InformNapalm Profile picture
Feb 12 10 tweets 3 min read Read on X
Thread 🧵

1/ Ukrainian hackers, working alongside independent OSINT analysts, have conducted a successful counter-operation targeting #Russian attempts to bypass #Starlink restrictions.

We are revealing the details now — because the operational effect has already been secured.
2/ After technical restrictions limited Russian #military access to Starlink, Russian channels began actively searching for “drops” — Ukrainian citizens willing to activate terminals on their behalf for small crypto payments. This vulnerability was anticipated. Image
3/ Instead of passively observing, Ukrainian cyber specialists @256CyberAssault and OSINT volunteers @InformNapalm & MILITANT created controlled channels and bots offering “activation services.”
The goal was not activation.
The goal was collection. Image
Image
@256CyberAssault 4/ Within a week, the operation resulted in:
• 2,400+ data packages on Russian-operated Starlink terminals
• Dozens of contacts from collaborators willing to assist the enemy
• Thousands of dollars transferred by Russian servicemen desperately trying to restore connectivity Image
@256CyberAssault 5/ All relevant technical data was transferred to the appropriate Ukrainian structures.
Terminals identified in the process were rendered permanently inoperable.

Attempts to exploit Ukrainian civilians were documented. Image
@256CyberAssault 6/ We disclose this now for two reasons:
First, the operational phase has concluded and the intended effect has been achieved.
Second, transparency serves a strategic purpose. Image
Image
@256CyberAssault 7/ Russian forces must understand:

Attempts to bypass restrictions will not only fail — they will expose positions, identities, and networks.

Every workaround becomes an intelligence opportunity.
@256CyberAssault 8/ This operation demonstrated something essential:

#Ukrainian #cyber and volunteer #intelligence communities do not react passively.

We anticipate, we adapt, and we act several steps ahead.
@256CyberAssault 9/ #Starlink restrictions were only the beginning.
The battlefield is not limited to trenches or drones.
It includes networks, deception, data, and psychological pressure.
@256CyberAssault 10/ For the Russian military, uncertainty is now part of the equation. For #Ukraine, coordination between hackers, OSINT analysts, and defense structures remains a force multiplier.

End of thread 🧵

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with InformNapalm

InformNapalm Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @InformNapalm

Dec 15, 2025
🧵 THREAD | Ukraine strikes Russian submarine in Novorossiysk.
1/ Ukraine’s Security Service (@ServiceSsu) has carried out a historic special operation in the port of #Novorossiysk. For the first time ever, underwater drones struck and disabled a #Russian Kilo-class (Project 636.3 “Varshavyanka”) #submarine.
2/ The attack was executed using “Sub Sea Baby” underwater drones, which detonated near the submarine, causing critical damage. The vessel is effectively put out of action. Image
3/ This Russian submarine was armed with four Kalibr cruise missile launchers — the same missiles routinely used by Russia to strike Ukrainian cities and civilian infrastructure.
Read 9 tweets
Nov 21, 2025
🧵1/ Ukrainian hacktivists from the legendary Ukrainian Cyber Alliance (UCA) have carried out a major #cyber operation against the occupation postal service “Pochta #Donbass'a.” The scale of the wipeout is enormous — and its consequences even bigger. Image
Image
Image
2/ According to UCA spokesperson Sean Townsend, the operation erased:
• 1,000+ workstations
• ~100 virtual machines
• tens of terabytes of data in #storage systems
In short: the entire infrastructure of the occupation’s postal #network collapsed. Image
3/ Why does this matter?
Because “Pochta Donbassa” is not just a postal service - it’s a logistics backbone for #Russian troops in the occupied territories. They use it for #military documents, supplies, equipment parts, and even shipping loot back to #Russia.
Read 6 tweets
Nov 4, 2025
🧵We present the results of a unique cyber operation — #OKBMLeaks. During this operation, classified #documents were obtained from a #Russian components manufacturer involved in the production of parts for the Su-57 fighter and the PAK DA “Poslannik” next-generation strategic bomber. The full investigation is now available in 9 languages on the website of the international intelligence community InformNapalm.
informnapalm.org/en/okbm-leaks-…Image
📑The main contract between #Tupolev and OKBM, confirming OKBM’s official involvement in the PAK DA program is also #classified as “#secret”. It carries a confidentiality clause stating that if the contractor violates the terms of secrecy, the contract may be terminated unilaterally 🤭Image
Image
⚙ All #technical specifications of the project are classified as “state #secret” indicating a high strategic importance of OKBM. Annex 7 to the contract dated March 31, 2023 contains planned deadlines for work stages in the period from 2024 to 2027 🗄 Image
Read 10 tweets
Jul 24, 2025
🧵1/
Today, InformNapalm published new leaked documents revealing that Russia's "Helicopters of Russia" corporation signed a contract with #Cuba's Tecnoimport to repair 2 Mi-17-1V #helicopters used by the #Cuban president. t.me/informnapalm/2…Image
2/
An advance payment of over 600 million RUB (~$6.6M) was already transferred to the Russian side.
However, the contract hasn't been fulfilled due to delays and dysfunctions on #Russia’s side.
3/
InformNapalm analysts warn:
Due to constant leaks in #Russia's defense industry and corruption, third parties often interfere in production and repair processes. This creates security risks and possible spyware embedded during repairs.
Read 7 tweets
Jul 23, 2025
1/ 💸 How #Russia scams its own “partners”? Let’s talk about that.

Our CYBINT team at InformNapalm together with Militant Intelligence has uncovered how “Helicopters of Russia” rips off its foreign clients.

Welcome to #OHRD — Operation Hack Russia’s Day. 🧵 Image
2/ We found internal docs showing the exact same parts being sold at very different prices — depending on the client. Same year, same model, same unit.

But one invoice says $3,100…
Another says $4,915.

informnapalm.org/wp-content/upl…Image
3/ Why the price difference? Because “you passed the face check” 😏

informnapalm.org/wp-content/upl…Image
Read 8 tweets
Jul 18, 2025
1/ This week, #Ukraine’s military intelligence @DI_Ukraine, together with 🇺🇦 defense forces and forensic experts, hosted a special exhibition for #US representative 🇺🇸 @generalkellogg

The topic: Western-made components found inside captured #Russian weapons...🧵
2/ The components — microchips, sensors, boards — were retrieved from destroyed or captured 🇷🇺 military equipment by Ukrainian operatives in the field.

They are clear proof of how #Russia circumvents sanctions to wage war with #Western #tech. Image
3/ These findings are now publicly accessible:
🔗
Search by device, country of origin, or use case — it’s all there.

This is not just transparency. It’s accountability. war-sanctions.gur.gov.ua/en/componentsImage
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(