Connect with us

Breaches

Hacked Ukraine Military Documents Spell Out Disastrous Situations

Published

on

The hacker group known as Cyber Berkut gained access to a computer belonging to a chief military prosecutor on January 28, grabbing documents that show that Ukraine is not in good shape.

Author’s Note: The leaked documents have not been verified as official documents. The article is marked as a rumor for this reason.

The documents spell disastrous situations for the Ukrainian army in their fight for freedom, even though the government seems to be spinning the story the opposite way. Among cries of positive gains, the documents show that troops are demoralized, with recruits fleeing to Russia.

What’s worse, the numbers of death are staggering compared to the official reports from the Ukranian government. On Jan. 25, Lieutenant General Sergei Popko restricted transmissions of information recording losses in battles. As the documents show, the recent battles in Donbass were severely underreported in losses by tens to hundreds of times more.

Documents Show Ukraine Soldiers Fleeing Battle

UkraineWhen publishing the documents, Cyber Berkut gave the following statement. Originally written in Ukrainian, Hacked translated the words into English as best as possible:

“The troops are demoralized and surrendering, no reserves, mobilization slips, recruits fleeing to Russia and the West. In a panic command ATO publishes insane orders, forms in the rear detachments, throws into senseless attack on a well-prepared defense militias inexperienced young men.”

According to the documents, drafted soldiers are either fleeing from battle or surrounding immediately to the Russian opposition.

In addition, one of the letters outlines that more than 12,600 crimes have been recorded for the illegal handling of weapons, ammunition and explosives. The cause? The Ukraine military is failing to keep a correct account of their weapons.

The misappropriation of facts is a military practice that’s not knew – the United States also underreported many deaths in the Vietnam War. But the flooding of unaccounted weapons to the people of Ukraine is highly dangerous and may result in more uprisings across the board.

All of the files can be found on Cyber Berkut’s official website.

Photograph from Wikimedia Commons and image from Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

Clay Gillespie a writer and reporter for many different platforms across the tech industry. He holds a B.S. in Public Relations from Ball State University, and freelances for different clients in technology and cryptocurrency. For more information, visit his personal website, claygillespie.com.




Feedback or Requests?

17 Comments

17 Comments

  1. Infinite Wealth

    February 7, 2015 at 2:58 pm

    Why is there even any conflict. Do people think they are fighting over money? Doesn’t everyone realise actually that everyone is fighting to own more debt. Everything we see around is is debt, and everything belongs to the universe. We really need to change the way humans perceive each other and just exactly that money is a fabricated item that is selling debt to you, there are ways in which to change this. Very disappointed at the need to militarise arguments, if the legal system was fair there wouldnt be this sort of problem.

    This is EXACTLY why moving all money to the blockchain, and having unobtrusive transaction and movement tracking are essential, once data is on the blockchain it CANNOT be modified so it is time-stamped evidence, that is why Bitcoin and the Blockchain are so important for human safety and future peace.

    We MUST ensure that the Blockchain is utilised in as much politics, finance and law as much as possible in the future to protect ourselves from laws and government (smiling terrorists?).

    • Artur Denysenko

      February 7, 2015 at 3:07 pm

      To get to roots of conflict refer to Putin with his “Great Russia”, Miloshevich with his “Great Serbia” and Hitler with his “Great Germany” 😉

    • Notforgotten

      February 12, 2015 at 1:57 am

      Are you a complete idiot? How can you possibly get to the conclusion that the solution is to move off of the “cotton standard” and onto the blockchain? This conflict has very little to do with money nor monetary gain. This conflict is about sovereignty, self rule, and global power positioning.

  2. Artur Denysenko

    February 7, 2015 at 3:05 pm

    Cyber Berkut is a Russian “hacker group” propaganda group. It’s as truthful as RussiaToday 😉

    • CryptoReporter

      February 7, 2015 at 3:11 pm

      Or as truthful as Poroshenko.

    • Jo

      February 7, 2015 at 3:13 pm

      Thanks for letting us know and helping us put this article into perspective.

      • CryptoReporter

        February 7, 2015 at 3:42 pm

        Documents, smockuments. If you want the real truth I will tell you the truth. I have spent a lot of time in the region and one thing is VERY clear is that western Ukrainians (latin rite christians/polish) HATE WITH PASSION eastern Ukrainians (orthodox christians/russian). Whenever I went to government offices for documents, If we did not speak Ukrainian (official language) and instead spoke Russian influenced Ukrainian we were immediately treated differently. Here in America when looking for a church for my family we ended up a Ukrainian Catholic church and they welcomed us with open arms into their small community until we were spat on and yelled at after the service once they understood we were from eastern Ukraine. So much for Christianity?!

        While in general, most Ukrainians are warm hearted people, Ive NEVER experienced such crap treatment in Russia or from Russians anywhere.

        I now have one dead relative thanks to this war and one missing. My uncle is missing for a week now and my cousins wife (21 yrs old) was shot in the head a month after having their first baby. The rest of my family has fled to Moscow. I have one cousin and his newborn stuck with bombs and artillery all day long because he cannot obtain documentation for his newborn. Will they survive?

        This war began when western funded people formed a coup and toppled the democratically elected president of Ukraine. Agreed, he wasnt a good president, but he was elected into office. The Yatsenyuk government took over which was funded in part by Poroshenko’s money (he was a major monetary contributor of the revolution) and the West. After the dust settled an “election” took place last May and many eastern Ukrainians were blocked from voting just exactly what happened to them during the Orange revolution a few years back. It was a sham election that western nations said was honest. The winner? Poroshenko, the oligarch who helped fund the revolution in the first place.

        • solid12345

          February 7, 2015 at 4:47 pm

          Heh I’m American but took a few hours of Russian in college, I was invited to a party full of Russians once and witness to a Ukrainian man debating with 3 other Russians and it about turned into a fist fight. I think it’s like Israel & Palestine, you just need to make a clear line in the sand and say, “ok, this is your side and this is my side” and leave it at that.

          • CryptoReporter

            February 7, 2015 at 7:07 pm

            Its probably for the best that the two sides just realize the differences and divorce from each other. Whats stupid to me is they are all Slavic.

          • silverdr

            February 10, 2015 at 5:51 pm

            That’s how it was for some good years.

        • Artur Denysenko

          February 9, 2015 at 8:17 am

          It’s and old ferry-tell about the Evil West toppled a “good tzar”, russophobes killing Russians, and Good Russia that has nothing to do with death.

          This ferry-tell is told for the every war Russia gets into: http://en.wikipedia.org/wiki/List_of_wars_involving_Russia#Russian_Federation_.281991.E2.80.93present.29

          I would recommend this reading: http://skibinsky.com/no-russian

  3. Ghosty

    February 7, 2015 at 3:52 pm

    As a species we need to let go of hate… It has been said that hate is like holding onto a burning hot stone with the intent to throw it at another… You are the one who gets burned…

    We are all connected… Unity consciousness is the only way out of this mess we have created!

    • Flash Reiker

      February 7, 2015 at 4:50 pm

      @Ghosty, thanks Mom. I’m sure Mankind will get right on that.

      • Ghosty

        February 7, 2015 at 5:48 pm

        No… Mankind is insane so I’m sure it won’t at least not in the short term… But some can see the forest through the trees…

  4. Doom Sternz

    February 8, 2015 at 3:05 am

    No surprise here. Ukraine has been as still is the most corrupt country in the world. The US is probably the second most corrupt country in the world.

    In an interview with CNN’s Fareed Zakaria, Barack Obama acknowledged that the United States had “brokered a deal to transition power in Ukraine,” thus admitting to the highest level of democratic impropriety imaginable.

    The Ukrainian Government’s problem in implementing Obama’s planned genocide of the Donbass, is that there just aren’t enough Nazis, and there’s also not enough money, to do the amount of killing that needs to be done in order to enable Obama’s Ukrainian regime to retain the land in Donbass while eliminating the people there.

    Washington and Kiev partner in each other’s crimes against humanity. One fascist regime supports another. And the real reason why Obama’s war in Ukraine is failing is that there just is not enough blood-lust for the task, either in Ukraine, or in “the West.”. Obama has over-reached, when he overthrew Ukraine’s democratically elected President.

  5. Nmeofthestate

    February 16, 2015 at 3:18 pm

    “Ukrainian army in their fight for freedom”. Yeah, right. Get a clue. Nobody but the USG and the hardcore NAZIS (or do I repeat myself) that the USG installed in a well documented coup, want this to be a shooting war. That’s why something like 7% of those drafted showed up, and the rest have gone into hiding or fled.

    https://www.youtube.com/watch?feature=player_embedded&v=PQjmwVC_Dts

You must be logged in to post a comment Login

Leave a Reply

Altcoins

Crypto-Security Testnet Surpasses Key Milestones

Published

on

Security and has been combined with micro-compucomputing are a combination which ascended to greatly relevant, both economically and financially, since the early days of commercial internet technology, the John McAfee associated era of anti-virus software, and fears of ‘millennium-bug’ (‘Y2K’)-induced societal meltdowns.

As a market player, ‘cybersecurity‘ is hailed for its continuedvalue and growth, with recent implementations advancing in tandem with technological development. With ‘blockchain’ having become a key buzzword in recent years, it comes as little surprise that digital security providers have been attempting to identify and provide protection against cryptocurrency related scams.

Examples of these include ‘malware‘ AKA ‘malicious software’. They are often created with the aim of illicitly subvert the processing power of the victim’s device for use towards the mining of cryptocurrencies, or lock and potentially delete highly sensitive data (such as Ransomware’).

Cybersecurity and Blockchain

Crypto attacks can affect almost any person or institution: from private wallets and exchanges, to cryptocurrency operators, and even sometimes unsuspecting users of internet browsers with no relation to blockchain based services.

In an article published at CCN in August 2018, I wrote about the large prolificity and news coverage of cyber-attacks carried out against cryptocurrency organisations: with a majority of them involving the theft of high-value quantities of tokens or sensitive data.

Key points raised in the piece include the identification of wallets and exchanges as high-value targets for potential thieves, as well as a discussion surrounding a study of over 1000 participants in which none of the top exchanges were “lauded for security”.

As cybersecurity has been exposed as a fatal flaw in the unauthorised access / theft access of finances and data, it has also drawn a spotlight on the various methods employed by the companies which suffer these attacks.

Middleware, Wear and Tear

Some teams attempt to protect their data and finances through the creation and implementation of their own proprietary cybersecurity solutions whilst others seek the tender of others,

‘Middleware’ is nothing new and has long been utilised as a means of implementing third-party solutions as a means of shifting professional a legislative liability regarding essential functions of a brand technology.

It’s a creation by third party product / service providers that sits between external and internal code in order to facilitate functions or protections.

Decentralized Security Testnet

REMME is a project harnessing blockchain technology to create a distributed cybersecurity solution for enterprises.

Its now-released testnet has already demonstrated the efficacy of storing hashed Public Key Infrastructure certificates on the blockchain, and with 300 pilot program participants signed up, REMME isn’t short of applicants eager to trial its distributed identity and access management solution.

‘Distributed Identity and Access management’ (IAMd) and ‘Public Key Infrastructure’ requests (PKId) count amongst two of the primary features of the proprietary REMChain testchain network infrastructure. Both claims of which have come from CEO Alex Momot, who additionally praised “The interoperability of the public blockchain and sidechains”.

Additional features include the ‘REMchain block explorer’ – ‘node monitoring’ (connected to five nodes worldwide) – REMME WebAuth demo application.

While a pilot program reportedly attracting over 300 global enterprise applicants, REMME feels confident about the future of their long terms plans: which include full integration existing enterprise systems (ERP, CRM, Accounting software etc.).

Featured image courtesy of Shutterstock. 

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
3 votes, average: 4.33 out of 53 votes, average: 4.33 out of 53 votes, average: 4.33 out of 53 votes, average: 4.33 out of 53 votes, average: 4.33 out of 5 (3 votes, average: 4.33 out of 5)
You need to be a registered member to rate this.
Loading...

4.5 stars on average, based on 12 rated posts




Feedback or Requests?

Continue Reading

Breaches

MyEtherWallet Compromised in Security Breach; Users Urged to Move Tokens

Published

on

Popular cryptocurrency service MyEtherWallet (MEW) is urging users to move their tokens after the platform succumbed to its second cyber attack of the year. As the company reported earlier, hackers targeted MEW’s popular VPN service in an attempt to steal cryptocurrency.

Hola VPN Users Compromised

Rather than target MEW directly, hackers took control of the Hola VPN service, which claims nearly 50 million users. For the next five hours, MEW users who had the Hola chrome extension installed and running on their computer were exposed.

MEW took to Twitter to urge users to move their funds immediately.

“Urgent! If you have Hola chrome extension installed and used MEW within the last 24 hrs, please transfer your funds immediately to a brand new account!” the company said. It added the following message shortly thereafter:”We received a report that suggest Hola chrome extension was hacked for approximately 5 hrs and the attack was logging your activity on MEW.”

At the time of writing, MEW’s Twitter feed had no further updates.

MyEtherWallet is used to access cryptocurrency wallets, where users can send and receive tokens from other people.

The company reportedly told TechCrunch that the attack originated from a Russian-based IP address.

“The safety and security of MEW users is our priority. We’d like to remind our users that we do not hold their personal data, including passwords so they can be assured that the hackers would not get their hands on that information if they have not interacted with the Hola chrome extension in the past day,” MEW said, as quoted by TechCrunch.

It’s not yet clear how many users were compromised in the attack or how much, if any, was stolen from their wallets. MEW suffered a similar incident in February after a DNS attack wiped out $365,000 worth of cryptocurrency from users’ accounts.

Cyber Attacks on the Rise

The attack on MEW came less than 24 hours after Hacked reported another major cyber breach involving Bancor, a decentralized cryptocurrency exchange. The security breach compromised roughly $23.5 million worth of digital currency, including Ethereum, NPXS and BNT, Bancor’s native token.

Last month, a pair of South Korean exchanges fell prey to cyber criminals, prompting local regulators to expedite their approval of new cryptocurrency laws.

It has been estimated that a total of $761 million has been stolen from cryptocurrency exchanges in the first half of the year, up from $266 million in all of 2017. That figure is expected to rise to $1.5 billion this year.

CipherTrace, the company behind the estimates, told Reuters last week that stolen cryptocurrencies are mainly used to launder money and aid criminals in concealing their identities.

Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading.

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
2 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 52 votes, average: 5.00 out of 5 (2 votes, average: 5.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.6 stars on average, based on 647 rated postsSam Bourgi is Chief Editor to Hacked.com, where he specializes in cryptocurrency, economics and the broader financial markets. Sam has nearly eight years of progressive experience as an analyst, writer and financial market commentator where he has contributed to the world's foremost newscasts.




Feedback or Requests?

Continue Reading

Breaches

Mt. Gox vs. Bithumb: That Was Then, This Is Now

Published

on

Bithumb now shares something in common with the Tokyo-based shuttered bitcoin exchange Mt. Gox — both suffered a hack on about the same date, June 19. It’s a club that no exchange wants to belong to and that Bithumb happened on the seven-year anniversary of Mt. Gox’s maiden attack has to be more than an eerie coincidence.

It’s a stark reminder of the risks involved with keeping funds on an unregulated exchange, vulnerabilities that cost South Korea’s Bithumb some $36.6 million in digital cash and Mt. Gox $450 million in hacked bitcoin and its future. The Mt. Gox theft unfolded over a series of hacks that culminated in 2014. Though it’s still early on in the Bithumb hack, it appears the South Korean exchange will recover from the security breach. So what do we know now that we didn’t on June 19, 2011?

Then vs. Now

Former Coinbase official Nick Tomaino, who is also the founder of crypto fund 1 confirmation, reflected on the Mt. Gox hack in what proved to be a prescient tweet given the Bithumb attack that was about to surface.

The thing to note about Mt. Gox is that the Japan-based exchange in 2011 controlled most of the BTC trading volume, approximately three-quarters of it by average estimates — more if you ask Tomaino. Since bitcoin fever caught on in 2017, there are more than 500 cryptocurrency exchanges on which trading volume is shared. Binance boasts the highest trading volume and captures nearly 15% of bitcoin trading. It’s much less than Mt. Gox days but still a little high.

The other thing to note is that the Mt. Gox hack or actually hacks, as there were multiple attacks on the exchange over several years, was a mysterious event that was shrouded in controversy and mistrust of a key executive. Bithumb, on the other hand, confronted the hack seemingly right away on Twitter and has not let any grass grow under its feet in the interim, which is a key difference in the way Mt. Gox was handled.

Also, the bitcoin price didn’t tank in response to the Bithumb hack. It traded lower for a while, but less than 24 hours it was back in the green, which is a reflection of the fact that bitcoin trading is no longer dependent on a single exchange.

Charlie Lee, creator of Litecoin (LTC), the No. 6 cryptocurrency by market cap, was among the first to respond to the Bithumb hack. He tweeted:

Indeed, Bithumb does expect to be able to cover the losses via their reserves.

Crypto Security

It’s still early on in Bithumb’s security breach, and more details are sure to emerge in time. In the meantime, it’s a good idea to use the hack as an opportunity to examine the security of your cryptocurrency investment portfolio. There are several hardware wallet options out there for you to choose from — whether it’s Trezor or Ledger Nano S, to name a couple — and as Charlie Lee advised, “only keep on exchange coins that you are actively trading.”

Featured image courtesy of Shutterstock.

Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink.

Rate this post:

Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way.
0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...

4.6 stars on average, based on 69 rated postsGerelyn has been covering ICOs and the cryptocurrency market since mid-2017. She's also reported on fintech more broadly in addition to asset management, having previously specialized in institutional investing. She owns some BTC and ETH.




Feedback or Requests?

Continue Reading

Recent Comments

Recent Posts

A part of CCN

Hacked.com is Neutral and Unbiased

Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com.

Trending