

The Vulkan files, which date from 2016 to 2021, were leaked by an anonymous whistleblower angered by Russia’s war in Ukraine. A file explaining the software states: “The level of secrecy of processed and stored information in the product is ‘Top Secret’.” A third Vulkan-built system – Crystal-2V – is a training program for cyber-operatives in the methods required to bring down rail, air and sea infrastructure. Codenamed Scan-V, it scours the internet for vulnerabilities, which are then stored for use in future cyber-attacks.Īnother system, known as Amezit, amounts to a blueprint for surveilling and controlling the internet in regions under Russia’s command, and also enables disinformation via fake social media profiles. One document links a Vulkan cyber-attack tool with the notorious hacking group Sandworm, which the US government said twice caused blackouts in Ukraine, disrupted the Olympics in South Korea and launched NotPetya, the most economically destructive malware in history. A diagram showing a Vulkan hacking reconnaissance system codenamed Scan, developed since 2018. Join us now with our Free CTI Edition and join our mission by clicking here.

SOCRadar aims to detect leaked data and inform the victim before an incident becomes a disaster. With the Dark Web Monitoring module, SOCRadar will instantly inform you about what is happening in Telegram channels, what hackers are talking about on dark web forums and cyber security incidents against your digital assets.įurthermore, SOCRadar monitors the Dark Web about leaked data and releases news about them instantly on the Dark Web News module. Long story short, Telegram has become a private shelter for threat actors across the web. Use telegram bots to deliver malicious software to more device.Form VIP groups where they receive periodic fees to get in and periodically share their leaks.Start auctions for selling some high-value information.

