nGran, LLC

Granular Network Security Solutions - 978.519.9809


This page is devoted to nGran research on emerging threats in the Internet. As such it will change often, based on new intelligence. Please check back on a regular basis. Note that each brief has an associated MD5 for a downloadable PDF. Each downloadable PDF is password protected and you can request that password from us at

Professional Hacking Model - 2016

This brief shows a hacking model for emerging threats in the Internet. It shows differences between traceable real cyber threats and projections of infected computers and web sites. High risk threats are those that have been weaponized by rogue nation states to destroy computers or electronic assets connected to the Internet and not properly protected from such abuse. Other high risk threats are those with malicious components designed to steal information or Personally Identifiable Information (PII), or bank accounts and credit card account information and sell it on Tier II sites as shown in the PDF. Another category of high risk threats perform abusive actions such as human trafficking, or selling body parts to other people based on demented viewpoints with a strong presence in Social Media and blogs. Other high risk threats extort payments with Ransomware from consumers and commercial enterprises or plan and coordinate terrorist actions against soft and hard targets in the free world. Most high and medium risk threats operate from a relatively stable set of Internet sites as described in the section in Tier I, shown in the PDF. All threats in these categories make heavy use of vulnerabilities or stolen credentials taken after Black Hat scanning and surveillance activities show sites that can be easily penetrated and are improperly protected. So, it's a good idea to look at your router logs on a daily basis to see who is scanning your sites, including home computers!

The MD5 for the downloadable PDF is BD8DC45405DD61575DED7C1DC1944A9F


Web of Trust Inquiries

The Web of Trust (WOT) is a reputation based review service that helps users make
informed decisions about whether to trust a website or not. WOT uses a downloadable browser
plugin or extension that reviews browser site activity for appositeness and security. nGran has
contributed to WOT for several years in three categories by identifying;

1) Websites that participate in collecting Personally Identifiable Information (PII) without an
Internet users express written permission. Sites in this category must be confirmed as fraudulent,
scams or phishing attacks to obtain PII and once confirmed are entered in the WOT list.
2) Websites that link to known suspicious or malicious websites that participate in origination or
distribution of malware. Such sites provide referrals and/or redirections to malicious sites where
unsuspecting users are put at great risk of infections.
3) Websites that are repositories for malware used to hack other sites. For the past 10 years
we have maintained a "repeat offender list" and  we currently track over 150K known and active
malicious sites. If you are interested in reviewing the list, please contact us at

Removal Requests

Finally, if your site was remediated after it was placed in the WOT list and we have listed your site,
please contact us in English specifying your email address, your site name, IP address, date and
time of remediation in the comments field in the adjacent form
. We will review your site and if found
acceptable we will remove your
entry from the WOT list. Any blacklistings for your site must be
handled by you with respective
blacklist providers. Blacklist change guidance can be located at
the following unaffiliated address;

E-mail Address