0 0
Read Time:2 Minute, 56 Second

Today, we’re announcing the details of a special Russian Tax Day gift – Operation Switchblade, our largest data center attack to date.

During this operation, we tracked down as many data center switches as we could find across Russia and tested them for vulnerabilities that would allow us to gain access. Of those, at least 55 switches were hit, which were both vulnerable and strategically valuable, mostly data centers for providers such as Rostelecom. These included Western, Russian and Chinese switches of various capacities, many of which were widely used and multifunctional. With full root access to all of them, we quickly took them down before anyone could notice.

But that’s not the end: in the last two weeks since the first strike, we’ve been constantly checking them and attacking them again if we can find them. There is no uninterrupted service for them!
——————————————
Today, we announce the details of a very special present for Russia’s tax day – Operation “Switchblade”, our most extensive data center attack to date.

In this operation, we hunted down as many data center switches as we could find across Russia, and tested them for vulnerabilities that would allow us access. From these, a cyber strike was launched against no less than 55 switches, which were both vulnerable and strategically valuable, mostly data centers for ISPs like Rostelecom. These included Western, Russian, and Chinese switches of different capacity, many of which were highly utilized and feature-rich. With total, root-level access on all of them, we swiftly demolished them before anyone could notice.

That isn’t the end of it, though: for the past two weeks after the initial strike, we’ve been constantly checking them and re-attacking if they’ve been recovered. No uninterrupted service for them!


Some of the more exciting goals we’ve achieved include:
– Main turnout transport of SPZHT, a company that provides strategic railway logistics in Western Siberia
– SC “Vostok”, Tyumen Energy Company
– Rostelecom (Avantel) infrastructure in Moscow
– The main ISA RAN switch, an “old friend” that we have penetrated before
– “Kuban-Telecom” data center in Krasnodar
– Data center in Konstantinovo
– An entire network connecting businesses in Sochi and Adler to the Russian Internet.

We successfully destroyed all 55 switches at least once, and on several occasions managed to attack 8 times without being spotted! No one survived after meeting us.

Given the lack of IT staff, authorized equipment and the difficulty of setting up/repairing such devices, we believe it must take a very long time to properly restore operations. And given their inability to detect us or repair our damage…we will destroy them again if they return!
———————————————————
Some of the more interesting targets we hit include:
– SPZhT’s core switch, a company providing strategic railway logistics in Western Siberia
-SK Vostok, a power company in Tyumen
– Rostelecom (Avantel) infrastructure in Moscow
-ISA RAN’s core switch, an “old friend” that we’ve penetrated before
-Kuban-Telecom’s data center in Krasnodar
-A data center in Konstantinovo
-An entire network connecting businesses in Sochi and Adler to the Russian internet.

We successfully destroyed all 55 switches at least once, and in a couple of cases we were able to attack 8 times without being detected! None survived their encounter with us.

Between the lack of IT personnel, sanctioned equipment, and the difficulty of configuring/repairing such devices, we believe it should take a very long time for service to be properly restored. And given their inability to detect us or repair our damage…we’ll destroy them again if they come back!

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence