An attack that made numerous Ukrainian government websites unreachable has been linked to GRU hackers. bellingcat.com/news/2022/02/2…
@the_ins_ru Independent threat researcher Snorre Fagerland, working in cooperation with Bellingcat and The Insider, identified a web service apparently serving as a command and control centre which has played a role in past cyber-attacks linked to Russian state interests.
@the_ins_ru The same website also hosted cloned copies of a number of Ukrainian government websites, including the main webpage of the Office of the President.
@the_ins_ru Other cloned (and modified) websites found on the service include those of the Ukrainian Ministry of Justice and of a government-run petition portal.
@the_ins_ru These cloned websites were created no earlier than November 2021, around the time when Russia’s latest round of escalations against Ukraine began.
@the_ins_ru Notably the cloned version of the site of the Ukrainian president was modified to contain a clickable “Support the President” campaign that, once clicked, downloads a package of malware to the user’s computer.
@the_ins_ru It is not certain what the purpose of the malware payload is at this time, nor whether the payload was operational or simply a placeholder for different malware to be deployed at a crucial moment.
@the_ins_ru The type of malware deployed on the cloned Ukrainian websites shows a link to previous cyber attacks on the Ukrainian government dating to April 2021, as well as on the government of Georgia.
If you're sharing videos and photographs from Ukraine with accountability in mind, please make an effort to share them with links to the source you're using, it greatly assists organisations who are verifying conflict incidents.
Wherever possible we're seeking to find where videos were posted originally, so we can understand the context they were originally posted in, and it helps us eliminate videos that are just old videos being reposted for clicks.
It also allows us to examine associated metadata, especially where videos have been shared on Telegram, which retains file metadata, unlike the majority of social media platforms.
This video showing damage to civilian apartment buildings was filmed at 49.850727, 36.659762 in Chuhuiv, near an airport that was the likely target of the attack. Civilian casualties have been reported from the attack attributed to Russian forces.
Bellingcat is documenting incidents of potential disinformation arising on the frontlines between Russia and Ukraine: bellingcat.com/news/2022/02/2…
We will share what we find via a publicly accessible spreadsheet that will continue to be updated in the days ahead. You can view the spreadsheet here: docs.google.com/spreadsheets/d…
While the volume of videos and claims over recent days has been significant, we will look to add entries when incidents have been debunked or if claims contained within videos or images are inconsistent with other open source evidence or contextual data.
@LHreports@RadioTeleSuisse@srfnews@RSIonline@NZZaS The investigation sought to track the use of Pilatus PC-12 aircrafts in Afghanistan, the armoured vehicles of Mowag in Brazil and & Sig Sauer rifles which appeared to be in the possession of Saudi forces in Yemen.
You can check this yourself by downloading the two videos on Telegram from here: t.me/pushilindenis/… t.me/LIC_LPR/17431
Then uploading them to a metadata viewing site, like metadata2go.com, then you'll get lots of metadata, including when the files were created
Another example of a video published by separatists having a creation date days before the events shown are alleged to have occurred, this time a supposed Ukrainian attack on chlorine storage.
You can check the metadata of the video on metadata2go.com, and the original source with the metadata is t.me/nm_dnr/6192
This is the third example of a video published by separatists containing metadata that contradicts their claims.
The Radar Interference Tracker (RIT) is a new tool that allows anyone to search for active military radar systems
It has already proven useful in spotting potential movement of military equipment near Russia’s border with Ukraine – as @oballinger explains bellingcat.com/resources/2022…
@oballinger The tool is free and designed to be intuitive to use.