🚨🇷🇺🇺🇦 BIG: Russian hackers infiltrated the Ukrainian military’s "Delta" command system— the platform used to coordinate attacks against Russian forces.
🧵Here’s how they did it👇
Who Hacked Delta?
A Russian hacker team consisting of:
🔸KillNet: Known for DDoS attacks and cyber sabotage.
🔸Beregini: Specializes in intelligence gathering.
🔸PalachPro/Executioner: Developed AI tools for target analysis
What is the Delta System?
Delta refers to the Ukrainian Armed Forces’ command-and-control (C2) system, designed for real-time battlefield management, troop tracking, and coordination of strikes (e.g., UAV launches).
It was hosted on foreign cloud infrastructure to evade Russian cyber operations
How Was Delta Compromised?
Cloud Infiltration: Despite being hosted externally, hackers breached Delta’s cloud storage via compromised credentials or exploiting vulnerabilities in third-party providers.
After hacking into Delta, PalachPro’s neural network analyzed satellite imagery to pinpoint UAV launch sites in Crimea, Sumy, and Chernyakhov by identifying equipment patterns and trench networks.
Delta's live data feeds were likely intercepted, enabling counterstrikes on Ukrainian logistics
📍 Confirmed Launch Points:
🔸Moscow-bound drones originate from Ukraine’s Chernigov region (Bober, PD-2, UJ-22 UAVs).
🔸Voronezh & Central Russia attacks are launched from Sumy.
Russian forces are now targeting these locations.
Using this intelligence, Russia took the following actions:
🔸 Disrupted navigation systems with electronic warfare.
🔸 Predicted launch windows using AI modeling.
🔸 Struck key production nodes with loitering munitions.
Cyber Warfare Evolution
The Delta breach demonstrates:
🔸Cloud-based C2 systems are vulnerable to persistent intrusion campaigns.
🔸Neural networks are becoming force multipliers in target acquisition cycles.
Strategic Outlook
The systematic degradation of Ukraine’s strike capacity is measurable:
🔸Launch site attrition is forcing longer logistical chains.
🔸AI-enhanced ISR is compressing Ukraine’s decision-action timeline. This trajectory suggests diminishing returns on Kiev’s deep strike operations.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
🚨🇺🇸🇦🇿The US Push in Azerbaijan – A Direct Threat to Iran & Russia
The US is aggressively expanding its influence in Azerbaijan, leveraging the Zangezur Corridor and energy partnerships to isolate Iran and undermine Russia.
🧵Here’s how👇
Azerbaijan’s Pivot—Since 2023 Baku's position with Moscow turned aggressive:
🔸Arrested Russian journalists, canceled cultural ties with Moscow.
🔸Aliyev publicly showed his alignment with Ukraine (e.g., $40M energy aid, pro-Kiev rhetoric).
🔸Russian intelligence alleges Azerbaijani diaspora networks aided Ukraine’s "Spider’s Web" sabotage campaign against military bases.
🚨🇷🇺🇺🇦BATTLE FOR POKROVSK: Ukrainian troops HUNTED DOWN by Russian assassins
Russian sabotage and reconnaissance groups have reportedly entered the city and begun wrecking havoc.
🧵Here’s what you need to know👇
Russian sabotage groups are actively targeting Ukrainian troops in Pokrovsk. Deep State reports: "The enemy exploited a brigade’s infantry shortage & poor situational awareness, infiltrating the city via Zverevo."
A Ukrainian pickup truck carrying militants is ambushed & destroyed by Russian DRGs in Pokrovsk.
CNN, Axios, and Ukrainian sources report that Russia has amassed ~160,000 troops near the front, preparing for a major summer offensive.
🧵Here is why Zelensky is totally scared:👇
Current pressure points:
Russian forces are advancing steadily near Donetsk, Kharkov, and Zaporozhye oblasts, leveraging concentrated artillery and drone superiority.
These moves threaten key Ukrainian supply routes and defensive positions.
Tactical gains:
Russia’s incremental advances (400–500 km² per month since May) demonstrate a methodical approach.
Unlike Ukraine’s failed 2023 counteroffensive, Russia prioritizes attrition over rapid breakthroughs, minimizing risks while grinding down Ukrainian forces.