1/ SBU blocked two more "bot farm" that dispersed destructive content in #Ukraine
Cyber experts of the SBU eliminated 2 more botfarms: in #Kyiv region and in #Odessa. "Army of bots" was almost 7k accounts used to share destructive content, including for:
2/ ▪️ discredit-ation of the Defense Forces of Ukraine and state leadership
▪️ justification of the Russian armed aggression;
▪️ unraveling the socio-political situation in the country.
In the #Kyiv region:
According to the investigation, the bot farm ws 5k. The accounts were
3/ created and administered by a 24-year-old native of #Zaporizhzhia region, who currently lives in the #Kyiv region.
For the conspiracy, he registered fake accounts through Russian email services and virtual numbers of Russian and Belarusian mobile operators. In some cases for
4/ their verification used fake documents of #Ukrainian citizens.
"Ready" bots the attacker leased or sold to interested parties, accepting payment for their "services" on a bank card.
It was found that his "clients" were, in particular, representatives of PR units of political
5/ parties & citizens of the Russian Federation who promote destructive & provocative materials in the Ukrainian information space.
Law enforcement officers conducted a search at the address of the residence of the administrator of the "bot network", where they found and removed:
6/ - computer technology with evidence of illegal activity;
- a special software.
Currently, the issue of a message to the botfarm organizer about suspicion of b. First century 361 (unauthorized interference in the work of information (automated), electronic communication,
7/ information-communication systems, electronic communication networks) Criminal Code of Ukraine.
🔹 In Odessa region:
Four local residents turned out to be the organizers of botfarms.
The main focus of attackers is to create and promote accounts in social networks and messenger
8/ Dilki has used them to spread panic in the region, including dispelling misinformation & fake news from the fronts.
As a result of the operational investigation, it was confirmed that their "clients" were people in the Russian Federation
In the course of searches conducted
9/ at the addresses of the attackers, law enforcement officers discovered and removed:
- computer equipment, 4 servers, over 250 USB modems and mobile phones with evidence of illegal activity;
-bank cards through which calculations with "clients" took place;
-over 400 SIM cards
10/ of mobile operators.
An investigation is underway to find out all the circumstances & persons involved in unlawful activities.
The operation was handle by the staff of the special branch of SBU together with "cyberfahívcâmi" & investigators of the national police
• • •
Missing some Tweet in this thread? You can try to
force a refresh
1/ bon apparemment c'est le jour des gros losers...;
meme le mécanicien serbe commence à chouiner pour nous dire que ça va pas pour les Russes 😂😂
lui qui se marrait qd les troupes ukrainiennes se retiraient de #Severodonetsk ... courage! fuyons!
2/ @ Defmon3 is also reporting this hilarious exchange
3/ what is really "funny" is when you look at the people sucking these BS infos all day long... and i always find, always, people trying to link @BHL to this... this is mind boggling to me.. there is clearly pro russian and anti jewish "fifth column" in France right now. sick!
1/ #SBU counterintelligence do every day major work no people talk about because it's no "flashy" but it is crucial work. Today tehy detained Ru agents who were "hunting" for the coordinates of the positions of the Armed Forces & the passwords of checkpoints in the #Kharkiv area
2/ The Security Service of Ukraine exposed and detained two citizens of Ukraine who were "leaking" the positions of the Ukrainian military in the Kharkiv region to the occupiers.
The law enforcement officers established that these are local residents who, for ideological reasons,
3/ agreed to cooperate with the Ru.
Through her connections among Kharkiv residents, the woman (below) collected & passed on information to the enemy about locations of deployment, routes of movement of units and equipment of the Armed Forces.
Her accomplice is an employee of
Helo tactical ride in #Kherson area...
"yes sir... park your car!"
2/ need some sound! (if someone wants to add something "nice" here") would be nice!
also notice the ADROS" KT-01 AVE which is a Ukrainian-made optical-electronic suppression station (SOEP). NPF "Adron" was developed and NPK "Progress" has been produced since 2005.
3/ The station is intended for active protection of helicopters against guided missiles with infrared homing heads of various types. According to the developers, the station makes it possible to prevent the capture of a protected target by such missiles as "Stinger", "Igla", R-60
1/ Operational situation update regarding the #russian_invasion in #Ukraine on September 03, 2022.
no real changes today - all Ru attacks pushed back
There is still some major operations in the initiative of Ukr in #Kherson area & but FEBA line unclear #UkraineMap#CarteUkraine
2/ last gen staff report :
read the comment about aviation.. hence the fact i RT the famous article of #Zelenskyi thanking the air force today ; big win! big hit!
3/ thanks to @Cosmonaut19 for the job!
Russian propaganda of course said :
"A health complex was destroyed by a missile strike in #Kherson" while we do know for certain that:
Zatyerany Mir hotel was "home" of RuOrcs and others collaborators.
1/ SBU :Intelligence: 40% of Ru equipment for new units not combat-ready.
Ukraine's Intelligence Directorate said the newly established Russian 3rd Army Corps is having trouble filling its ranks with people and equipment and will be able to complete formation by late November.
2/ some infos coming in about Russian military equipment with new markings seen in Mariupol - a circle inscribed in a triangle, - Andryushchenko
could be sign for the "3rd Army Corps", which the Russians are now forming in haste to compensate for their losses. to be confirmed
3/ The newly assembled RU 3rd Army Corps was supposedly conducting pre-deployment training in the Ru town near Moscow. So maybe they are anticipating to regroup with units in Marioupol.
an "order of battle" was produced but this is wild guess at this point for half of units.
1/ i could not believe it this morning Semyon #Pegov has always been a huge asset to Moscow (he used to films fakes and first entry to a city)
but "WarGonzo" POS chanel confirms Pegov is incarcerated. still for unknown reasons.
2/ something no one is noticing but that guy could have had his phone hacked, and as he is always sharing infos with colleagues about locations of troops and materials and areas to prepare and "shoot" propaganda sequences that he could have "helped" without even knowing it, to
3/ let slip quite important informations (meme en creux, un jour je vous expliquerai). FSB learned about it, and he could have decided to go through a thorough investigation process to assess if infos went "away" because he is just careless stupid dumb, or because he would be