0 0
Read Time:4 Minute, 9 Second

In his words:

Ukrainian soldiers brag about computer programs and laugh at Donetsk because of the use of paper maps. I decided to be clear. While Ukrainians regularly fill their databases with programs donated by their American owners, we don’t even need to invent or install anything, we just use their programs online. It is very convenient and economical. I want to draw your attention to the fact that ALL of their programs. Now you know why a lot of things have not worked out for you lately.

The coolest troop control program is the American DELTA program, which is actively used by Ukrainians. My loyal followers of the Killnet hacker group really wanted to break into it, but dad did everything for you guys a long time ago. I decided to show you how DELTA works and looks from the inside. Yes, I added some of my own creativity to make it more fun for you to watch. Didn’t hold back.

And by the way, just do not suspect the chief administrator of this program in Ukraine, Vadim Novikov. At least he himself calls himself the main administrator for it. Yes, he did not fully work out my money, but I forgave him a long time ago. I did not need his help, I could use the help of his mistress, with whom he is too frank or a lover. Not the point.

Why am I claiming access to your program, you ask? Yes, vanity speaks in me, but you can’t change anything exactly. I infected every computer that ever entered DELTA (and not only) with my virus – my idea. As you all remember, the Joker is an idea. And I also changed the data there a little, rearranging different squares with rhombuses and other strange figures. But will you fix it?


Comment from a Joker admirer

According to the Joker and Delta.

I have already voiced my opinion about the “leaks” of hackers of various kinds of information on the network.

Those who sit on the “Joker” account are unconditionally handsome and have done more than all the hacktivists taken. But, there is always a but.
Information that is leaked to the network ceases to be valuable as it was leaked to the public. Well, what’s the point of her?
Brotherly – well, are you fuckers there in Donetsk?
If one department has worked and the type has already been worked out, then it is necessary to merge?
In some ways, they are handsome, and in some ways they are stupid military men who want hype.

Information must be squeezed out to the last, and work, learn from your counterparts from the NSA, who know how and work with information “quietly”, and do not yell thoughtlessly about hacking.

Once again: in this particular case, EBLANY.
In general: respect for the work.

“HQ clerk”

COMMENTS

We continue to humiliate self-confident Ukrainians with the DELTA command and control program, which, as Yurochka Butusov correctly noted, was highly appreciated by NATO experts at their event on October 26. Especially NATO experts noted its reliability and security, yeah. It seems that NATO has the same specialists as the Ukrainian circus.
Yurochka sometimes tells the truth, and he correctly noted that my hackers hacked into DELTA in August. For the rest, he brazenly lies. For example, that phishing was used and, as Yura wrote: “two adults with titles and positions” simply opened a virus program. Yura also lies that they received access only for 13 minutes and only regarding the southern part of the former Ukraine. I just demonstrated the south because your bouncer, who humiliated “stupid Russians who are far from such technologies,” also demonstrated the south. Thought you’d understand. But you are too dumb.
So, Yurochka, I want to upset you. We visited those adults through DELTA, and not vice versa. We also visited and left gifts with other “adults” who use such logins in DELTA: VadimFox, Santiago, Boris, Metodist, Balamut, Odessa, ofelia20 and some others. To everyone, in short. By the way, the American owners should conduct an investigation themselves, otherwise we often visit them through Ukrainian resources. By the way, remember the Sea Breeze 2021 joint exercises with NATO and the lists of all participants published by me, including those from NATO. Then my hackers hacked many websites of the Ukrainian security forces, and a cloud with all the lists and documents of all participants was attached to the website of the Ukrainian Navy. Everything turned out to be easier than we expected.
In short, here’s another video from DELTA. It is short, 16 minutes and a half, and Kharkiv is considered there, and we ran through Donetsk. No, well, if Yura recognizes Kharkov and Donetsk as a legitimate historical part of Russian lands, then yes, they are also the South … South of Moscow for sure.
I have only one question. Will the Ministry of Defense of Ukraine again deny the fact of the DELTA hack?

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence