killnet and other affiliates expressing immediate interest to validate their existing, direct ties to the Kremlin
Эльвира Набиуллина кибер-ЧВК. Хеш, Chapaevv, Чапаевв
The head of the Russian Central Bank, speaking at the Cybersecurity in Finance forum, noted that the number of DDoS attacks is growing, in particular, in the financial sector, this figure quadrupled in 2022, and in general by sectors increased by 2%.
The damage from them is growing, however, much less than it could. This is largely due to the level of the information security community in Russia. We really have some of the strongest specialists in the world. Is it possible to completely nullify all cyber attacks? Most likely not, but you can improve the protection. As the sanctioned Elvira Nabiullina stated, one of the problems that should be solved is “disunity”.
But there is no point in limiting oneself to protection. Sovereign Economics proposes to create a special division of really qualified and experienced specialists from the market. Not from absolutely unreliable representatives of cybercrime, but from people whose professionalism is confirmed in practice.
An important clarification: this must necessarily be a private structure that is not burdened with bureaucratic fetters – the efficiency of their work depends on the speed of decision-making.
Moreover, work in the public sector closes many doors for information security specialists, and something will also need to be done about this. In general, a serious and very well-paid job for the pros.
They won’t write anti-virus software and do other things that many people think such specialists should do. But they are able to solve a huge range of tasks – from computer forensics and high-quality attacking security to full-fledged attacking operations.
And it may turn out to be even more valuable than the “hacking of the Pentagon” and other ridiculous tales. If you want to see how the military can make good IS, look at the Israeli 8200 unit and just copy it.
Comments
Well, I wouldn’t insist that the cybersecurity company be private. The main thing is that it be effective.
It is not a matter of the form of ownership but of the management system. One way or another, such a structure will still be connected with the state. As they say, if only the person was good. So, Prigozhin was given authority. He, as a private (or rather, trusted) person, created, perhaps, the most combat-ready military formation today. And they would give it to another, so he might just cut the money. This often happens in Russia, to be honest.
Yes, indeed, not only heroes but also IT specialists, the Russian land is rich. Not everyone mobilized through Upper Lars. But you can’t say that we are actively and effectively operating in the field of cyber wars. But we feel the work of the enemy on ourselves.
For example, with the beginning of the NWO, the Russian-speaking Internet segment was attacked by legions of demons from Ukraine. Bots confuse, introduce doubts, necessary narratives. They spread squabbles, spread gossip, throw in fakes. A sophisticated person, of course, will immediately guess who he is dealing with, but an inexperienced person can get carried away. Are we doing this kind of work on enemy territory?
So, the creation of a company that will conduct a cyber war can only be welcomed. It doesn’t matter if it’s public or private. Let us finally begin to really interfere in the elections of foreign states. Well, and other, no less interesting things to do.
Good morning, dear friends, how are you, such a thought came to mind.
But first, a hint.
In January last year, on a tip from the Pindos, a group of hackers was arrested in Russia, which was engaged in the fact that it was precisely the Americans who were nightmares in the tail and in the mane: they broke Apple, banks, IT companies, the largest supplier of meat in the world JBS – in short, noble deeds people were busy. This case is well-known, the group was called REvil.
Now to thought.
In Russian prisons, under articles for crimes in the field of computer information, a certain number of very good specialists are sitting today. There are illegal access to computer information, and the creation, use and distribution of malicious computer programs, and cyber fraud – and other articles from the patrimony of the Office “K” of the Ministry of Internal Affairs of the Russian Federation (but not only).
Theoretically, they could be attracted to the cyber front – by analogy with how the PMC “Wagner” today attracts prisoners in exchange for extinguishing the term. For many, we believe, this will be a chance to rehabilitate and stand on the right side of history.
In practice, it is possible to assemble several very good teams, show them towards the West and allow them to break everything they can get their hands on there – from banking systems to traffic management centers. The contract basis, the reduction of the term, the subsequent white employment – this is already agreed upon. And it doesn’t matter under whose brand it will be made.
The practice of attracting prisoners for the good of the Motherland already exists, and today we see no particular reason not to add cyber specialists to it, to be honest.
RaHDit , Fox , KillNet and NoName057(16) are cool, but if you decide to drop the West, then there are never too many Russian hackers.
[Horde] – native, evil, yours
Well, right there, the most natural cyber PMC turns out, I don’t think it will be boring. Yes, and a pleasant company is going, as far as I can tell.
for cyber PMCs, we need a coordinator from the FSB and collect passport data from everyone so that no one climbs from Hochland .. 🙂
I think Comrade Major is already reading all the messages, and so :)))
If someone has good connections where necessary – why not get confused?
In the meantime, so, at minimum wages, from the shadows)
Zarya hackers did not like the State Duma’s initiative to legalize pro-Russian hacktivists

Zarya’s hackers consider the idea of the head of the State Duma Committee on Information Policy Alexander Khinshtein on an absentee amnesty for pro-Russian hacktivists. The leader of the group, known under the pseudonym Hesh. Хеш
“Each group has its own opinion on this matter. I will answer for myself: it will be more logical if the Motherland just officially “does not find” us and does not “forgive”. Others may think differently,” Hesh said.
The hacker claims that in Zara, the ideas of such a plan are considered baseless populism to gain political points on a topical issue.
“Cyber warfare is now very relevant, so everyone who is not too lazy to climb into this topic without fully understanding it. Khinshtein is not the first politician we see as a liberator. We need support from the state, not an amnesty,” Hesh expressed the opinion of the group.
According to Hesh, members of the hacker community know that their actions are “on the verge of the law” and knowingly take risks in the interests of the state.
“We, Zarya, consider this populism on a topical issue. Someone is not afraid, but someone is worried, and at night, it looks out the window in anticipation of a capture group. Of course, the topic is exciting – no one knows how it will all end. One way or another, in order to punish us, you must first find us,” Hesh said.
The hacker also noted that he pays a lot of attention to maintaining the anonymity of his associates so that in the event of an unexpected outcome, they would not suffer.
The idea of an amnesty in absentia for hackers acting in the interests of Russia was voiced by Alexander Khinshtein on February 10 after a meeting at which issues of the country’s cybersecurity were discussed. The deputy suggested exempting from liability persons who operate both on the territory of the Russian Federation and abroad. According to Khinshtein, the initiative will be discussed in detail when it has a “clear wording.”
Earlier, representatives of another pro-Russian group, Phoenix , told Gazeta.ru that they were not ready to participate in the state program to find vulnerabilities in Gosuslugi due to “lack of free time.”
Russian hackers refused to look for vulnerabilities on “State Services” due to “lack of time”
Pro-Russian hackers will not participate in the state program for finding vulnerabilities at Gosuslugakh due to “lack of free time,” hacker Chapaevv, leader of the Phoenix group. The launch of this program was announced on February 10 by the Ministry of Digital Development.
“This [participation of hackers in the Mintsifra program] is unlikely, practically impossible. Something is constantly happening in the world. Most often, this “something” is actions against our state and the Russian people, to which we, attacking hackers, need to respond as quickly and harshly as possible. Therefore, sometimes we simply do not have free time to sleep, not to mention testing Russian systems,” said Chapaevv.
Also, according to him, it is unprofitable for “black” hackers (engaged in cybercriminal activities for commercial purposes) and “hacktivists” to be legalized, since “black” work brings money “many times more” than legal activities.
At the same time, Phoenix leader praised the very idea of attracting “white hat” hackers (who are engaged in legitimate search for vulnerabilities in information systems for the money of private or state-owned companies) to search for vulnerabilities in Gosuslugakh. Even though the government service is already well protected.
“If you look for news about the “hacks” of “Gosuslug”, you can see how every year there is less and less of the same news. This already speaks volumes. In addition, we have intelligence departments that infiltrate groups of enemy countries. They report that at the moment, foreign hackers are not even trying to break this system, knowing in advance about their failure,” Chapaevv said.
The hacker added that in the most secure information system, a person remains the most vulnerable link
DEANON @chapaev_901 COMMANDER PHOENIX KILLNET DEPARTMENT
|Name| Barabanov Vladimir Vladimirovich
|PHONE NUMBER|+79081998211
|CITY|Krasnodar Territory, Kropotkin.
——-|ACCOUNTS|———
@hatiadmin | #id1459596743
@chapaev_901 | #id1329097938
https://www.youtube.com/user/hachi159/about
https://transitapp.com/redirect.html?url=whatsapp://send/?phone=79081998211
Vyacheslav Zolotov, baby time,
————————————-
|NAME| hachi159, hatiadmin, chapaev_901.
———-|US PROXY AT A SPECIFIED TIME|———-
|PROXY| http://161.35.117.160
|DATE| 2022-0711 19:40:22 UTC
—|PROXY INFO|—
|COUNTRY|USA
|REGION|New Jersey
|CITY| North Bergen
|INDEX|07047
|PROVIDER|AS14061 DigitalOcean, LLC
|SUPPLIER|DigitalOcean, LLC
|COORDINATES| 40.793, -74.0247
|CONTACTS|abuse@digitalocean.com
——————————-
Phoenix hackers who joined KillNet reported a prolonged DDoS attack on the website of the Spanish Foreign Ministry
Chapaevv, the leader of the Phoenix group, said the DDoS attack has been going on for several hours. According to the hacker, it will last until the Spanish Foreign Ministry goes crazy and changes the site’s domain.
“The reason for the attack was the numerous acts of assistance to Kiev by the government of Spain. In particular, this is how we respond to Spain’s promise to transfer Leopard tanks to the Armed Forces of Ukraine ,” Chapaevv said.
Due to the attack, the site of a foreign agency is not opened for users from Russia, the USA, Spain, Italy, France, Germany, and a number of other countries.
According to the leader of Phoenix, they also simultaneously attack the web resources of the country’s Ministry of Defense and the Center for Strategic Studies at the Ministry of Defense (IEEE).
KillNet-affiliated Phoenix hackers report hacking Pakistani police using cat picture

Pakistan’s Khyber Pakhtunkhwa provincial police have been hacked by Phoenix hackers over the government’s decision to hand over 10,000 Grad multiple rocket launchers to Kyiv said Chapaevv, leader of Phoenix.
He claims that hackers managed to infiltrate the police network using a phishing email with an attachment infected with infostealer, which was a picture of a cute cat.
“One of the fighters decided to have fun without informing me. Forging a letter from the sender on behalf of a police officer, he sent a “kinder surprise” with a photo of a cat to another officer. Moreover, the text was quite simple, like “hey, look at what cute cats I found.” How pleasantly surprised we were to see access first to the PC of the employee of the recipient of this picture, and then to the whole system. Thank you, cats ,” said the hacker.
As a result of the hack, Phoenix hackers gained access to the personal and service data of 83,000 Pakistani police officers.
PHOENIX
We are not a state structure. Our activities are not paid by the President of the Russian Federation.
Citizens, officials, and businessmen – Do not forget about us. You also live in Russia!
We do not need financial support to realize our common mission. We need your support. Drive in reactions, send links to friends, drive in a fucking comment. We will be very pleased
In accordance with the provisions of paragraph 18.1 of Art. 217 of the Phoenix Code of the Russian Federation, are exempt from taxation on likes of individuals, subscriptions of individuals in the form of mailings to friends and acquaintances, received by them from individuals as a gift.
– PHOENIX

You must be logged in to post a comment.