Read Time:1 Minute, 42 Second

Taken directly from theirntext:

We hit almost every infrastructure in Ukraine. Warning shots were fired everywhere, without prejudice to the activities of companies/government agencies. We call on the fascists to accept their defeat in cyber warfare. Otherwise, we will be forced to act like our opponents.

We cannot endlessly give you “lessons of politeness”. We demand the cessation of hacker attacks against Russian infrastructures, we demand the cessation of the activities of information centers for the dissemination of fakes.

In case of refusal, we will be forced to use the most sophisticated methods, and reserve the right to act as the enemy does. Critical information infrastructure facilities will become a priority target for the group. All work will be aimed at the complete destabilization of the activities of the aforementioned CIIs.

We know that these methods will not find a response in the hearts of our compatriots, who treat normal Ukrainians with great trepidation and constantly ask them not to do certain things so as not to complicate their lives. But we cannot do otherwise. We ask us to understand, forgive, and give the opportunity to respond to the enemies of our fatherland.

As you may have noticed, we are a non-profit organization. We do not collect donations, we do not sell services, we do not earn here. We are not related to any law enforcement agency, and are guided solely by internal convictions and boundless love for the Motherland. I think these facts are enough to understand the seriousness of our intentions.

What they refer to:

This attack is the answer for the attack on the CDEC.

Today our team has hacked the largest Ukrainian payment service NovaPay and express delivery service Nova Poshta.

The market share of this player is more than 40%.

Our team got full access to the service, to each server, to each computer within the company, to the infrastructure of Nova Poshta and NovaPay. About 2 TB of data were leaked. Incl. base 1c, one of which we have attached here.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
100 %
Angry
Angry
0 %
Surprise
Surprise
0 %
%d bloggers like this: