Kübersõda ja häkkimine

Sõjaväelised erialad. Elutsükkel väljaõppest kuni reservist kustutamiseni. Nii nippidest kui ka relvadest/vahenditest.
Vasta
Kasutaja avatar
rockrapdude
Liige
Postitusi: 88
Liitunud: 24 Mär, 2023 15:25
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas rockrapdude »

Some kirjutas: 16 Apr, 2025 13:39 Allikas Anonymous France: https://x.com/YourAnonFrench_/status/19 ... 7038572980
Ise alla pole tõmmanud aga kahtlustan, et sealt võib leida viiteid ülejäänud materjalidele. Kui peaksid tegema, anna tagasisidet. Mul küll 30TB kettaruumi aga internetikiirus saast.
Annan teada, mida huvitavat leian õhtupoole :arrow:
Kasutaja avatar
rockrapdude
Liige
Postitusi: 88
Liitunud: 24 Mär, 2023 15:25
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas rockrapdude »

Väidetavalt DOGE kaudu lekitatud päris paras ports infot:

https://www.nextgov.com/cybersecurity/2 ... ys/404574/
Kokkuvõte ChatGPT-lt: USA Riikliku Töövaidluste Nõukogu (NLRB) süsteemidesse üritati siseneda Venemaa IP-aadressilt vahetult pärast seda, kui Elon Muski juhitud Department of Government Efficiency (DOGE) insenerid olid saanud ulatusliku juurdepääsu agentuuri tundlikele andmetele. Vilepuhuja Daniel Berulis väidab, et DOGE töötajad kasutasid varjatud meetodeid andmete väljatõmbamiseks ja turvaseire tööriistade keelamiseks. Kuigi sisselogimiskatsed blokeeriti, kasutati õigeid kasutajanimesid ja paroole, viidates võimalusele, et DOGE tegevus on paljastanud haavatavusi, mida välisriigi vastased võivad ära kasutada. Berulis ja tema kolleegide katsed teavitada Küberturvalisuse ja Infrastruktuuri Julgeoleku Agentuuri (CISA) takistati kõrgemate ametnike poolt. Pärast seda sai Berulis ähvardava kirja ja tema jälgimisfotod, mis viitab võimalikule kättemaksule. NLRB eitab rikkumist, kuid kongressi liikmed ja FBI ei ole seni kommentaare andnud.
Väike intekas CNN-is:

https://www.youtube.com/watch?v=TsqgXfrSksI
Kasutaja avatar
rockrapdude
Liige
Postitusi: 88
Liitunud: 24 Mär, 2023 15:25
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas rockrapdude »

Some kirjutas: 16 Apr, 2025 13:39
Allikas Anonymous France: https://x.com/YourAnonFrench_/status/19 ... 7038572980
Ise alla pole tõmmanud aga kahtlustan, et sealt võib leida viiteid ülejäänud materjalidele. Kui peaksid tegema, anna tagasisidet. Mul küll 30TB kettaruumi aga internetikiirus saast.
Annan teada, mida huvitavat leian õhtupoole :arrow:
Ühesõnaga on see üks suur nothingburger ("mittemidagiburger"), vähemalt minu jaoks.

10 terabaiti unustage kohe ära, 23.6 giga lahtipakitult (vähemalt see 18 gigane rar). Võib-olla on see 10 TB-ne failikogum kuskil, kuhu lihtsurelikud ei pääse. :dont_know:

Eks ta vajaks veidi rohkem kammimist ja tublisti rohkem vene keele oskust, kui seda mul on aastatega tekkinud ja külge jäänud.

Kaustade struktuur:

-Part1
-- Anonymous betrayer Yun66n Twitter account vulnerabilities
-- ...
-- Leaked Data of Russian insurance company 'Ренессанс Страхование'
--- Leaked documents
--- Vulnerabilities
---- Fetched data.txt
-- ...
-- Vulnerabilities of Russian TV channel Russia 1
-Part2
-...
-Part 5

Selle kindlustusettevõtte "Fetched data.txt" sisu on järgnev:
+ Target IP: 194.190.22.68
+ Target Hostname: eosagou.renins.ru
+ Target Port: 443
---------------------------------------------------------------------------
+ SSL Info: Subject: /C=RU/ST=Moscow/L=Moscow/O=PJSC Renaissance Insurance Group/CN=*.renins.ru
Altnames: *.renins.ru, renins.ru
Ciphers: TLS_AES_128_GCM_SHA256
Issuer: /C=BE/O=GlobalSign nv-sa/CN=GlobalSign RSA OV SSL CA 2018
---------------------------------------------------------------------------
+ Server: ddos-guard
+ /: The anti-clickjacking X-Frame-Options header is not present. See: https://developer.mozilla.org/en-US/doc ... me-Options
+ /: The site uses TLS and the Strict-Transport-Security HTTP header is not defined. See: https://developer.mozilla.org/en-US/doc ... t-Security
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerab ... pe-header/
+ All CGI directories 'found', use '-C none' to test none
+ : Server banner changed from 'ddos-guard' to 'ngjit'.
+ Server is using a wildcard certificate: *.renins.ru. See: https://en.wikipedia.org/wiki/Wildcard_certificate
Ühesõnaga esimese läbijooksmisega 80-90% kaustade sisust ongi mingid IP aadressid ja sinna kuuluvad "Vulnerabilites" ("Haavatavused") tekst, kas siis .png või .txt kujul.

Keegi pädevam IT turvalisuse alal võiks kosta, mida see "Vulnerabilities" endast kujutab, sest chatGPT viskab sellise vastuse:
This is an output summary from a web vulnerability scanner or reconnaissance tool like **Nikto**, **Nmap**, or **SSLyze**. It gives technical details about a web server, specifically:

- **IP/Hostname/Port**: It's scanning `194.190.22.68` (`eosagou.renins.ru`) over **HTTPS** (port 443).
- **SSL Info**: Shows the SSL/TLS certificate's subject, alternative names, encryption cipher, and issuer.
- **Web Server**: Initially `ddos-guard`, later showing `ngjit` (likely a reverse proxy or CDN).
- **Security Headers Missing**:
- `X-Frame-Options`: Prevents clickjacking – **missing**.
- `Strict-Transport-Security (HSTS)`: Enforces HTTPS – **missing**.
- `X-Content-Type-Options`: Prevents MIME-type sniffing – **missing**.
- **Wildcard Certificate**: One cert covers all subdomains under `renins.ru`.

These findings indicate potential **security hardening issues** but not necessarily vulnerabilities.
Ja selleks et erutust veidi allapoole tuua, siis Donald Trump kaustas on ainult järgnev (pildid manuses):Pilt
Pilt

Mõnes kaustas pilte siin seal, mõni "andmebaas" Exceli kujul, PDF failid, kodulehtede failid (.css ja .html failid, mõni JSON ka).

Ehk keegi leiab midagi põnevamat seal, mina seda ei suutnud leida. Sensatsionalism mu jaoks. Üpris mõned failid aastast 2022 ja juba ammu tiirelnud internetis (nt pildid vene neonatsidest).

Dugini telegrammi kanali fail "Fetched data.txt" annab läbi chatgpt sellise vastuse:
This is the output of a **security scan (likely from Nikto or a similar vulnerability scanner)** targeting the Telegram server (`149.154.167.99`, `t.me`). It lists:

- Server configuration details (e.g. server type, SSL certificate info)
- Headers and their potential weaknesses
- **Hundreds of exposed or misconfigured paths** like `.sql`, `.pem`, `.jks`, `.tar.gz`, and various admin panels
- Known vulnerabilities in third-party applications (e.g. phpMyAdmin, TYPO3, guestbooks, shopping carts)
- Potential backup or sensitive files that should not be public

The goal is to identify **misconfigurations, exposed files, and known vulnerabilities** on a web server.
Ehk viitsin mõni õhtu veidi rohkem kraami uurida, sest seal 44 382 faili ja 2 952 kausta. Aga ma usun, et las ta jäägu sobiva luureteenistuse või uuriva ajakirjanduse lahendada ja lahata.
Manused
Vulnerabilities of Donald Trump account.png
Index files of Donald Trump Twitter account.png
Kasutaja avatar
ruger
Liige
Postitusi: 23396
Liitunud: 04 Juul, 2009 12:29
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas ruger »

SEPKA-USA serveritest on DOGE meeskond teinud suurema lekke orkidele
Elon Musk-led US DOGE department is suspected of organizing a large-scale leak of confidential databases to unknown recipients from Russia, - Militarnyi

Cybersecurity expert and security developer at the National Labor Relations Board Berulis informed the US Congress about a covert cyber operation against his department, which was organized by the DOGE government efficiency department.

To do their job, employees of Musk’s department used external tools that are not usually used in government agencies, for example, to automate requests and bypass restrictions.

Security officers at the National Council noticed strange activity: about 10 GB of data was downloaded from the department’s database servers. Cloud resource costs increased by 8%, which may indicate the use of powerful but short-term computing resources for data theft.

Worst of all: 15 minutes after the DOGE accounts were created, someone from a Russian IP address tried to log in using their names and passwords. This directly indicates that DOGE devices were hacked or that data was knowingly transferred to third-party users.
https://x.com/Maks_NAFO_FELLA/status/19 ... 5564856751
Ainus, mida me ajaloost õpime, on see, et keegi ei õpi ajaloost midagi.
Live for nothing or die for something.
Kui esimene kuul kõrvust mõõda lendab, tuleb vastu lasta.
EA, EU, EH
Kasutaja avatar
ruger
Liige
Postitusi: 23396
Liitunud: 04 Juul, 2009 12:29
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas ruger »

Anonymous hakkas avalikustama orkide GRU-le alluva häkkerirühmituse APT28 ehk Fancy Bear liikmeid(GRU kaastöölisi)
A message from Anonymous, to APT28. Wednesday, April 30, 2025. #OpAPT28
https://x.com/YourAnonFrench_/status/19 ... 4218157123
Here are the names of the 12 GRU officers indicted by the United States in 2018 in connection with APT28:

- Viktor Borisovich Netyksho (Unit 26165)
- Boris Alekseyevich Antonov (Unit 26165)
- Dmitriy Sergeyevich Badin (Unit 26165)
- Ivan Sergeyevich Yermakov (Unit 26165)
- Aleksey Viktorovich Lukashev (Unit 26165)
- Sergey Aleksandrovich Morgachev (Unit 26165)
- Nikolay Yuryevich Kozachek (Unit 26165)
- Pavel Vyacheslavovich Yershov (Unit 26165)
- Artem Andreyevich Malyshev (Unit 26165)
- Aleksandr Vladimirovich Osadchuk (Unit 74455)
- Aleksey Aleksandrovich Potemkin (Unit 74455)
- Anatoliy Sergeyevich Kovalev (Unit 74455)

They are accused of hacking related to the 2016 US election. None have been arrested to date due to extradition challenges with Russia. Dmitriy Badin is also the subject of a German arrest warrant.
https://x.com/grok/status/1917489434762867042

Pildid ka
We have successfully identified four members of APT28. This is just the beginning.
- Dmitriy Sergeyevich Badin
- Ivan Sergeyevich Yermakov
- Artem Valeryevich Malyshev
- Aleksei Valeryevich Minin
Pilt Pilt Pilt Pilt
https://x.com/YourAnonFrench_/status/19 ... 9694577146

EDIT 01.05.2025
Veel 3
We've just identified three more members of APT28. This is just the beginning.
- Oleg Mikhaylovich Sotnikov
- Evgenii Mikhaylovich Serebriakov
- Aleksei Viktorovich Morenets
Pilt Pilt Pilt
https://x.com/YourAnonFrench_/status/19 ... 1864287739
Ainus, mida me ajaloost õpime, on see, et keegi ei õpi ajaloost midagi.
Live for nothing or die for something.
Kui esimene kuul kõrvust mõõda lendab, tuleb vastu lasta.
EA, EU, EH
Kasutaja avatar
ruger
Liige
Postitusi: 23396
Liitunud: 04 Juul, 2009 12:29
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas ruger »

orkide infot tuumarelvabaaside kohta lekkis suures mahus
Unbelievable: Leak of 2 Million Secret Documents Exposes Russia’s Nuclear Bases

European journalists from Danwatch and Der Spiegel have obtained access to a massive trove of 2 million documentsdetailing Russia’s strategic nuclear facilities. Among them are detailed blueprints of the ultra-secret base in Yasny, where Avangard missiles are stationed, including everything from toilet locations and tunnel maps to security systems and surveillance cameras.

🔻 What was leaked:

📍 Building plans, tunnel diagrams, IT systems, security layouts, and alarm schematics.
📍 Lists of sports equipment, wall posters, and soldiers’ leisure activities.
📍 Critical information revealing structural vulnerabilities.

This appears to be the largest intelligence leak in the history of the Russian military. Any foreign intelligence servicenow has enough material to pinpoint weak spots. Toilets, motion sensors, tunnel routes, gym equipment — journalists now have CIA-level access. It’s a security disaster the Kremlin won’t be able to cover up.

The fallout could force Russia to rebuild parts of its nuclear infrastructure from scratch — potentially costing billions.

The leak occurred via state procurement tenders, where contractors accidentally posted classified files online. Russia’s Ministry of Defense has not commented on the breach.
https://x.com/nexta_tv/status/1927695569352343988

Taani lehelt info
https://danwatch.dk/en/putins-new-nucle ... -products/
https://danwatch.dk/en/serious-security ... s-exposed/
Ainus, mida me ajaloost õpime, on see, et keegi ei õpi ajaloost midagi.
Live for nothing or die for something.
Kui esimene kuul kõrvust mõõda lendab, tuleb vastu lasta.
EA, EU, EH
Poti soldat
Liige
Postitusi: 1907
Liitunud: 02 Dets, 2012 12:44
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas Poti soldat »

Postitasin selle juba Süüria kodusõja teemasse, aga kuna väga konkreetselt just siinse teemaga seotud siis panen siia ka lingi:
How a Spyware App Compromised Assad’s Army
https://newlinesmag.com/reportage/how-a ... sads-army/
Kasutaja avatar
ruger
Liige
Postitusi: 23396
Liitunud: 04 Juul, 2009 12:29
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas ruger »

UKR lasi pikali orkide riigiraudtee IT süsteemid
Cyber ​​specialists of GUR has shut down Russian Railways services, - RBC-Ukraine

❗️Cyber ​​specialists disabled the official resource of "Russian Railways" (RZD). Attack capacity reached 6 GB and almost 2.5 million packets per second.
https://x.com/Maks_NAFO_FELLA/status/19 ... 6170926172
Ainus, mida me ajaloost õpime, on see, et keegi ei õpi ajaloost midagi.
Live for nothing or die for something.
Kui esimene kuul kõrvust mõõda lendab, tuleb vastu lasta.
EA, EU, EH
Kasutaja avatar
Kilo Tango
Liige
Postitusi: 10269
Liitunud: 14 Aug, 2008 15:40
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas Kilo Tango »

Ei ole esimene kord. AFAIK tehti seda ka 21 või 22 aastal.
Praegu, kui on kenasti koosseise ribadeks lastud jms., on see muidugi mõeldud selleks, et suurendada kaose mõju.
Kasutaja avatar
ruger
Liige
Postitusi: 23396
Liitunud: 04 Juul, 2009 12:29
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas ruger »

Iisrael väidetavalt istumas sees enamuses Lähis-Ida IT süsteemidest
A Catastrophe is Striking the Gulf States and Iran

Over the past two decades, India has dominated the software industry. As a result, Gulf nations and Iran have heavily relied on Indian software and programmers.

After a Mossad infiltration in Iran and subsequent investigations with China and Russia, it was revealed that Indian programmers had been in contact with India via Elon Musk's Starlink. Arrests and interrogations uncovered a shocking truth:

Most Indian software in Iran is actually Israeli, embedded with backdoors that transmit real-time data to Israel. This includes sensitive information like civil registries, passport data, airport systems, and more.

Even more concerning, this software disrupts military devices and enables remote control operations.

The same software is used in the Gulf States—UAE, Saudi Arabia, Qatar, and Kuwait. This means entry and exit points for anyone entering these countries, including Egyptians, are being monitored and shared with Israel.

Iran has exposed this, and the revelation is causing a major crisis in these nations. A massive fallout with India is imminent, with full details expected in the coming days.
https://x.com/clashreport/status/1939004213713084740
Ainus, mida me ajaloost õpime, on see, et keegi ei õpi ajaloost midagi.
Live for nothing or die for something.
Kui esimene kuul kõrvust mõõda lendab, tuleb vastu lasta.
EA, EU, EH
davidsoniharald
Liige
Postitusi: 1697
Liitunud: 16 Veebr, 2010 22:57
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas davidsoniharald »

Iisrael teab paremini, mis Iraanis toimub, kui Iraan ise :D
Vanasti kui facebooki ei olnud veel, teati ainult oma pere sees, kes loll on.
Kasutaja avatar
ruger
Liige
Postitusi: 23396
Liitunud: 04 Juul, 2009 12:29
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas ruger »

Gazpromi servereid häkiti.
The cyber warriors of DIU and GUR have conducted a devastating attack on Gazprom. 🔥 https://moscowtimes.ru/2025/07/18/ukrai ... ek-a169219

Their master billing and analytics database used by all of Russia, with 50 network connections coming into a 20-server Windows cluster and processing over over a petabyte of network traffic, has been totally destroyed.

Putin will try to hide the news, but Ukraine sent in people to confirm the outage in real time, making it undeniable. Video of the entire attack along with ample proof have been taken, there will be no hiding from this shame for Russia! What Gazprom doing @KremlinRussia_E
?

Gazprom cannot bill for gas right now. Gazprom has no idea how much gas is being used by any customer. The main server cluster used for this critical financial function for the company is gone, along with all of the backups. Gazprom will have to recover from offsite backups that go back to early May, as the database backups after May 4th no longer exist. In effect, Ukraine has imposed new economic sanctions on Russia for their illegal war of aggression. In the coming day, more proof of this highly successful mission will be released to the media.
https://x.com/SpoogemanGhost/status/1946246834004828339
Hundreds of terabytes of data were downloaded by the Ukrainian hackers prior to their deletion from the Russian systems, the source said.

The sources said the attackers managed to destroy clusters of "extremely powerful" servers running 1C, a software widely used for managing documents and contracts, analytics data for pipelines, valves, pumps, and SCADA systems — key elements in operating Gazprom's technical infrastructure.

Multiple servers reportedly had operating systems removed or disabled, and the BIOS (basic firmware) of many devices was damaged, making them inoperable without physical repairs.
https://kyivindependent.com/ukrainian-i ... y-07-2025/
Ainus, mida me ajaloost õpime, on see, et keegi ei õpi ajaloost midagi.
Live for nothing or die for something.
Kui esimene kuul kõrvust mõõda lendab, tuleb vastu lasta.
EA, EU, EH
Kasutaja avatar
ruger
Liige
Postitusi: 23396
Liitunud: 04 Juul, 2009 12:29
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas ruger »

Prantsusmaa kaitsetööstus sai pihta
France subjected to the largest cyberattack in its history on the defense sector - codes of combat systems and software for nuclear weapons compromised

The Financial Times reports that the French defense company Naval Group, which produces submarines and military ships, was targeted by hackers. The hackers gained access to sensitive data, including:

▪️ Software for nuclear weapons on submarines

▪️ Documentation on Rafale-M fighter jets

▪️ Internal emails from management, network data

⚡️Authorities in the US and France have launched an investigation and are verifying the authenticity of the leaked data.
https://x.com/nexta_tv/status/1950200222753104265
Ainus, mida me ajaloost õpime, on see, et keegi ei õpi ajaloost midagi.
Live for nothing or die for something.
Kui esimene kuul kõrvust mõõda lendab, tuleb vastu lasta.
EA, EU, EH
Kasutaja avatar
ruger
Liige
Postitusi: 23396
Liitunud: 04 Juul, 2009 12:29
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas ruger »

orkide Killnet ähvardab Euroopat
Russian media report that the hacker group KillNet is preparing a major cyberattack on the entire European Union, with France set to be the first target.

According to the hackers, they’ve developed a "revolutionary network weapon" capable of isolating any country for months before recovery. They’re promising a digital apocalypse — "not just a DDoS attack," but something more like "your device no longer works".

Looks like they’re really upset they couldn’t make it to Venice.
https://x.com/wartranslated/status/1950920613771538572


Viimase 24 tunni jooksul on orkistanis maha võetud hulgaliselt IT süsteeme
The internet in Russia is sinking deeper into crisis

In the last 24 hours, online services, cash register systems, mobile applications, and even large IT infrastructures have failed in various regions of the country:

▪️ Hackers attacked the "Dobrotsen" discount chain (900 stores across Russia and the CIS). All five company offices — in Moscow, St. Petersburg, Yekaterinburg, and Samara — suspended operations. The server and official website are down, distribution centers have not been working since yesterday. Computers either do not turn on or freeze on endless update installations.

▪️ The "Vkusvill" retail chain experienced a failure in its mobile app. Users across the country report being unable to place online orders. The company claims this is not a cyberattack but "technical issues”, but we know they are lying - they were hacked

▪️ Failure in the "Samokat" delivery service: "Sorry, we broke down. It’s temporary, we’ll fix it soon. Refresh the site — sometimes that helps, but probably not while we are being hacked”.

▪️ A DDoS attack was recorded on the entire network of the St. Petersburg internet provider AirNet. It shut the network down like a lead balloon.

▪️ Failures in the operation of "Evotor" smart cash registers. Disruptions were recorded in Moscow and the region, Bashkortostan, St. Petersburg, and Vladimir region. Users complain that the cash registers do not work and payment cannot be processed.

These and many other successful hacks on russian infrastructure including the national airline Aeroflop- are an extreme embarrassment to the bunker Tsar.
https://x.com/Beefeater_Fella/status/19 ... 2368562306
Ainus, mida me ajaloost õpime, on see, et keegi ei õpi ajaloost midagi.
Live for nothing or die for something.
Kui esimene kuul kõrvust mõõda lendab, tuleb vastu lasta.
EA, EU, EH
Kasutaja avatar
ruger
Liige
Postitusi: 23396
Liitunud: 04 Juul, 2009 12:29
Kontakt:

Re: Kübersõda ja häkkimine

Postitus Postitas ruger »

orkid on ette võtnud Norra ja Poola kriitilised veesüsteemid

Norras häkiti veehoidla tammi juhtsüsteemidesse
Norway says that in April, hackers took control of the digital system of the Risevatnet dam in Bremanger. For four hours, the valves were fully open, releasing nearly 500 liters per second before the breach was discovered and stopped. They now believe pro-Russian hackers were behind it.

Authorities say the purpose of such attacks is not necessarily to destroy, but to influence, create fear, and demonstrate capabilities. The goal is to weaken Norway and other Western countries through disruption and unrest.

Officials describe the situation as unpredictable. They warn that Russia is likely to carry out multiple cyber operations against various European targets in the future.

Norwegian authorities stress that Norway is not at war, but warn Russia views itself in permanent conflict with the West. Officials say Russia remains the country’s biggest threat and seeks long-term influence and destabilization.

It’s kind of funny how we downplay the threat, especially after high-profile targets like the CEO of Rheinmetall were targeted months ago. I’m not saying go to war with Russia, but come on, wake up.
https://x.com/InsiderGeo/status/1955655163726676278
https://www.tv2.no/direkte/jpybz/siste- ... -bremanger

Poolas rünnati küberrünnakuga suurlinna veepuhastussüsteemi
Digitaalasjade minister ütles, et Poola nurjas ulatusliku Venemaa küberrünnaku linna vee-infrastruktuurile, hoiatades, et riik seisab silmitsi umbes 300 sellise rünnakuga päevas. Ametnikud süüdistavad Venemaa luureteenistusi ka Poola-Ukraina suhete pingestamisele suunatud sabotaažiaktide korraldamises, sealhulgas Teise maailmasõja mälestusmärkide vandaliseerimises. Peaminister Donald Tusk hoiatas, et Moskva kasutab Poola õõnestamiseks kübersõda, provokatsioone ja poliitilist infiltratsiooni.
https://tvpworld.com/88336557/poland-fo ... inian-ties
A large Polish city could have had its water supply cut off on Wednesday as a result of a cyberattack, a deputy prime minister said after the intrusion was foiled.
In an interview with news portal Onet on Thursday, Deputy Prime Minister Krzysztof Gawkowski, who is also digital affairs minister, did not specify who was behind the attack or which city was targeted.
Poland has said that its role as a hub for aid to Ukraine makes it a target for Russian cyberattacks and acts of sabotage. Gawkowski has described Poland in the past as the "main target" for Russia among NATO countries.
Gawkowski told Onet that the cyberattack could have meant there would be no water in one of Poland's big cities.
"At the last moment we managed to see to it that when the attack began, our services had found out about it and we shut everything down. We managed to prevent the attack."
https://www.reuters.com/en/poland-foile ... 025-08-14/
Ainus, mida me ajaloost õpime, on see, et keegi ei õpi ajaloost midagi.
Live for nothing or die for something.
Kui esimene kuul kõrvust mõõda lendab, tuleb vastu lasta.
EA, EU, EH
Vasta

Kes on foorumil

Kasutajad foorumit lugemas: Registreeritud kasutajaid pole ja 1 külaline