When the threat actor and victim agree and other reports on Iranian Offensive Cyber

Iranian Offensive Cyber, and When the threat actor and victim agree The transfer of 50 TB data would not be possible remotely – and on a filtered network such as that of Iran. Iran's official news agency IRNA downplayed the attack, quoting the spokesperson for the Ministry of Foreign Affairs who denied the breach. Download the report Of note on the sheer size of this hack. The normal Internet download speed of Iranian is 11.8…

Read More

When the Threat Actor and the Victim Agree

When the Threat Actor and the Victim Agree Iran has a longstanding history of engaging in cybersecurity attacks, and according to some statistics, ranks fifth among nations known for targeting their adversaries through cyber warfare. Over the years, Iran has unleashed hacker groups against various countries, with little regard to the potential risks to its own internal security systems. This paradox is evident: despite its aggressive cyber offense, Iran has failed to adequately safeguard its…

Read More

Treadstone 71 Online Courses

Online Courses  (www.cyberinteltrainingcenter.com) Advanced Cyber Intelligence Tradecraft Advanced Strategic Intelligence Analysis Adversary Targeting Analytic Writing (Reporting and Briefs) Aspects of Disinformation Basic Cyber Intelligence Tradecraft Big Five in Cyber Intelligence Certified Cyber Counterintelligence Analyst Cialdini's Principles in Influence Operations Cognitive Warfare Definitions Part 1 Collection Management Color Revolutions - Cognitive Warfare Conspiracy Theories Critical Thinking and Cognitive Bias for Cyber Intelligence Cyber Cointelpro Dirty Tricks in CounterIntelligence and Deception Intelligence Requirements Intermediate Cyber Intelligence Tradecraft…

Read More

Lab Dookhtegan Reconstitutes after IRGC / MOIS Lies are bought

The new Telegram site is: https://t.me/LabDookhtegan_Channel Sign up! Salam,In recent days, the bastards of the Islamic Republic tried to stop our activities and made our channel unavailable. All they did against us in the last 4 years of our activity was to remove our channel from reach 😂 but we do not hesitate. We, the LabDookhtegan group, will continue our activities with as much strength as possible for the purpose of overthrowing the Islamic Republic.If…

Read More

Cyber war – large-scale destruction without the use of military force

Cyber war has the potential of large-scale destruction without the use of military force and can be used without an official declaration of war. As a strong current, the "soft" paradox is a good guide to dealing with hybrid threats and hybrid warfare and its responses and countermeasures, as well as resilience and vulnerability. https://cybershafarat.com/2023/02/18/cognitive-warfighter/ To achieve success, one cannot focus only on difficult defense or security issues and only look for war. This can…

Read More

#Prigozhin tells tales of Perkov’s son’s #Wagner service

Continuing the Fractured Fairy Tale, the Chef positions himself as an 'everyman for the Motherland." Part of his plan for the Russian Presidency while including Peskov. Prigozhin about the service of Peskov's son in the Wagner PMC hoping to drive conscription. 1. I applied to Wagner for an attack aircraft. It was assigned to the Hurricane MLRS loaders of the artillery battalion of the Wagner PMC since my daddy did not want me on the…

Read More

Limitations of the Cognitive Domain?

https://cybershafarat.com/2023/04/11/65021/ The cognitive domain should not be limited to influencing information operations, social engineering and the conceptual approach of "controlling hearts and minds," but should include all domains in which there is a possibility of ideological attacks. https://cybershafarat.com/2023/04/22/miami-cyber-cognitive-warfighter-training/ The corruption of the mind is not just the public but cyber functions since these groups are now on the front lines. One problem is the lack of realization by organizations that this is a fact. We…

Read More

Cyber Cognitive Warfighter Training with Open AI / ChatGPT functions

Intelligence Tradecraft Operator - Cyber Cognitive Warfighter Training - New York City Jun 12-16 OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, Social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting…

Read More

Kim Zetter Post on Zarya

We have seen Zarya discuss critical infrastructure hacks as well as confirm control over ICS. In their own words from November 2022: https://zetter.substack.com/p/leaked-pentagon-document-claims-russian This is not a shift in their actions as Radware states. This is only the awareness of their full capabilities Treadstone 71 Russian Cyber Warfare Actors and Groups-Class-SignDownload Russian hackers gained access to several factories, power plants and providers in Ukraine. They also penetrated the networks of critical infrastructure facilities and can…

Read More

How Russia Sees It – Information Diversions Ukraine

INFORMATION DIVERSIONS IN THE CONFLICT IN UKRAINE To identify and classify the forms and methods of information warfare in the modern conflict in Ukraine (in the context of the war in Ukraine). Procedures and methods. The study was carried out using the methods of analysis, synthesis, generalization and interpretation of the results. Results. The forms and methods of conducting information warfare in Ukraine under the conditions of the war (strategic information operations, special propaganda, fakes…

Read More

OPSEC for OSINT The Cyber Cognitive Warfighter Training Course

Intelligence Tradecraft Operator – OPSEC for OSINT, The Cyber Cognitive Warfighter US dates and locations WashingtonMay 1-5 MiamiMay 15-19 New York City June 12-16 ChicagoJuly 17-21 SeattleAugust 7-11 Los AngelesSeptember 11-15 Dallas October 30-November 3 Orlando December 4-8 Cognitive Warfare Training The weaponization of information influences your thoughts and how you perceive content. Learn to recognize it and prevent it. Unlike conventional wars where the invading army can be seen in different streets and passages, preparation for a…

Read More

Cogito ergo vinco: I think, therefore I win – Treadstone 71 Referenced in Russian KCPN Conference

Treadstone 71 Cognitive Warfare Training - Recognized by Russian philosophers, political technologists, media managers, producers, journalists and TV presenters, military correspondents, bloggers, volunteers and organizers of assistance to the front, designers and artists, writers, poets and musicians, sociologists and psychologists.On March 11, 2023, the Skolkovo Technopark will host a forum dedicated to information and cognitive warfare technologies.The organizers of the event are the Novorossia Aid Coordination Center (KCPN), Alexander Lyubimov and Alexei Chadayev , a…

Read More

OPSEC a Critical Requirement for Open-Source and Dark Net Collection

HALF MOON BAY, Calif., March 7, 2023 (SEND2PRESS NEWSWIRE) — Treadstone 71, LLC, the source for cyber intelligence, counterintelligence, hybrid, and cognitive warfare, announces new courses and services. “Targeted adversary data collection creates significant risk when seeking relevant information not available from threat intelligence feeds. Our operational security (OPSEC) training courses reduce risk to negligible levels that risk and legal departments find acceptable,” asserted Jeff Bardin, Chief Intelligence Officer at Treadstone 71. “We assess and…

Read More

Cognitive Warfare

In some, closed jurisdictions have developed very effective ways to impose and maintain persistent forms of "informational dominance" to gain the upper hand in digital penetration wars. In some closed regimes, authoritarian leaders ensure that their preferred narrative dominates public perceptions by dominating the media, censoring and silencing independent voices, and eliminating political dissent. Coercion and judicial injunctions are created, resulting in a nationally coordinated filter bubble in which the government decides what information its…

Read More

Prigozhin Speaks Q&A

#1258 We publish a request from journalist Ekaterina Lushnikova and the answer: Hello,According to the US government, about 30,000 fighters have died in the ranks of the Wagner PMC since the beginning of the JMD.How could you comment on this information, is it true?If not, how many dead and wounded in the ranks of the PMC "Wagner" really?How many were shot or beaten with a sledgehammer for treason and desertion? https://cybershafarat.com/2023/02/22/lack-of-artillery-shells-determines-squabbles-and-capabilities-prigozhin-wagner/ We publish the commentary…

Read More

Lack of artillery shells determines squabbles and capabilities #Prigozhin #Wagner

The conflict between Shoigu and Yevgeny Prigozhin only confirms that the situation with artillery ammunition near the ROV is getting worse and worse every day. At the same time, they leak information about deliveries and short deliveries in quite detail to assess this situation ... the Marine Corps reported that PMC "Wagner", in the Bakhmut area, from February 18 to 20 received 1660 rockets, 10171 shells for cannon artillery and mortars and 980 rounds for…

Read More

Signposts Increase

News from the Zaporozhye direction. Many settlements of the occupied part of the Zaporozhye region (including Melitopol and the Melitopol district) not a single institution is working from tomorrow. The Russians have closed everything since February 22. Poland has closed the last border crossing point for trucks with Belarus. Intelligence that shows Russian Federation is preparing to Capture the International Airport in the Moldavian Capital of Chișinău. Russia is preparing to select full-time students for…

Read More

OSINT and Darknet Risk Reduction Through OPSEC

Treadstone 71 developed a course that greatly reduces corporate exposure and risk during passive collection operations. Shrink your threat intelligence feed costs and remove non-relevant data before it clutter your TIP and inbox. The course focuses on reducing your exposure & risk. #OPSEC #Browser configurations, container builds, extension/add-in selection and use, leak testing, #Darknet and #OSINT discovery, data provenance, and passively collection. Reduce your data feed costs dramatically. Get the data and information you need.…

Read More

Artificial intelligence on guard of Russian borders Radar-IQ

Russian programmers have created the first and so far the only security system in the world that works with the help of a neural network. According to the idea of the creators of the system, HD-cameras will stand on the border with Ukraine and, in a matter of seconds, calculate the drones of the Armed Forces of Ukraine and saboteurs. https://cybershafarat.com/2023/02/20/osint-and-darknet-risk-reduction-through-opsec/ According to the developers, Radar-IQ is not afraid of extreme and disgusting weather, works…

Read More

Cognitive Warfighter

OPSEC methods, online anonymity, persona creation, secure browser configuration with no verified leaks. OSINT and Darknet searching, Social media searches and collection, Personality identification using Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, and the Nine Enneagram Type. Methods and TTPs of cyber HUMINT tactics, campaign development, management, and execution. // Adversary targeting with cyber D3A/F3EAD, PIRs, OSINT, Darknet. // Information warfare, counterintelligence deception methods, Russian/Chinese/Iranian Cyber…

Read More

Certification – Cyber Cognitive Warfare – Washington DC Dulles March 20-24

Cyber Cognitive Warfighter Training March 20-24 // Monday-Thursday 7:45-5 PM, Friday 7:45-3 PM. Washington Dulles Airport Marriott Students must maintain operational security of their Internet searches (Internet and Darknet) since we perform extensive research during class time. VPNs are needed and we do provide preferred VPN lists. We cover persona creation, alignment to intelligence requirements, rules of engagement for passive collection, persona character archetypes, and AI content fillers. Course lectures demonstrate browser setup (extensions/plug-ins/add-ins) for operational…

Read More

FSB Members data UPDATED Again April 25, 2023

New files for download Full name, Date of birth, Place of birth, Passport, Date of issue, Issuing authority, Authority code, Registration address, Authority, Previous address, Special marks, SIGNATURE, Debts, Air tickets, Credits, Sim-cards, modems , Motor transport, System number, Sign "sold earlier" https://anonfiles.com/jb4ex6nbzb/FSB_ziphttps://anonfiles.com/jb4ex6nbzb/FSB_zip https://cybershafarat.com/2023/04/24/putin-appoints-tucker-carlson-chief-of-the-general-staff/ PW: RUdataantiZ https://anonfiles.com/Mc86x4n7z5/RU_7zhttps://anonfiles.com/Mc86x4n7z5/RU_7z wp-1681405748044Download wp-1681405748078Download wp-1681405748070Download ФСБ_listDownload https://cybershafarat.com/2023/02/20/osint-and-darknet-risk-reduction-through-opsec/ База_номеров_руководства_и_элиты_РФ_5000Download wp-1681305812929Download wp-1681305812946Download wp-1681305812962Download wp-1681305812890Download wp-1681305812835Download wp-1681305812857Download wp-1681305812872Download wp-1681305812911Download wp-1681305838148Download Ф.И.О., Дата рождения, Место рождения, Паспорт, Дата выдачи, Орган выдачи, Код органа, Адрес…

Read More

FSB Data Dump – IPs, Email, Names, Phones

Atlantis Cyber Army & RoughSec Cyber Squad denis_romanchenko@yahoo.de (Денис Сергеевич Романченко) socialka777@gmail.com (Наталья Николаевна Зубарева) guggaa@gmail.com (Роман Масалёв )phone: 7(911)4023284 shaboldin@gmail.com ( Алексей Алексей ) helenka070186@gmail.com (Елена Владимировна Дюбилина) pavel.v.baranov@gmail.com (Павел Владимирович Баранов) dmitro.gadomskiy@Arzinger.ua (Дмитрий Гадомский) pwwebb@debevois.com (Филипп Вильям Вэбб) mkaarbitr7@gmail.com (Александр Владимирович Панюшов) olga.korneeva@hp.com (Ольга Николаевна Корнеева) m.semenyako@hlbprime.com (Максим Евгеньевич Семеняко) Anton.Klyachin@salomons.com (Антон Борисович Клячин) kolosov.e.s@gmail.com (Евгений Колосов) dn.fremm@gmail.com (Дмитрий Сергеевич Некрестьянов) ava.heta@gmail.com (Сергей Иванович Илларионов) lawgroup@i.ua (Вадим Петрович Шпачук) rom.work@yahoo.com (Роман Олегович Кузнецов)…

Read More

30 AIR TARGETS DESTROYED IN THE SOUTH AND EAST

On the night of October 3, 2023, the Russian invaders attacked with 31 Shahed attack UAVs and an Iskander-K cruise missile.Launches were carried out from the temporarily occupied Crimea: "Shahediv" - from Cape Chauda, KR "Iskander-K" - from the Dzhankoy district.Air defense operated in the southern and eastern regions: anti-aircraft missile forces, fighter aircraft, units of mobile fire groups. The targets were destroyed in the areas of responsibility of the "Southern" and "Eastern" air commands…

Read More

Operational Summary October 2 – Russian Losses

The main summary: ➡️During the past day, 38 combat clashes took place. In general, the enemy carried out 10 missile and 89 air strikes, carried out 39 attacks from rocket salvo systems both on the positions of our troops and on civilian objects of our state.➡️In the Lyman direction, the Defense Forces repelled enemy attacks in the area of Makiivka, Luhansk region.➡️In the direction of Bakhmut, the enemy unsuccessfully tried to restore the lost position…

Read More

ATESH monitors the #FSB office in Dzerzhinsk

Our agents reported to us operational information about the location of the local FSB office, which is located at 12 Dzerzhinsky Avenue. This office is located on the first floor of a five-story residential building. It is also important to note that the Ministry of Internal Affairs office is located nearby.Coordinates: 56.24153455255145, 43. 470096610652405 We continue to monitor and collect information about the actions and employees of the FSB department and other law enforcement agencies…

Read More

Arvin Club Leak Site

Arvin Club Leak Site 2 October 2023 Target Introduction Name:Pasouk biological company Official Website:https://pasouk.ir Samples Download Address Download URL:http://anonissfireenterfdks2u53jqevumbu6hjm35ioorsa7eq5bsjlucad.onion/do.php?filename=5e5dcbbd73337ec3a3e8811.rar Other:contact us by tox:D6164C90642CD93D9D3F353511B4BDBD1428309C90CDE13D3D7088AA5BE3010A52E485834E84 1october Target Introduction Name:Shirin Travel Agency Files Samples Download Address Download Samples:http://anonissfireenterfdks2u53jqevumbu6hjm35ioorsa7eq5bsjlucad.onion/do.php?filename=bd413d1583d4b7dc9901121.rar Other:contact us by tox:D6164C90642CD93D9D3F353511B4BDBD1428309C90CDE13D3D7088AA5BE3010A52E485834E84 23August Target Introduction Name:sti company Official Website:https://sticompany.co Files Download Address Download URL:https://www.sendspace.com/file/t6dx3v Other:contact us by tox:D6164C90642CD93D9D3F353511B4BDBD1428309C90CDE13D3D7088AA5BE3010A52E485834E84 8August Target Introduction Name:Sabalan Azmayesh Official Website:https://www.sabalanmedical.ir Files Download Address Download URL:https://www.sendspace.com/file/zrfso0 Other:contact us by tox:D6164C90642CD93D9D3F353511B4BDBD1428309C90CDE13D3D7088AA5BE3010A52E485834E84 7August Target Introduction Name:Parsian…

Read More

Drones hit Smolensk and Sochi

Geolocated. In the arrival area (Soldatskoye Lake) in the Smolensk region there are two military units:military unit 7459 - 25th separate special forces detachment “MERCURY”.54°45'56"N 32°00'08"Emilitary unit 73582 - GRU special forces, radio intelligence.54°45'54"N 32°00'36"EThe results of the attack are currently unknown. Sochi, the airport, there was an arrival this morning. In addition to the already mentioned targets, the Smolensk Aviation Plant was attacked this morning with the help of attack UAVs.

Read More

Venator 10 plus Venator Security

The Russian built browser Venator X - The long-awaited release. A lot of time has passed since the development of the Venator browser began. With each new version, the appearance of the Venator has changed dramatically. Only with the ninth version did I begin to understand which direction I needed to move in order for the Venator browser to remain functional and, at the same time, loyal to beginners. In the Venator X browser version,…

Read More

How the Kremlin is trying to stop the supply of Western weapons to Ukraine

Since the beginning of the full-scale invasion, one of the main Russian narratives has become: "The more the West supplies weapons to the Kyiv regime, the longer the war will last." To promote it, the Russians: • regular "red lines" are drawn, starting with Bayraktar and Javelin deliveries and continuing with HIMARS, Patriot, Leopard, etc. Now these lines have extended to the F-16, ATACMS, Taurus; • arrange regular "diplomatic" tantrums like the same thing at…

Read More