DIU and cyberactivists carry out a large-scale attack on Russian companies
A cyber training ground was opened at the Zhytomyr Military Institute. 2020. Photo credits: ArmyInform

Activists of the BO_Team cyber community with specialists from the Defence Intelligence of Ukraine attacked Russian companies.

The Defence Intelligence of Ukraine reported that they had attacked Russian companies that supported the war.

Over the past week, they have, among other things, destroyed all data on eight servers of a developer and supplier of navigation equipment.

The company in question is Orient Systems, which cooperated with Russian manufacturers of military equipment, including drones.

Also, according to the DIU, more than 100 terabytes of OrbitSoft data were destroyed during the week.

This company develops software and fulfills contracts for the Russian occupation army.

The activists also destroyed all data on 19 servers of the Internet service providers in Nizhny Novgorod – Linktelecom NN and Access Telecom.

All subscribers of these providers received letters reminding them of the inevitable reckoning for the war against Ukraine.

Prior to that, on June 27, cyber specialists of the Ukrainian intelligence attacked the Russian communications infrastructure, which resulted in the shutdown of propaganda media servers in the temporarily occupied Crimea.

At the same time, hackers are also engaged in attacks on Russia’s military-industrial complex.

In February, the Head Mare hacker group posted internal documents of the Russian High-Precision Systems and Technologies company online.

The published technical documentation included detailed information about a new hypersonic missile targeted at the Gvozdika, which is being developed to train air defense forces to intercept high-speed targets.

Share this post:

SUPPORT MILITARNYI

PrivatBank ( Bank card )
5169 3351 0164 7408
Bank Account in UAH (IBAN)
UA043052990000026007015028783
BTC
bc1qg0z99m95fte7kj8faa7h2kvnq92wvc53exe8gm
USDT
0x8676644fA7B6d328310283cAC1065Ae01d97CEe7
ETH
0xfD02863D3289416fcF50975c9DFda13623f97758
Popular
Button Text