KibOrg News

From Wikipedia, the free encyclopedia

KibOrg is a project of journalists and IT professionals who have united under the name of legendary cyborgs to fight the aggressor in the information space. The project was founded in early 2022. The only public member to date is journalist Maksym Dudchenko.[1]

General information[edit]

The kiborg.news website was created long before Russia's full-scale armed aggression, but the activity of the participants intensified in the summer of 2022. The most high-profile information operations conducted under the project began to be published online at the end of 2022.[2] KibOrg IT specialists conducted a series of defeats of the occupation portals of the occupied parts of Zaporizhzhia and Crimea.[3] They also carried out hacker attacks on Russian government organizations, such as Roskomnadzor and the Ministry of Digital Development, Communications and Mass Media.

KibOrg is known to be working closely with the volunteer organization Inform Napalm, the Peacemaker Center, hacktivists from the Ukrainian Cyber Alliance, RUH8, hacktivists from the Cyber Resistance team, and Ukrainian law enforcement agencies. The exact number of project participants remains classified to this day.

The most famous KibOrg operations[edit]

Hacking of Boris Rapoport Crimean Tatar ATR[edit]

The KibOrg website published a series of articles based on the materials of the mail dump of Boris Rappoport,[4] who worked in the Russian Presidential Administration under the leadership of Vladislav Surkov and Sergey Kiriyenko. The KibOrg materials reflected the organization of pseudo-democratic processes inside Russia (referendum, elections), interference in international affairs, and information methods used to manipulate the Russian population. The analysis of Rapoport's materials was continued by the Myrotvorets Center, which revealed Surkov's preparations for the seizure of Ukraine (late 2013/early 2014), work with agents in Ukraine and abroad, including a series of articles about Kazbek (Andriy Portnov).[5]

Interception of Russian FSB documents in Crimea[edit]

In December 2022, the KibOrg team published intercepted documents related to the activities of the Russian FSB in (illegal) Russian annexed Crimea.[6] The article contains evidence that the FSB has massively nationalized property on the peninsula. In addition, the obtained documents contain the addresses of the headquarters of the Russian special service, barracks, administration buildings, etc. In addition to office space, a large number of apartments were transferred to the possession of the Russian FSB in Crimea. The KibOrg team revealed their location and de-anonymized FSB officers stationed on the peninsula.

Hacking of Roskomnadzor[edit]

In March 2023, KibOrg News gained access to Roskomnadzor's database of more than 500 gigabytes. It also gained access to the correspondence of employees of the punitive agency that performs censorship functions in relation to the media and the Internet.[7] The officers of the Department of the Federal Service for Supervision of Communications, Information Technology and Mass Media in the Republic of Crimea and the city of Sevastopol, who supervised pro-Ukrainian opposition publications such as the Center for Investigative Journalism, Krym.Realii and the, were identified. Also published were references to the opposition Russian politician Alexei Navalny and correspondence between Russian authorities and foreign platforms regarding the blocking of Russian propaganda films and Ramzan Kadyrov's Instagram account. Roskomnadzor's database was made publicly available on the KibOrg News Telegram channel in May of the same year.[8]

Hacking of the Russian-Iranian videoconference of the Institute of CIS countries[edit]

KibOrg News, in cooperation with Ukrainian prankster Yevgeny Volnov, gained access to a seven-hour Russian-Iranian conference of the Institute of CIS countries in April 2023.[9] After joining the conference, Volnov, under the fictitious name Simindey V.V., "thanked" the participants for their "meaningful speeches" and the organizers for the alleged "invitation of the Ukrainian side".

Hacking of the Dovzhansky-Novoshakhtynsk customs checkpoint[edit]

On May 2, 2023, KibOrg published a database of the Dovzhansky-Novoshakhtynsk border customs checkpoint,[10] which has been under the control of Russia since 2014 following the outbreak of the War in Donbas. After seizing the Dovzhansky checkpoint, the illegal Russian separatists armed groups of the Luhansk People's Republic and Donetsk People's Republic began to unauthorizedly allow cargo from Russia to pass through. On June 12, 2014, the separatists received heavy armored vehicles for the first time – a convoy of T-64 tanks.

KibOrg News journalists published summary tables for 2015–2017, which confirm the facts of illegal export of Ukrainian coal by Russia. The facts of the export of Ukrainian aircraft engines TV3-117 from the Luhansk Aviation Repair Plant were established. In particular, the employees of the customs office were de-anonymized, and lists of employees of the so-called "State Customs Committee" of the occupied Luhansk region were published.

Publication of personal data of 600 thousand Russian conscripts[edit]

In May 2023, the KibOrg News team gained access to the computers of the Russian Ministry of Digital Development, Communications and Mass Media,[11][12] which, on behalf of the Ministry of Defense, was to send out summonses using the Gosuslugi service. The hackers published a list with personal data of more than 600,000 Russians liable for military service. The table contained SNILS numbers, phone numbers, e-mails and personal information about the residence of those liable for military service.

References[edit]

  1. ^ "Блог автора на Цензор.NET".
  2. ^ "Хто ми? І навіщо ми це робимо". Kiborg News (in Ukrainian). Retrieved 2023-06-03.
  3. ^ blyskavka (2023-03-04). "Окупанти готуються до евакуації у Запорізькій області". Kiborg News (in Ukrainian). Retrieved 2023-06-03.
  4. ^ kiborg (2022-06-01). "Дамп електронної пошти Рапопорта, помічника Суркова і маніпулювання свідомістю людей владою РФ". Kiborg News (in Ukrainian). Retrieved 2023-06-04.
  5. ^ Валентин, Кравченко (2020-07-01). "Агент "Казбек" та його злочини проти України (ч.1)". Myrotvorets News (in Ukrainian). Retrieved 2023-06-04.
  6. ^ Волошко, Василь (2022-12-26). "Імена та адреси — перехоплені таємні документи ФСБ РФ в Криму". Kiborg News (in Ukrainian). Retrieved 2023-06-03.
  7. ^ "Українські розслідувачі отримали 500 Гб даних "Роскомнадзора"". www.unian.ua (in Ukrainian). Retrieved 2023-06-03.
  8. ^ "KibOrg News 🇺🇦". Telegram. Retrieved 2023-06-03.
  9. ^ "Євген Вольнов — Prank Show". Telegram. Retrieved 2023-06-03.
  10. ^ blyskavka (2023-05-02). "Вугілля Донбасу: квиток в один кінець". Kiborg News (in Ukrainian). Retrieved 2023-06-03.
  11. ^ blyskavka (2023-05-15). "KibOrg викладає 1,5 ТБ поштового серверу окупаційних "адміністрацій" Донеччини. Частина 1". Kiborg News (in Ukrainian). Retrieved 2023-06-03.
  12. ^ blyskavka (2023-05-10). "Живі мерці: Росія збирається мобілізувати 600 тисяч громадян". Kiborg News (in Ukrainian). Retrieved 2023-06-03.