Russian-backed hackers NoName057(16) “tested the defense” of the Ukrainian
https://www.treadstone71.com/index.php/intel-briefs/killnet-xaknet
“National Defense Hackathon 2022”, to which NATO cyber experts were invited
This was reported by NoName057(16) in their Telegram channel, where screenshots of the non-working hackathon site were posted as proof.
As colleagues from the ZVI Search Engine wrote earlier, the organizers of the event were to be the Ministry of Defense, the General Staff of the Armed Forces of Ukraine, the national cybersecurity coordination center, and the center for countering disinformation of Ukraine. Support is provided by the US Civil Research and Development Foundation in Ukraine, the US State Department, NATO.
Check-host: ssl3_read_bytes: tlsv1 alert internal error
“Kick the admin, your protocol came off. Oh! They came up with it! “National Defense HaKhaton 2022” – NoName057(16) comments on their Telegram channel.
嵐On October 20-21, the National Defense Hackathon 2022 will be held in Ukraine, which will be attended by specialists in cybersecurity, countering disinformation, leading IT experts from the private and public sectors. As these non-specialists write, the organizers of the event are the Ministry of Defense, the General Staff of the Armed Forces of Ukraine, the national cybersecurity coordination center, and the center for countering disinformation of Ukraine. Support is provided by the US Civil Research and Development Foundation in Ukraine, the US State Department, NATO.
So here is https://check-host.net/check-report/d130c22kd9c
- According to the list, we gave under f * ny:
- To the Ministry of Defense of Ukraine
- To the General Staff of the Armed Forces of Ukraine
- National Cyber Security Coordinating Center
- Center for counteracting disinformation of Ukraine
- US Department of State
- NATO
And also to everyone who helps them in this matter. Before you count on the Americans and their leaky framer.com service, learn to turn on your brains. We hacked you, roosters.
You must be logged in to post a comment.