SITREP - Independent OSINT Channel
23.9K subscribers
16.2K photos
9.78K videos
6 files
22.2K links
AI, technology, mass surveillance, and intelligence β€” everything you need to know about tomorrow.
Download Telegram
Forwarded from The Islander
Videos have emerged showing Ukranian interceptor drones clashing with Russian Geran drones.

According to media reports, Zelenskyy is asking the UAE and Qatar for between $35 billion and $50 billion to help procure interceptor drones. The only thing is, he didn’t tell his clients that Ukrainian interceptor drones are practically useless.

πŸŽ™Subscribe @TheIslanderNews

Donate - Support Our Work
πŸ” Dutch Finance Ministry Portal Breached

The Dutch Ministry of Finance took its treasury banking portal and associated systems offline following a confirmed breach detected two weeks prior to the shutdown. The delay between detection and public disclosure indicates the ministry conducted initial internal assessment before moving to containment.

The targeted system handled treasury banking functions β€” a segment of government financial infrastructure with direct access to state payment operations. Offline isolation of such portals is standard procedure when the scope of unauthorized access has not been fully determined.
πŸ” Claude AI Locates RCE Zero-Days

Anthropic's Claude model identified critical remote code execution vulnerabilities in Vim and Emacs after being issued a minimal prompt instructing it to locate a file-triggered zero-day. The model proceeded to analyze both editors' codebases and surfaced exploitable flaws without further human guidance.

The result demonstrates that LLM-assisted vulnerability discovery now operates at a functional level with minimal operator input. The ability to surface zero-days from an informal, unstructured prompt compresses the skill threshold required to conduct original security research against widely deployed software.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” Axios npm Compromise Deploys Cross-Platform RAT

Axios versions 1.14.1 and 0.30.4 were trojanized following an npm account compromise on March 31, 2026. The malicious packages injected a dependency β€” plain-crypto-js@4.2.1 β€” which deployed a cross-platform RAT on affected systems.

The attack follows an established supply chain pattern: compromise a maintainer account, push a poisoned version of a widely-used package, and propagate malware through legitimate dependency resolution. Axios is a high-volume HTTP client library with substantial downstream reach across Node.js and browser environments, broadening the potential exposure surface.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” North Korea Poisons Axios npm Packages

Google has attributed a supply chain attack targeting the Axios npm library to North Korean threat cluster UNC1069. Trojanized versions 1.14.1 and 0.30.4 were used to distribute malware designated WAVESHAPER.V2 across multiple operating systems.

The operation follows an established DPRK pattern of embedding malicious code in widely-used open-source packages to achieve broad downstream compromise. Axios is a high-volume HTTP client library, making version-level tampering an efficient vector for reaching targets across disparate development environments.

πŸ›° Open sources - closed narratives
@sitreports
πŸ” TrueConf Zero-Day Hits Southeast Asia

A zero-day vulnerability in TrueConf, tracked as CVE-2026-3502 with a CVSS score of 7.8, has been exploited in targeted attacks against government entities across Southeast Asia. The campaign has been designated Operation TrueChaos by researchers tracking the activity.

The exploitation of video conferencing infrastructure against government targets follows a documented pattern of threat actors prioritizing communication platforms as initial access vectors. A CVSS score of 7.8 indicates high-severity local or network exploitability, consistent with post-authentication or adjacent-network attack chains typically used in targeted intrusion operations.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” Claude Code Source Exposes Data Collection

A source code leak of Anthropic's Claude Code tool has revealed the scope of system and user data the application collects during operation, according to The Register's analysis. The exposed code details telemetry collection covering local system environment, file paths, and session activity transmitted to Anthropic's infrastructure.

The disclosure fits a pattern of AI developer tooling accumulating substantially broader telemetry than disclosed in user-facing documentation. CLI-based coding assistants operate with elevated local permissions by design, creating a collection surface that extends beyond the interaction log into the host system environment.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” Iran Sprays M365, Targets Missile Strike Cities

Iranian threat actors have conducted password-spraying campaigns against Microsoft 365 accounts, with researchers identifying a pattern in the target selection: affected accounts correlate geographically with cities previously hit by Iranian missile strikes.

The overlap between kinetic strike locations and credential-access targets indicates a coordinated intelligence-collection effort running parallel to, or following, physical strike operations. Password spraying against M365 β€” using low-volume attempts across many accounts to avoid lockout β€” is a low-cost, low-signature method suited for sustained access rather than one-time exploitation.

The pattern fits established doctrine of pairing kinetic operations with follow-on signals collection against surviving infrastructure and personnel in the same geographic zones.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ’» Cisco Source Code Stolen via Trivy

A threat actor used credentials obtained through the Trivy supply chain compromise to access Cisco's internal development environment, exfiltrating source code belonging to Cisco and an undisclosed number of its customers.

The incident illustrates how supply chain breaches function as credential harvesting operations with delayed downstream impact. A single compromise in a shared developer toolchain β€” in this case Trivy, a widely used vulnerability scanner β€” yields access to multiple organizations through legitimate-appearing authentication.

For Cisco customers whose proprietary code was stored in the affected environment, the exposure extends beyond the vendor relationship into potential intellectual property and vulnerability disclosure risk.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” Pentagon Advances Drone Swarm Program

The U.S. Department of Defense is preparing a drone swarm testing initiative designated Swarm Forge, classified as one of several pace-setting projects directed by Defense Secretary Pete Hegseth in a departmental memo on AI integration.

The initiative fits a broader DoD pattern of accelerating autonomous systems development under direct secretarial mandate, placing swarm coordination alongside other AI-priority programs at the institutional level. Designating such projects as pace-setters signals resource prioritization and reduced bureaucratic friction in acquisition and testing cycles.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” Pentagon Deploys Bunkers, Tech for Iran

As of March 31, U.S. Central Command has recorded at least 348 U.S. military personnel wounded in the ongoing Iran war. The casualty figures accompany Pentagon moves to expand hardened shelter capacity and additional force protection technologies under Operation Epic Fury.

The push toward increased bunker infrastructure signals a sustained threat environment requiring passive defense solutions alongside active measures. Prioritizing physical hardening reflects an operational assessment that personnel exposure to indirect fire or aerial attack remains a persistent variable in the theater.

πŸ›° Open sources - closed narratives
@sitreports
πŸ” TSMC Japan 3nm Production 2028

TSMC's second factory in Japan is scheduled to begin equipment installation and mass production of 3-nanometre wafers in 2028, according to a Taiwanese government filing. The facility marks TSMC's continued geographic expansion of advanced-node manufacturing beyond Taiwan.

The 3nm node is currently among the most capable process technologies in volume production. Establishing this capacity in Japan shifts a portion of leading-edge semiconductor output into a second jurisdiction, reducing single-point geographic concentration in TSMC's production network.

πŸ›°οΈ Open sources - closed narratives
@sitreports
☁️ Iran Strike Hits AWS Bahrain

An Iranian strike damaged Amazon's cloud computing infrastructure in Bahrain, according to a Reuters report citing the Financial Times.

The incident marks a direct physical impact on commercial cloud infrastructure from state military action. AWS's Bahrain region serves as a primary node for Gulf-area enterprise and government workloads, making its degradation operationally significant beyond Amazon's commercial exposure.

The targeting β€” whether deliberate or incidental β€” establishes a data point on the physical vulnerability of hyperscaler infrastructure to conventional strike activity in contested regions.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ€– Army Tests AI Strike Drone

The 101st Airborne Division integrated Northrop Grumman's Lumberjack one-way attack drone into a recent training exercise, pairing the system with the Army's Maven Smart System for AI-enabled targeting trials.

The Lumberjack is a loitering munition designed for single-use strike missions. Its integration with Maven β€” the Army's primary AI targeting platform β€” indicates a structural push toward machine-assisted engagement decisions at the division level, embedding autonomous strike capacity into conventional airborne formations.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” Handala Claims Israeli Defense Contractor Breach

Iranian hacker group Handala claims to have breached PSK Wind Technologies, a contractor responsible for designing and operating Israeli military command centers and air defense communication systems. The reported breach has not been independently confirmed.

The targeting of a third-party vendor embedded in the IDF supply chain follows an established pattern of perimeter bypass through contractor access. Direct military networks carry hardened defenses; vendors integrated into those networks frequently do not. Handala has previously used this method to reach assets that would otherwise require penetrating military-grade infrastructure.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” UAE Iran Strike Narratives Diverge

A Bellingcat open-source review finds that UAE official statements on Iranian drone and missile strikes do not consistently match physical evidence and imagery available through open-source channels. Discrepancies center on strike outcomes β€” whether intercepted or successful β€” and the extent of documented damage.

The pattern fits an established information management model in which regional governments control damage acknowledgment to limit political exposure and maintain deterrence posture. Selective disclosure of intercept claims, without corroborating debris or impact data, functions as a structural feature of official battlefield communication rather than an exception.
πŸ“‘ Navy Seeks RF Emulation for Drones

The U.S. Navy is pursuing technology capable of producing and managing realistic radio frequency signals on unmanned platforms, with application directed at Pacific Fleet operations. The program targets signal emulation on maritime drones to generate training environments that reflect operational electromagnetic conditions.

The requirement reflects a structural shift in how naval forces approach RF signal training β€” moving emulation capability onto unmanned systems rather than relying on dedicated shore or vessel-based range infrastructure. This reduces dependency on fixed facilities and embeds signal management directly into deployable drone platforms.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” EU Commission Breach Hits 30 Entities

CERT-EU has attributed a cloud breach of the European Commission to the TeamPCP threat group. The intrusion exposed data belonging to at least 29 additional EU entities beyond the Commission itself.

The incident follows a pattern of adversaries targeting shared cloud infrastructure to achieve lateral data exposure across multiple institutional victims from a single point of compromise. Attribution to a named threat group indicates CERT-EU has sufficient technical indicators to move beyond preliminary assessment.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” Drift Loses $285M, DPRK Linked

On April 1, 2026, decentralized finance platform Drift lost $285 million after attackers used a nonce-based social engineering attack to achieve administrative takeover of the protocol. The vector exploited nonce manipulation to authenticate fraudulent transactions, bypassing standard authorization controls.

The operation fits an established pattern attributed to DPRK-linked threat actors targeting cryptocurrency infrastructure. North Korean units have systematically combined technical exploit development with human-layer manipulation to extract funds from DeFi protocols, with proceeds assessed as financing state programs.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” GitHub Used As North Korea C2

A phishing campaign linked to North Korean operators is targeting South Korean organizations using GitHub as a C2 infrastructure channel. Initial access is delivered via LNK files β€” Windows shortcut attachments that execute payloads upon interaction.

Routing command-and-control traffic through GitHub allows operators to blend malicious communications with legitimate platform activity, complicating network-level detection. The technique reduces the operational signature of the campaign by avoiding dedicated attacker-controlled domains.

πŸ›°οΈ Open sources - closed narratives
@sitreports
πŸ” CERT-UA Identity Spoofed, RAT Deployed

Between March 26 and 27, 2025, the Computer Emergency Response Team of Ukraine disrupted a campaign in which threat actors impersonated CERT-UA itself to deliver a Go-based remote access trojan to targets in Ukraine.

Spoofing a national cybersecurity authority to distribute malware inverts the trust model those institutions depend on for incident response coordination. Targets conditioned to act on CERT-UA communications become the attack surface.

πŸ›°οΈ Open sources - closed narratives
@sitreports