#TeamOneFist has confirmed - there are no smart comp scientists in #Russia!
Last night, we conducted a strategic #cyber strike against a top #AI/#compsci institute (ISA RAN), under the Russian Academy of Sciences. Even the president of Russia is a customer of their research. 1/
I penetrated this #Cisco switch, which we found to control their entire network: 9 research servers & 100+ devices. All without any #cybersecurity measures! Madness. Bricked it, demolishing their entire research environment; we also gave them a small "gift" from us. 2/
They were so arrogant, that they didn't even bother to protect their network. So we gave this famous government institute a perfect reminder, to humble themselves! Опомнись #Россия, за всё ты в ответе! #SlavaUkraini! #UkraineWillWin, there is no doubt 🇺🇦☢️👊 #Ukraine️#infosec
If #Russia takes power from #Ukraine, #TeamOneFist will respond!
Op.Gradient: a #cyber strike against a #hydroelectric plant's construction site. Their sensor #SCADA network and #GNSS base station were successfully penetrated, which monitored ground/foundation stability. 1/4
Over the course of a week, I gradually introduced circular error into the GNSS readings, reducing it's accuracy to disrupt their work. At the end of it, both the sensor network and the base station were demolished, to prevent them from fixing the damage caused. 2/4
(3/4)
By the way, this site has been flooded from erosion in the past. This network is vital for RusHydro to ensure that construction is safe, and is following the approved plan. All with Western made @LeicaGeosystems and @MoxaInc devices. Hopefully, this will happen again:
At 17:00 local time, we assumed control over an @EnstoGroup#grid#automation#controller belonging to the DK Port substation. Timing was chosen to match peak usage hours. In addition to controlling power supply, it was supplying data for Rosenergo's FLISR fault #algorithm 2/4
Fire in the hole! #TeamOneFist is celebrating #Kherson with a gift for #Ukraine: Op.Positron.
Supporting the offensive, we launched a strategic #cyber strike against TsARZ in #Yekaterinburg, #Russia. They repair trucks, BTRs, and light armored vehicles for the RF MOD 1/
We attacked their #SCADA/#ICS, demolishing 8 expensive Schneider M258s #PLC, w/2400 channels & 16 DOF each for complex machines. This led to a fire that erased an entire workshop building, and took 13 trucks to extinguish! According to locals the first 3 arrived without water😂2/
A very special present from #TeamOneFist: Op.Switchblade, one of our largest #DataCenter attacks yet!
We hunted down every #networking#switch we could find in #Russia and tested them for vulns. From these, we conducted a #cyber strike against 55 strategically valuable devices 1/
We penetrated devices both large and small; many of them were at the heart of #ISP DCs like Rostelecom or Kuban-Telecom, but many also belonged to individual businesses. All had high utilization rates, uptime, and were rich in features: these were all core infrastructure 2/
These included #Russian, #Chinese, and #Western boxes like #Cisco and #HP!
We swiftly demolished them, before any of the sysadmins could react or notice us. After the initial strike, we kept reattacking if they were recovered (>8 times!). No uninterrupted service for them! 3/
Dear warriors of #Ukraine, today is your day, today is the announcement to end all announcements. Today, #TeamOneFist announces the victory of Op Pleiades: silencing of #Russia's Gonets #satellite network with a strategic #cyber strike like none before! 1/
I successfully penetrated their CRM/client database, which is referenced by the network in order to send/receive messages. We were unable to download the DB and they were monitoring it regularly, so we made the decision to destroy it, which we accomplished without detection. 2/
Of course, we had some fun while destroying them :) 3/