SITREP - Independent OSINT Channel
23.9K subscribers
16.2K photos
9.78K videos
6 files
22.2K links
AI, technology, mass surveillance, and intelligence β€” everything you need to know about tomorrow.
Download Telegram
πŸ“· Smartglasses: Third-Party Surveillance Access

Smartglasses with embedded cameras and microphones have reached mainstream consumer adoption. According to EFF's analysis, visual and audio data captured by these devices is not always accessible only to the device owner β€” third-party access represents a structural feature of current implementations, not an edge case.

The pattern fits a broader trajectory in which consumer hardware functions simultaneously as personal technology and passive collection infrastructure. Embedded sensors in wearables extend ambient data capture to environments previously outside the reach of fixed surveillance systems.
Forwarded from Rybar in English
πŸ“Gold Goes Into BattleπŸ“
on Turkey's dilemma due to the Middle East crisis

Dark times have come for Turkey's economy. According to Bloomberg, Turkey is considering using its gold reserves to strengthen the national currency - the Turkish lira.

πŸ”»What do they have in reserves?
β–ͺ️Turkey has $189 billion in financial assets, including $135 billion in gold and $47.8 billion in foreign currency.
β–ͺ️Turkey may use assets held abroad, like the $30 billion in gold stored at the Bank of England.


Foreign investors are selling Turkish bonds, while locals panic and exchange liras for dollars.

πŸ–Why the panic? High inflation and capital flight from the Middle East crisis.

🚩Inflation reached 31.5% in February, with worse expected in March.

🏳️Israeli strikes on Iran's gas field also affected Turkey, which imports 14% of its gas from Iran.

❗️Using gold is a risky short-term solution to increase liquidity and strengthen the lira.

πŸ“High-resolution infographic
πŸ“English version

#UK #Iran #Turkey
✈ RU | ✈ EN | βœ‰ MAX
βœ‰οΈ VK | βœ‰οΈ RuTube | βœ‰οΈ OK | βœ‰οΈ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ” Iran School Strike: Two Waves Confirmed

Open-source video analysis indicates at least two distinct waves of strikes were carried out in the area surrounding an IRGC complex in Iran, with an adjacent girls' school struck in the process. The multi-wave pattern suggests deliberate sequencing rather than a single targeting event.

Structurally, dual-wave strikes are consistent with a primary strike followed by a secondary strike timed to hit responders or assess damage β€” a tactic documented in other theater operations. The proximity of the school to the IRGC facility places it within the blast and fragmentation radius of a compound-targeted strike package.

πŸ›°οΈ Open sources - closed narratives
@sitreports
Forwarded from Rybar in English
Media is too big
VIEW IN TELEGRAM
πŸ“How FPV Drones Destroyed Logistics on the DniproπŸ“

Drone dominance over the battlefield has become a harsh reality: it might even seem like it was always this way. But there was a moment that served as the starting point for such radical changes in military affairs?

Yes, there was. And while several episodes claim credit for it, one of the most striking is the repulsion of the AFU landing on the Kherson direction in autumn 2023, where the enemy listened to the British and decided to force a crossing of the Dnipro.

And at first, the enemy was even succeeding, aided by long-range artillery, fast boats and other factors. But everything changed when FPV drone crews with "Upyr" began operating in the sector.

About how unmanned aircraft managed to destroy Ukrainian logistics on the Dnipro and disrupt the AFU's plan β€” in our new video.

πŸ“@rybar_tactical

πŸ’Έ Support us Original msg
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ” US, UK Seek AUV Counter-Drone Tech

US and UK forces have issued a joint tender for technology to counter autonomous underwater vehicles, with a submission deadline of April 3. The accelerated timeline indicates operational urgency rather than routine procurement.

The tender is a direct response to the proliferation of underwater attack drones observed during the Iran conflict. The compressed acquisition cycle suggests existing allied capabilities are assessed as insufficient against the threat profile currently in theater.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” Army Integrates C2 Into Squad Vehicles

The U.S. Army is soliciting industry to integrate command and control systems onto Infantry Squad Vehicles, pushing digital C2 capability down to the squad level.

The move reflects a structural shift in Army doctrine toward distributed command at lower echelons. Embedding C2 into light, mobile platforms reduces dependence on higher-echelon nodes and increases autonomous operational capacity at the small-unit level.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ“± TA446 Weaponizes Leaked iOS Exploit

On March 26, threat actor TA446 deployed the DarkSword exploit kit against iOS devices through targeted spear-phishing operations. The kit, previously leaked, was adapted for active use, prompting Apple to issue threat notifications to affected users.

TA446's use of a leaked commercial toolkit indicates a shift in operational procurement β€” sourcing capabilities from secondary leak channels rather than direct development or licensed vendors. This lowers the barrier for deployment while complicating attribution through shared tooling across multiple actors.

The campaign extends the pattern of mobile-focused espionage operations, where iOS device integrity is treated as a primary attack surface rather than a hardened perimeter.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” EC Confirms AWS Infrastructure Breach

The European Commission confirmed a cyberattack on its cloud-based infrastructure after an AWS account compromise was identified. The intrusion vector β€” a single cloud account β€” provided access to Commission-hosted systems, indicating credential-level exposure rather than a perimeter failure.

Cloud account compromise is a recognized initial access method allowing lateral movement across shared infrastructure. A breach at credential level in a major institutional AWS environment carries wider access implications depending on account permissions and cross-service configurations.

πŸ›° Open sources - closed narratives
@sitreports
πŸ€– Iran Leads AI Propaganda Output

Iranian state-linked actors have expanded AI-generated content operations, producing volume-based influence material at a pace that outpaces Western countermeasures, according to this analysis. The operational model prioritizes quantity over production quality, flooding target audiences with low-fidelity but high-frequency messaging.

The approach reflects a structural asymmetry: AI generation tools lower the cost of content production to near zero, allowing smaller state actors to sustain information campaigns that previously required significant infrastructure. Cohesion within domestic and diaspora audiences appears to be the primary target metric, not external persuasion.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” VoidLink Rootkit Targets Linux Via eBPF

VoidLink is a cloud-native Linux malware framework combining kernel modules with eBPF hooks to achieve persistent, low-visibility presence on compromised systems. The hybrid rootkit architecture allows it to intercept system calls and manipulate kernel-level telemetry, making standard detection methods ineffective against active infection.

The use of eBPF β€” a legitimate Linux kernel subsystem β€” as an evasion layer follows a documented shift in offensive tooling toward abusing trusted OS primitives. This approach reduces the rootkit's detectable footprint while maintaining deep system access, a pattern consistent with tooling designed for long-duration infrastructure implants rather than opportunistic compromise.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” Telnyx PyPI Package Backdoored, Steganography Used

The TeamPCP group compromised the official Telnyx package on the Python Package Index, uploading malicious versions that embed credential-stealing malware inside a WAV audio file. The supply chain attack uses steganography to conceal the payload, reducing detection probability at the network and static analysis layers.

The operation follows an established pattern of targeting trusted open-source packages with high developer adoption rates. Compromising a communications library such as Telnyx increases the likelihood of deployment in production environments with access to credentials and API keys.

πŸ›°οΈ Open sources - closed narratives
@sitreports
We now have a channel on X

https://x.com/two_majors

✨So that even Elon Musk knows what we think of him...

⚑️Two Majors
Please open Telegram to view this post
VIEW IN TELEGRAM
Recommending COMBATE | Uphold Reality for anyone following geopolitics beyond the CNN lens.

Unfiltered and ahead of the curve. The Iran war, West Asia, Latin America, and the broader geopolitical shift β€” with footage and analysis you're not getting from legacy media.

Subscribe
πŸ‘‰ t.me/uphold_reality
πŸ‘‰ x.com/upholdreality
πŸ” ShinyHunters Claims Commission Breach

ShinyHunters has claimed responsibility for a breach of the European Commission, with reported data dumps said to include content extracted from internal mail servers. The claim has not been independently verified by the Commission.

ShinyHunters is a persistent threat actor with a documented record of large-scale credential and data exfiltration operations across multiple sectors. Targeting institutional mail infrastructure indicates an intent to acquire correspondence, credentials, or metadata useful for follow-on operations rather than simple data resale.

πŸ›° Open sources - closed narratives
@sitreports
πŸ” Handala Breaches FBI Director's Email

Iran-linked Handala Hack group breached the personal email of the FBI Director and conducted a wiper attack against defense contractor Stryker, according to reporting on the intrusions. The operations occurred alongside U.S. seizures of Ministry of Intelligence and Security-linked domains.

The combination of personal account compromise and destructive payload deployment against a defense-sector target reflects a dual-track approach: intelligence collection paired with disruptive action. Wiper deployment against Stryker indicates escalation beyond reconnaissance into operational degradation.

Handala has previously targeted Israeli and Western entities with leak-and-destroy operations. The timing relative to the MOIS domain seizures suggests the intrusions function partly as retaliatory signaling at the infrastructure level.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” Apple Pushes Lock Screen Exploit Alerts

Apple has begun delivering lock screen warnings to users of unpatched iPhones and iPads, directing them to install software updates in response to active web-based exploits. The lock screen warnings represent a shift in Apple's patch-urgency signaling β€” moving notification from settings menus to the device's primary interface layer.

Delivering security alerts at the lock screen level maximizes exposure to users who may not monitor system notifications or update prompts through standard channels. The method indicates Apple is treating the unpatched population as an active attack surface requiring direct intervention rather than passive update availability.
πŸ“§ FBI Director's Email Compromised

The FBI has confirmed that the personal email account of Director Kash Patel was breached by Handala, a hacker group linked to Iran. The attackers published extracted photos and documents from the inbox.

The operation follows Handala's established pattern of targeting senior U.S. officials through personal rather than government infrastructure, where institutional security controls are absent. Personal accounts of high-value targets consistently represent the lowest-resistance vector for state-affiliated actors.

πŸ›°οΈ Open sources - closed narratives
@sitreports
Forwarded from Rybar in English
πŸ“Another spy β€” on his way outπŸ“

It seems time for British press releases, as another one of their intelligence officers has been exposed on Russian territory.

➑️During counterintelligence operations, the FSB uncovered a representative of British intelligence β€” Janse Van Rensburg Albertus Gerardus.

He worked in Russia under cover of a position as Second Secretary of the British Embassy in Moscow, deliberately providing false information when obtaining entry permission.

The Briton conducted intelligence and sabotage activities and attempted to obtain sensitive information during unofficial meetings with Russian economic experts.

Now the spy has been stripped of diplomatic accreditation and must leave Russian territory within two weeks, and Britain's ChargΓ© d'Affaires Deyni Dolakia has already been summoned to the Russian Foreign Ministry building.

πŸ–Russian intelligence services previously exposed an entire network of British intelligence officers on Russian territory who were coordinating sabotage activities. Many of them used diplomatic cover, and it was only a matter of time before their colleagues would be identified.

❗️Albertus Gerardus is yet another representative of British diplomacy whose entire function in Russia has been built around ensuring systematic destructive activities.

Given current trends in relations between the countries, intelligence services have much work ahead on this front. However, it is important to remember that amid mounting pressure specifically on British spies and diplomats, British representatives will seek ways to exert influence through intermediaries, such as diplomatic missions of other NATO countries or residencies in the CIS.
#Britain #Russia
✈ RU | ✈ EN | βœ‰ MAX

βœ‰ VK | βœ‰ RuTube | βœ‰ OK | βœ‰ Zen

πŸ’ΈSupport us Original msg
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ“± TA446 Deploys iOS Exploit Kit

Russia-linked APT TA446 is running targeted phishing campaigns against iPhone users using the DarkSword iOS exploit kit, according to reporting by Security Affairs. The operation combines a platform-specific exploitation framework with social engineering delivery β€” a pairing that indicates deliberate targeting rather than opportunistic access.

TA446's use of a dedicated iOS toolkit marks a shift from generic credential phishing toward device-level compromise. Deploying platform-specific exploit infrastructure against mobile targets reflects resource investment consistent with state-sponsored collection priorities.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” Three Chinese Clusters Hit SEA Government

Three China-linked threat clusters conducted a coordinated 2025 cyber campaign against a Southeast Asian government, deploying multiple malware families to establish and maintain persistent access across targeted networks.

The simultaneous involvement of three distinct clusters points to a compartmentalized operational structure rather than a single actor β€” a pattern consistent with tasked collection efforts against a priority government target, where parallel intrusion teams reduce single-point-of-failure risk and expand access surface.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” European Commission Confirms Europa.eu Breach

The European Commission has confirmed a data breach affecting its Europa.eu web platform following a cyberattack claimed by the ShinyHunters extortion group. The Commission acknowledged the incident after the threat actor publicly asserted responsibility.

ShinyHunters has a documented history of high-volume credential and database exfiltration across commercial and institutional targets. A confirmed breach of an EU Commission-linked platform indicates successful external access to infrastructure operated by a primary executive body of the European Union.

πŸ›°οΈ Open sources - closed narratives
@sitreports