - GroupSense - (https://groupsense.io)
- Security Consultant - KCS Group Europe - (https://kcsgroup.com)
- OSINT Analyst - Treadstone71 - (https://treadstone71.com)
- Security Blogger - Armadillo Phone - (https://armadillophone.com)
- Security Blogger for ZDNet (http://www.zdnet.com/blog/security/)
- Threat Intelligence Analyst for Webroot (https://www.webroot.com/blog/)
Primary Clearnet URLs: Personal Blog | Twitter | LinkedIn | Medium | Facebook | Astalavista.box.sk | Wordpress Blog | Unit-123.org
Recommended hacking and security and cybercrime research presentations courtesy of Dancho Danchev:
- Assessing U.S Military Cyber Operational Capabilities to Counter Pro-ISIS Internet Infrastructure
- My Involvement in the Top Secret GCHQ “Lovely Horse” Program and the Existence of the Karma Police
- Kaspersky’s Antivirus Products the NSA and U.S National Security — An Analysis
- Assessment of U.S Intelligence Community Cyber Surveillance Programs and Tradecraft — Part One
- How the NSA utilized Iranian Cyber Proxies To Participate in the BOUNDLESS INFORMANT Program?
- Exposing GCHQ’s Top Secret “GORDIAN KNOT” Cyber Defense Sensor Program — An Analysis
- Exposing GCHQ’s URL-Shortening Service and Its Involvement in Iran’s 2009 Election Protests
- Astalavista.com — The Scene the Way We Know it — My Experience in Running the Portal
- Exposing the U.S Intelligence Community and GCHQ’s Use of “Dirty Tricks” Online — An Analysis
- How the GCHQ Used the Top Secret “ANTICRISIS GIRL” Program to Spy on Users — An Analysis
- The 2016 U.S Presidential Elections and Russia’s Active Measures in Terms of Cyber Espionage
- How the GCHQ and the NSA work on intercepting and infiltrating Virtual Private Networks?
Security Interview with the primary Intelligence Community 2.0 Project Operator - Dancho Danchev published at LinuxSecurity.com
01. Dear Dancho can you please introduce yourself?
My name is Dancho Danchev. I'm 37 years old computer enthusiast and ex-hacker from Bulgaria during the infamous hacking spree throughout the 90's where I managed to directly establish a direct working relatinship with various key members of the Scene and the Security Industry including to actually work as a Technical Collector for the infamous LockDown2000 anti-trojan software including to work as a Trojan Database Manager for the market leading Trojan Defense Suite anti-trojan vendor at the time.
Since December, 2005 I'm running one of the Security Industry's leading security and cybercrime research including Threat Intelligence gathering and OSINT research blogs - Dancho Danchev's Blog - Mind Streams of Information Security Knowledge with over 5.6M active pageviews and visitors throughout the period 2005-2020.
I used to be a ZDNet Zero Day blogger for a period of four years including two highly-productive years while working as a Security Blogger for Webroot. I've been selected by the SCMagazine 2011 Social Media Awards as a finalist with my old Twitter account. I've presented at the Interpol. I've been also invited to present at U.K'S GCHQ including Canadian Intelligence Service's HQ including a Keynote presentation at CyberCamp 2016 including a presentation at RSA Europe and InfoSec Europe on current cybercrime trends and cyber jihad. I've also particited in a Top Secret U.K Government Program entitled "Lovely Horse" and I was practically running https://astalavista.com - The Underground throughout 2003-2006.
I'm currently one of the World's leading and most often cited and referenced cybercrime researcher security blogger and threat intelligence analyst with over a decade in fighting cybercrime and actively responding to current and emerging cybercrime threats.
I've recently launched a high-profile project on the infamous https://astalavista.box.sk including https://box.sk/wordpress and I'm currently working on my personal memoir from the 90's entitled "Cyber Conspiracy - Who Owns Them All". I'm also running a popular E-Shop for intelligence deliverables - https://unit-123.org and I'm also pretty active on Twitter - https://twitter.com/dancho_danchev including Medium - https://medium.com/@danchodanchev
02. How did you get involved in computers?
During that period of time in particular the 90's possessing a personal computer could be easily considered a privilege including the ability to get connected to the Internet which I joined at a later stage having spend a decent portion of several active years actively playing PC computer games. Long story short my folks bought me a personal computer for educational and entertainment purposes at the time which was basically an IBM clone known as Pravetz-16 which I was basically using to play games and learn new things.
Throughout the next 20 years I was a proud owner and actually possed a variety of personal computers which I was making sure to properly use and actually end up make a living and basically become a prominent figure in the Scene and the U.S Security Industry.
03. How much time did you spend playing games throughout the 90's?
I was basically spending most of my time playing games and actually looking for ways to obtain new games and actually using email and browse around some of my favorite Internet-based Web sites.
04. What about COCOM at this time?
During that period of time personal computers were sort of luxury and only a small number of companies and organizations really had access to them. I can clearly say that I was largely privileged to posses a personal computer at the time which I did my best to properly utilize and use for playing games doing research and learning new things.
05. Who got you connected online? Since when are you practically online?
It was in the 90's and it was a local person who was basically responsible and acting as a system adminsitrator for my ISP at the time. I've been practically online for over 20 years and I'm basically online 24/7 doing research and actually keeping in touch with friends and colleagues.
06. What were you practically doing online at the time? What was your daily Internet activity routine?
Among the first sites that I would visit at the time on a daily basis was NBA.com including to actually search for new X-Files photos including a possible new Wallpaper including newly released X-Files themed MIDI songs. I would then visit Cyberarmy.com and Progenic.com for the purpose of keeping track of new Hacking and Security web sites and actual hacking and security tools.
07. How did you start getting involved in Security? What prompted you to start your career?
Among the first Web sites for hacking and security that I stumbled upon were personal Web sites for people and folks based in the U.S which I found using several of the most popular search engines at the time. At the time I was greatly provoked by the existence of hacking tools in particular trojan horses which actually led to me pursue a career as a Newsletter Contributor to Trojan Defense Suite and Technical Collector at LockDownCorp at a later stage which were one of the leading anti-trojan software vendor solutions at the time. When I was not busy visiting Cyberarmy.com's Top 50 Hacking Web Sites and Progenic.com's Top 100 Hacking Web sites I was actually busy writing manuals and actually trying to become a member of an actual hacking group. I was also busy running a personal Hacking Web site at the time which basically included a variety of collected E-books and various other tools and programs including my personal hacking and security manuals and actual hacking and security papers.
At a later stage while I was busy working for the infamous https://astalavista.com as a Managing Director where I was busy responsible for the Security Directory content including the overall management of the portal I decided to launch my personal - https://ddanchev.blogspot.com which later on became one of the world's most popular security publications including the Security Industry's flagship security publication for cybercrime research and threat intelligence gathering leading me to the publication of hundreds of high-quality and never-published before security and cybercrime research type of articles which basically largely contributed and led me to pursue a variety of career opportunities within the Security Industry in particular my involvement with Webroot for a period of two years where I actively managed to produce hundreds of high-profile research articles.
I'm currenly active on Twitter - https://twitter.com/dancho_danchev LinkedIn - https://linkedin.com/in/danchodanchev and Medium - https://medium.com/@danchodanchev and I'm often invited at various invite-only or public and commercial Security Events which include InfoSec Europe, RSA Europe and CyberCamp 2016.
08. What were some of your primary hacking and security projects during the 90's?
I used to run a public Hacking and Security Web site which basically consisted of various Hacking and Security tools including collected E-books which everyone who was interested could download. At some point I was busy contributing to WarIndustries, BlackCode Ravers, Black Sun Research Facility, forbidden.net-security.org including several part-time career positions at Trojan Defense Suite including LockDownCorp's Lockdown2000 where I was busy working as a Technical Collector including actor author of the Trojan Analysis Database.
09. What are some of your current hacking and security projects?
I'm currenly running a high-profile project on the infamous https://astalavista.box.sk including a personal blog on the infamous Box.sk network - https://box.sk/wordpress including a public Security and Hacking forum - https://astalavista.box.sk/phpBB3 including an extremely popular E-shop for Intelligence Deliverables - https://unit-123.org including an extremely popular Pro-Western hacking and Security community - https://offensive-warfare.com
10. Did you used to hang on IRC throughout the 90's?
I was basically spending a decent portion on IRC - DALNet in particular including several other local IRC networks when I wanted to chat and hang out with local friends and colleagues. It was a moment of time when I could only dream of having myself actually join EFNet in particular the main-stream password protected and invite only hacking and security channels. I was to run #drugs #KGB and #linuxsecurity on the local IRC Network.
11. What was your typical day in front of the PC throughout the 90's?
I would spend a decent portion of my day strategizing and actually playing Sid Meier's Civilization for the purpose of enriching my knowledge including possibly launching a new military strategy and actual war with another player in particular attempting to reach out a Nuclear Arms race with another player.
I would then log-in online using a local dial-up Internet service provider and check my email including some of my favorite Web sites and actually try and do my best to reply back to friends and colleagues from across the globe.
12. Have you ever compromised a legitimate Web site? What was the purpose? Did they notice? How did you really compromise it?
In my entire teenage ex-hacker enthusiast experience I've only compromised one Web site which was basically my town's official Web site where I managed to obtain the accounting data for the Web site by socially engineering Tripod.com at the time by basically going through the System Administrator's ICQ profile and actually approaching Tripod.com in an attempt to gain access to the Web site for the purpose of changing the home page to spread a message and actually say "hi" and greet local friends.
13. What type of music were you listening at the time? What type of music do you listen today?
I've spend most of my life listening to psychedelic trance including psytrance and goatrance and I'm still actively listening to this type of music up to present day.
14. Who do you think is among the most famous hackers? What does it really consistute a famous hacker? Who was your favorite hacker as a hacker enthusiast during the 90's?
I used to find out about Kevin Mitnick - unfortunately I never posted a sticker on my Web site. Among my favorite hacking groups throughout the 90's was Confidence Remains High in particular their E-Zine.
At a later stage I was also impressed by the existence of a hacker group known as Fluffy Bunny which basically managed to compromise every single high-profile security and hacking Web site at the time and actually left a message.
15. You were among the first people to blow the whistle on high-profile cybercriminals from Eastern Europe and Russian including the infamous Russian Business Network? Do you think the RBN is alive again? Who's behind it? Are there any other high-profile and popular alternatives to the Russian Business Network these days? Who are they?
16. Do you play games today? Which are your favorite titles?
Among my favorite titles currently include the Battlefield franchise including Crysis including the latest edition of Sid Meier's Civilization including a personal favorite which is Command: Modern Air / Naval Operations which is basically one of the best military simulations available on the market today.
17. What are your thoughts on copyright infingement? Do you pay for your stuff including games music and equiptment including software?
I personally pay for all the commercial software that I use including my personal equiptment and my personal music.
18. When did you first started to use the Tor Network? How did you come across it?
I believe it was around 2006 when I was busy researching several U.S Government programs including SPAWAR. I then decided to use it including several other covert communication tools for the purpose of preventing my local ISP from intercepting what I was doing online.
19. How do you remember the rise of Web 2.0 technologies? Which were your favorite Web sites and technologies at the time?
I remember a decent period of time when I was actually tagging my posts with the idea to have Technorati crawl and actually process and feature my posts. I also remember that I actually used to rely on and actually use Delicious including possibly Digg where I was secretly hoping to get one of my story featured.
20. What do you have to do with the U.S Intelligence Community?
In 2008 I received the privilege of getting invited to an invite-only conference event at the GCHQ which I attended with the Honeynet Project. Ever since I made a valuable contributing to the U.S Intelligence Community as an independent contractor and through the research which I've been publishing at my personal https://ddanchev.blogspot.com in terms of high-quality and never-published before OSINT analysis as an independent contractor.
21. You skipped your academic years while working in the Security Industry? What can you tell future college graduates in terms of joining the Security Industry and starting a career?
Forget about it. If you truly want to make something big and important join a local hacking and security community or consider launching a big project that you can properly fund and eventually launch a company on your own.
22. When did you first started getting involved with OSINT?
It was around 2006 while I was busy managing the content at https://astalavista.com and prior to launching my personal - https://ddanchev.blogspot.com
23. What are some of your earliest and current accomplishments in the world of OSINT?
Among my most prominent accomplishments in the world of OSINT is the launch and management of my personal - https://ddanchev.blogspot.com including the tracking and eventual take-down of the Koobface botnet.
24. How long did it take you to track down and shut down the Koobface botnet?
It basically took me a period of two and a half years of active research to evenually produce a high-quality analysis eventually exposing one of the authors behind the botnet.
25. Is it true that you're running one of the Security Industry's most popular security publications?
Since December, 2005 my personal - https://ddanchev.blogspot.com has received over 5.6M page views and visitors internationally making it one of the Security Industry's most popular security publications.
26. Who are among the few people that inspired you the most in the Scene and the Security Industry?
I was particularly impressed by what the guys at FAS.org and Cryptome.org were up to including Dorothy Denning in terms of some of the earliest written material that I came across to in terms of cyber jihad and cyberterrorism.
27. What would be a proper way to say "hi" or "I'm back" to the Security Industry?
It's by launching a high-profile project on one of the World's most popular Web sites for hackers and security experts - https://astalavista.box.sk
Recommended free online hacking and security E-Books:
Second Security Interview with the primary Astalavista.box.sk Project Operator - Dancho Danchev a.k.a tHe mAnIaC circa the 90's
01. Dear Dancho – can you please introduce yourself and the latest Box.sk project? Can you please elaborate more on your experience in fighting cybercrime including your contributions to the threat intelligence gathering community and the U.S Security Industry?
My name is Dancho Danchev. I’ve been an independent contractor doing OSINT cybercrime fighting and threat intelligence gathering for over a decade and I’m currently running one of the security industry’s leading security publications which is my personal blog where I’ve established the foundations for an efficient and relevant OSINT and law enforcement methodology in terms of fighting and disrupting cybercrime internationally which led me to pursue a successful career with several high-profile U.S based companies and organizations throughout the past decade following a successful career as an ex-hacker throughout the 90’s. My daily routine consists of digging deep inside the cyber warfare realm in the context of responding to and tracking down high-profile nation-state sponsored or targeted malware campaigns and cybercrime incidents and keeping track of the bad guys as usual with the idea to contribute to the overall demise of cybercrime internationally and to actually contribute to the U.S Intelligence Community with operational and tactical intelligence including to actively support U.S Law Enforcement on its way to track down and respond to cybercrime events globally.
My primary motivation for re-lauching a project on the original Astalavista.box.sk is to “show them how it’s done” in the context of reaching out to a broader audience in the context of offering practical tactical and operational advice in the World of cyber warfare information warfare operations and to present hardcore and never-published before potentially classified and sensitive material in the world of the U.S Intelligence Community and U.S Law Enforcement and to actually find a constructive and relevant way to say “hi” and “we’re back” to a loyal base of users globally and to actually find a way to “keep the spirit” of the Scene the way we know it. I’ve planned a set of new high-profile projects which I intend to communicate to our audience to a systematic and periodic basis with the idea to offer an insightful and unique peek inside the Scene the way we know it.
02. What are some of the currently running Box.sk projects and what do you have planned for the future?
We’re currenty running a high-profile and extremely popular WordPress blog including a cyber security and hacking forum community and we’ve recently launched an extremely popular Call for Papers and Call for Innovation part of the WHGDG (World Hacker Global Domination Group) franchise where we’re currently soliciting content in a variery of areas and on a variety of topics including a recently launched IRC server including an extremely popular search engine for hackers and security experts including the upcoming launch of our flagship publicly accessible product called Project Cybertronics VR for Hackers and Security Experts including an upcoming high-profile YouTube broadcast featuring folks and experts from the security industry and the Scene.
We’ve also lined up a variety of high-profile and upcoming community-driven and publicly accessible products and services and we’ll be definitely looking forward to issuing periodic updates on their public and proprietary availability. “If it’s going to be massive it better be good” in the context of re-surrecting and re-launching the Scene’s and the security industry’s most popular Web site for hackers and security experts internationally.
Among the key features of the portal include a flagship search engine for hackers and security experts which can be accesses at – and is currently indexing over 3M web sites for hackers and security experts.
03. What do you think about U.S National Security in a post-Snowden world?
I’m a firm believer that building communities around leaked and classified data might not be the best way to actually communicate its value and actually reach out to a wider audience potentially blowing the whistle on currently active and sensitive and classified cyber surveillance and cyber intelligence type of programs part of the portfolio of services courtesy of the U.S Intelligence Community. I’m also positive that a new set of copy-cats will eventually emerge trying to potentially steal operational and tactical know-how from the leaked data potentially setting the foundations for their own private and proprietary cyber surveillance and cyber intelligence products.
In terms of U.S National Security in a post-Snowden world I believe that a specific set of international fan-base or actual clusters of supporters cannot really do much harm besides raising awareness on the actual state of cyber surveillance and cyber intelligence programs and their scale and reach internationally and can actually assist in building a more sophisticated internal security systems in place.
The current state of U.S National Security has to do with a specific set of post 9/11 contractor base which are truly making an impact globally by launching new companies actually hiring people to work for them and actually are fully capable of disrupting and undermining today’s modern and sophisticated cybercrime-driven online activity that also includes various cyber jihad sentiments globally. Case in point would be ISIS which the U.S Cyber Command has specifically targeted and could be possibly used as the most relevant and recent example of fraudulent online cyber jihad activity up to present day in the context of a large scale international campaign which basically attracted the U.S attention which resulted in a variety of campaigns targeting pro-ISIS infrastructure and its supporters.
04. How can you best describe your experience in tracking down and monitoring of the Koobface botnet?
It took me two and a half years of active daily monitoring of the Koobface botnet to actually come up and properly provide the necessary technical research and analysis behind the actual working of the botnet and actually allow me to track down and publicly distribute a variety of personally identifiable information on one of the key members of the group which at some point resulted in having Facebook’s net-space IP block redirected to my personal blog including to actually have a personal message embedded on tens of thousands of infected hosts globally personally greeting me for my research into the Koobface botnet. At some point my research into the group’s whereabouts became the primary information source on the group’s activities internationally which resulted in a series of blog posts on the topic and greatly motivated me to continue my research into the way the botnet worked at the time through the systematic and daily publication of high-profile and never-published before technical analysis and research on the botnet’s la
05. What’s the current state of the fight against cybercrime globally?
While we’re currently observing a lot of newly popping-up vendors and organizations who are actually good at tracking down and responding to cybercrime incidents and activities it should be clearly noted that high-profile think-tanks including independent researchers organizations and vendors who have been tracking down cybercrime incidents and profiling cybercrime activities for decades should be easily considered a recommended reading in terms of their recently and historical published research in this area.
It should be also clearly noted that wide-spread cooperation campaigns between the academic commercial and private sector are already taking place potentially undermining and contributing to the overall lowering down of cybercrime activity globally.
What should be done in the broader context of fighting cybercrime internationally is a currently ongoing OSINT and Law Enforcement operation similar to my recently launched crowd-sourced OSINT and Law Enforcement operation called “Uncle George” including my most recently published high-profile and available online for free Cybercrime Forum Data Set for 2019 which you can download and process and potentially reach out to me in terms of the actual enrichment and tracking and shutting down process.
06. How can you best describe the ongoing intersection between law enforcement and the U.S Intelligence Community in the context of launching offensive lawful surveillance campaigns? Case in point is the recent take down and hijacking of the primary domain for Encrochat a proprietary encrypted mobile solution? Do you think Dutch law enforcement basically abused its technological “know-how” and expertise to target a commercial encrypted mobile solutions provider?
This is something that’s extremely important in the context of fighting cybercrime but can definitely raise someone’s eyebrows across the World in the context of preventing and responding to cybercrime and cyber jihad incidents globally in particular the intersection between U.S Law Enforcement and the U.S Intelligence Community. Case in point is the Dutch Intelligence Service which is quite experienced in fighting tracking down and actually responding to cybercrime and cyber jihad incidents globally which is a great example of the intersection between law enforcement and a country’s Intelligence Agencies globally. Case in point is Encrochat which is basically a commercial enterprise which was successfully taken offline thanks to a cooperation between the Dutch Intelligence Service and Law Enforcement internationally which eventually led to the direct compromise of the primary command and control infrastructure of the company and the actual interception of ongoing messages and communication.
07. Do you think that the launch of U.S Cyber Command is a step in the right direction? Do you think that publicly sharing proprietary malware releases on VirusTotal is an OPSEC violation? How do you think the U.S Cyber Command can better perform in the context of today’s modern offensive cyber warfare arms race?
Successfully positioning a major U.S based and publicly accessible organization for the purpose of fighting to and responding to cybercrime and cyber attack incidents is a step in the right direction. It should be clearly evident that with the U.S Cyber Command looking to expand and extend its industry outreach campaigns and is actually bothering to share proprietary releases which can be clearly found in a huge number of public and private malware repositories thanks to third-party researchers and vendors this is definitely a step in the right direction. In the broader context of fighting cybercrime and responding to cyber jihad and cyber warfare campaigns and incidents globally.
08. You used to work on Astalavista.com one of Box.sk’s primary competitors throughout 2003-2006? What’s your impression for running and managing the portal? What really took place when it got hacked?
I used to run and manage Astalavista.com which was the primary competitor of the original Astalavista.box.sk throughout 2003-2006 while I was studying in the Netherlands which greatly helped me make impact internationally and actually helped me pay the bills at the time. My primary responsibilities were to manage and issue daily updates to the security directory including the security news section including the production of a highly popular and high-traffic volume Security Newsletter where I was also responsible for interviewing people from the Scene and the Security Industry.
My other responsibilities included the overall look of the portal including the introduction of new sections including to actually manage and run advertising inventory where I was responsible for bringing more advertisers on board.
09. Is it true that you’re running one of the security industry’s most popular security publications? How did you originally launched the project? What’s the current state of the project?
I’ve been been running my personal Dancho Danchev’s Blog since December, 2005 while I was still working or https://astalavista.com acting as a Managing Director of the portal where I was busy responsible for the daily updates of the Security Directory including the Security News section including the introduction of new
10. What’s your attitude towards “4th party collection?
As this has been my primary area of occupation throughout the last couple of years with the results of my research published at my personal blog I believe that 4th party collection is largely driven by a specific set of folks and experts who are actually capable of making an impact and causing widespread damage across the cybercrime ecosystem internationally. Case in point is my most recently launched Law Enforcement and OSINT operation called “Uncle George” where I’ve managed to publicly process approximately 1M web sites from major and leading online cybercrime-friendly forum communities with the idea to assist U.S Law Enforcement and the U.S Intelligence Community on its way to enrich and actually process the data set potentially disrupting the cybercrime-friendly forum communities behind the campaign including to actually track down and prosecute the cybercriminals behind these campaigns.
11. Do you believe that an over-populated security industry means lower OPSEC for high-profile operations?
I think that as we’re continuing to witness the emergence and the existence of new cybercrime and OSINT researchers and analysts joining the security industry which could actually make the fight against cybercrime ever easier in case these researchers get invited into private mailing lists and private invite-only communities. I don’t necessarily think that an over-populated security industry means lower OPSEC for high-profile operations in case everyone involved in a specific campaign or operation is keeping track of its sources and sources of information.
12. Who’s running the show in 2020? What can best describe a successful “4th party collection” or virtual SIGINT operation? Who’s running the show in terms of fighting cybercrime online?
I’m currently observing the usual deal of research done by high-profile and well-known cybercrime researchers and security experts that also includes vendors including a great deal of research done by novice researchers entering the cybercrime research ecosystem. In terms of a successful “4th party collection” I can best describe the process as a combination of Technical Collection OSINT analysis and actual enrichment and actual U.S Law Enforcement and U.S Intelligence Community outreach where the ultimate goal would be to track down the prosecute the cybercriminals behind these campaigns.
13. Is it true that we live in an utopian World where North Korea and Iran-originating cyber attacks are basically launched by anything but nation-state actors namely Generation Y individuals who’re online starting to embrace new technologies meaning that “everything’s in order”?
I can confirm an evident trend where the mainstream news media is over-hyping the use of remote access tools which in reality are good old fashioned trojan horses circa the 90’s in terms of launching targeted or widespread malicious software serving campaigns. Based on my research and analysis it should be clearly evident that both North Korea and Iran are lacking the necessary technical and operational “know-how” to launch or participate in high-profile campaigns making it easier for these parties to outsource their cyber warfare or malicious software research and development needs to a third-party which could be for instance Russia.
14. Do you believe that corrupt and potentially compromised North Korean online agents are actually doing more harm than good by participation in cyber warfare campaigns using techniques and methodologies that were common in use throughout the 90’s namely trojan horses and various other lawful surveillance tools?
I’m clearly observing an increase in such type of “rogue agent” type of activity where North Korea or Iran-based hackers are actually directly undermining the OPSEC of their country’s offensive or defensive cyber warfare operations in terms of actually signaling trends and various other indicators which could prove crucial in a possible attribution campaign or actual assessment of a specific country’s understanding of offensive and defensive cyber warfare.
15. Were you surprised that you participated in a Top Secret GCHQ program monitoring hackers on Twitter called “Lovely Horse”? How do you think you made the list?
This was quite a surprise and it was in fact a privilege and an honor to have made the list with my old Twitter account where I was busy contributing with research and various other type of activity announcements on a daily basis while working for my previous empower which is Webroot. I think I made the list based on my research and it would be definitely a privilege and an honor to learn more and actually find out more about related Top Secret or Classified program where I’ve participated with my research.
16. What’s the current state of your currently ongoing law enforcement and OSINT operation “Uncle George”?
The current state of my currently ongoing Law Enforcement and OSINT operation called “Uncle George” is an active cooperation between several researchers who approached me including a vendor in terms of enriching the actual data set potentially helping me reach out to U.S Law Enforcement on my way to assist U.S Law Enforcement on its way to track down and prosecute the cybercriminals behind these campaigns. Users interested in joining my currently ongoing Law Enforcement and OSINT operation “Uncle George” can do it here.
Recommended free online hacking and security E-Books and Resources:
- Dancho Danchev's Cybercrime Forum Data Set for 2019 - ZIP
- Dancho Danchev's Blog - Official E-Book Compilation Archive - ZIP
- Dancho Danchev's Security Research for Webroot Inc. - ZIP
- Dancho Danchev's Security Research for ZDNet - ZIP
- Dancho Danchev's Offensive Cyber Warfare Articles - ZIP
- Dancho Danchev's Security Research Compilation - ZIP
- Dancho Danchev's "Assessing The Computer Network Operation (CNO) Capabilities of the Islamic Republic of Iran" - ZIP
- Dancho Danchev's "Qualitative and Technical Collection OSINT-Enriched Analysis of the Iranian Hacking Scene Through the Prism of the Infamous Ashiyane Digital Security Team" - ZIP
- Dancho Danchev's Astalavista Security Group Security Newsletter - ZIP
- Dancho Danchev's Malware - Future Trends - ZIP
- Dancho Danchev's "Building and Implementing a Successful Information Security Policy" - ZIP
- Dancho Danchev's Keynote at CyberCamp 2016 - Exposing Koobface - The World's Largest Botnet - ZIP
Donate BitCoin - 19zTEpFS89dphC3vXvPdui2kDKxVutLBpK
Recommended Astalavista.box.sk Hacking and Security Forum Posts:
Recommended Astalavista.box.sk Wordpress Blog Posts:
A Brief Introduction to the New Box.sk Project or Who's Dancho Danchev?
Announcing a New Hacking and Security Collaborative E-book Writing Initiative – Join Us Today!
Announcing Dancho Danchev’s Exclusive Personal Hacking and Security Research Memoir – Free Copy Available!
Announcing the Official Launch of Box.sk’s Hacking and Security IRC Network! Join Us Today!
Introducing Box.sk’s Flagship Hacking and Security Search Engine! We’re back!
Upcoming Box.sk High-Profile YouTube Livestream – The Scene and The Security Industry The Way We Know It – Bookmark the Link Today!
New Box.sk Online Security and Privacy Talk-Show featuring Dancho Danchev – Listen in Today!
Announcing Box.sk’s World Hacker Global Domination Group (WHGDG) Call for Security and Privacy Papers and Call for Innovation
Introducing Box.sk’s Flagship “Data Paradise” Old-School KGB-Style Dial-In Intranet
Revisiting “Malware – Future Trends” – 10 Years Later – An Exclusive Peek Inside the Modern Cybercrime and Malware Ecosystem – An Analysis
Exclusive Interview with Box.sk’s Primary Project Operator – Security Researcher – Dancho Danchev
Introducing Box.sk’s – “How to Get in Touch with the KGB – The Definite Hacker’s Manual” Online Manual
Recommended hacking and security including cyber warfare and OSINT related articles:
Assessing U.S Military Cyber Operational Capabilities to Counter Pro-ISIS Internet Infrastructure
My Involvement in the Top Secret GCHQ “Lovely Horse” Program and the Existence of the Karma Police
Kaspersky’s Antivirus Products the NSA and U.S National Security — An Analysis
Assessment of U.S Intelligence Community Cyber Surveillance Programs and Tradecraft — Part One
How the NSA utilized Iranian Cyber Proxies To Participate in the BOUNDLESS INFORMANT Program?
Exposing GCHQ’s Top Secret “GORDIAN KNOT” Cyber Defense Sensor Program — An Analysis
Exposing GCHQ’s URL-Shortening Service and Its Involvement in Iran’s 2009 Election Protests
Astalavista.com — The Scene the Way We Know it — My Experience in Running the Portal
Exposing the U.S Intelligence Community and GCHQ’s Use of “Dirty Tricks” Online — An Analysis
How the GCHQ Used the Top Secret “ANTICRISIS GIRL” Program to Spy on Users — An Analysis
The 2016 U.S Presidential Elections and Russia’s Active Measures in Terms of Cyber Espionage
How the GCHQ and the NSA work on intercepting and infiltrating Virtual Private Networks?
Official Astalavista.box.sk Project Partners: