#sandworm — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #sandworm, aggregated by home.social.
-
🐛🤖 "Shai-Hulud-themed malware" in PyTorch Lightning? Really? What's next, a Bene Gesserit ransomware? This is just another excuse for a #cybersecurity company to throw #buzzwords like multimodal and AI at us while riding the #sandworm of #fearmongering. 📈🔒
https://semgrep.dev/blog/2026/malicious-dependency-in-pytorch-lightning-used-for-ai-training/ #ShaiHuludMalware #PyTorchLightning #HackerNews #ngated -
🐛🤖 "Shai-Hulud-themed malware" in PyTorch Lightning? Really? What's next, a Bene Gesserit ransomware? This is just another excuse for a #cybersecurity company to throw #buzzwords like multimodal and AI at us while riding the #sandworm of #fearmongering. 📈🔒
https://semgrep.dev/blog/2026/malicious-dependency-in-pytorch-lightning-used-for-ai-training/ #ShaiHuludMalware #PyTorchLightning #HackerNews #ngated -
🐛🤖 "Shai-Hulud-themed malware" in PyTorch Lightning? Really? What's next, a Bene Gesserit ransomware? This is just another excuse for a #cybersecurity company to throw #buzzwords like multimodal and AI at us while riding the #sandworm of #fearmongering. 📈🔒
https://semgrep.dev/blog/2026/malicious-dependency-in-pytorch-lightning-used-for-ai-training/ #ShaiHuludMalware #PyTorchLightning #HackerNews #ngated -
🐛🤖 "Shai-Hulud-themed malware" in PyTorch Lightning? Really? What's next, a Bene Gesserit ransomware? This is just another excuse for a #cybersecurity company to throw #buzzwords like multimodal and AI at us while riding the #sandworm of #fearmongering. 📈🔒
https://semgrep.dev/blog/2026/malicious-dependency-in-pytorch-lightning-used-for-ai-training/ #ShaiHuludMalware #PyTorchLightning #HackerNews #ngated -
🐛🤖 "Shai-Hulud-themed malware" in PyTorch Lightning? Really? What's next, a Bene Gesserit ransomware? This is just another excuse for a #cybersecurity company to throw #buzzwords like multimodal and AI at us while riding the #sandworm of #fearmongering. 📈🔒
https://semgrep.dev/blog/2026/malicious-dependency-in-pytorch-lightning-used-for-ai-training/ #ShaiHuludMalware #PyTorchLightning #HackerNews #ngated -
Energy Sector Incident Report
On December 29, 2025, coordinated destructive cyberattacks targeted Poland's energy infrastructure during severe winter weather. Approximately 30 wind and solar farms, a manufacturing company, and a combined heat and power plant serving nearly 500,000 customers were affected. Attackers exploited vulnerable FortiGate perimeter devices using stolen credentials and default passwords to access industrial control systems. Multiple types of wiper malware, including DynoWiper and LazyWiper, were deployed to destroy data across IT and OT environments. While renewable facilities lost communication with distribution operators without affecting electricity generation, the incidents demonstrated significant capability to cause physical disruption. Infrastructure analysis revealed connections to threat clusters known as Static Tundra, Ghost Blizzard, and potentially Sandworm, marking a notable escalation in cyber-sabotage operations.
Pulse ID: 69f32ac81834d5a878e8fac0
Pulse Link: https://otx.alienvault.com/pulse/69f32ac81834d5a878e8fac0
Pulse Author: AlienVault
Created: 2026-04-30 10:11:20Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberAttack #CyberAttacks #CyberSecurity #IndustrialControlSystems #InfoSec #Malware #Manufacturing #OTX #OpenThreatExchange #Password #Passwords #Poland #RAT #Sandworm #Word #Worm #bot #AlienVault
-
Energy Sector Incident Report
On December 29, 2025, coordinated destructive cyberattacks targeted Poland's energy infrastructure during severe winter weather. Approximately 30 wind and solar farms, a manufacturing company, and a combined heat and power plant serving nearly 500,000 customers were affected. Attackers exploited vulnerable FortiGate perimeter devices using stolen credentials and default passwords to access industrial control systems. Multiple types of wiper malware, including DynoWiper and LazyWiper, were deployed to destroy data across IT and OT environments. While renewable facilities lost communication with distribution operators without affecting electricity generation, the incidents demonstrated significant capability to cause physical disruption. Infrastructure analysis revealed connections to threat clusters known as Static Tundra, Ghost Blizzard, and potentially Sandworm, marking a notable escalation in cyber-sabotage operations.
Pulse ID: 69f32ac81834d5a878e8fac0
Pulse Link: https://otx.alienvault.com/pulse/69f32ac81834d5a878e8fac0
Pulse Author: AlienVault
Created: 2026-04-30 10:11:20Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberAttack #CyberAttacks #CyberSecurity #IndustrialControlSystems #InfoSec #Malware #Manufacturing #OTX #OpenThreatExchange #Password #Passwords #Poland #RAT #Sandworm #Word #Worm #bot #AlienVault
-
Energy Sector Incident Report
On December 29, 2025, coordinated destructive cyberattacks targeted Poland's energy infrastructure during severe winter weather. Approximately 30 wind and solar farms, a manufacturing company, and a combined heat and power plant serving nearly 500,000 customers were affected. Attackers exploited vulnerable FortiGate perimeter devices using stolen credentials and default passwords to access industrial control systems. Multiple types of wiper malware, including DynoWiper and LazyWiper, were deployed to destroy data across IT and OT environments. While renewable facilities lost communication with distribution operators without affecting electricity generation, the incidents demonstrated significant capability to cause physical disruption. Infrastructure analysis revealed connections to threat clusters known as Static Tundra, Ghost Blizzard, and potentially Sandworm, marking a notable escalation in cyber-sabotage operations.
Pulse ID: 69f32ac81834d5a878e8fac0
Pulse Link: https://otx.alienvault.com/pulse/69f32ac81834d5a878e8fac0
Pulse Author: AlienVault
Created: 2026-04-30 10:11:20Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberAttack #CyberAttacks #CyberSecurity #IndustrialControlSystems #InfoSec #Malware #Manufacturing #OTX #OpenThreatExchange #Password #Passwords #Poland #RAT #Sandworm #Word #Worm #bot #AlienVault
-
Energy Sector Incident Report
On December 29, 2025, coordinated destructive cyberattacks targeted Poland's energy infrastructure during severe winter weather. Approximately 30 wind and solar farms, a manufacturing company, and a combined heat and power plant serving nearly 500,000 customers were affected. Attackers exploited vulnerable FortiGate perimeter devices using stolen credentials and default passwords to access industrial control systems. Multiple types of wiper malware, including DynoWiper and LazyWiper, were deployed to destroy data across IT and OT environments. While renewable facilities lost communication with distribution operators without affecting electricity generation, the incidents demonstrated significant capability to cause physical disruption. Infrastructure analysis revealed connections to threat clusters known as Static Tundra, Ghost Blizzard, and potentially Sandworm, marking a notable escalation in cyber-sabotage operations.
Pulse ID: 69f32ac81834d5a878e8fac0
Pulse Link: https://otx.alienvault.com/pulse/69f32ac81834d5a878e8fac0
Pulse Author: AlienVault
Created: 2026-04-30 10:11:20Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberAttack #CyberAttacks #CyberSecurity #IndustrialControlSystems #InfoSec #Malware #Manufacturing #OTX #OpenThreatExchange #Password #Passwords #Poland #RAT #Sandworm #Word #Worm #bot #AlienVault
-
Energy Sector Incident Report
On December 29, 2025, coordinated destructive cyberattacks targeted Poland's energy infrastructure during severe winter weather. Approximately 30 wind and solar farms, a manufacturing company, and a combined heat and power plant serving nearly 500,000 customers were affected. Attackers exploited vulnerable FortiGate perimeter devices using stolen credentials and default passwords to access industrial control systems. Multiple types of wiper malware, including DynoWiper and LazyWiper, were deployed to destroy data across IT and OT environments. While renewable facilities lost communication with distribution operators without affecting electricity generation, the incidents demonstrated significant capability to cause physical disruption. Infrastructure analysis revealed connections to threat clusters known as Static Tundra, Ghost Blizzard, and potentially Sandworm, marking a notable escalation in cyber-sabotage operations.
Pulse ID: 69f32ac81834d5a878e8fac0
Pulse Link: https://otx.alienvault.com/pulse/69f32ac81834d5a878e8fac0
Pulse Author: AlienVault
Created: 2026-04-30 10:11:20Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberAttack #CyberAttacks #CyberSecurity #IndustrialControlSystems #InfoSec #Malware #Manufacturing #OTX #OpenThreatExchange #Password #Passwords #Poland #RAT #Sandworm #Word #Worm #bot #AlienVault
-
Analysis of Attack Activities Using SSH+TOR Tunnels to Achieve Covert Persistence
APT-C-13 (Sandworm), also known as FROZENBARENTS, is a state-sponsored advanced persistent threat group conducting global cyber espionage operations. The organization recently deployed malicious campaigns using nested SSH and TOR tunnel infrastructure to establish covert remote access channels. Attackers distribute ZIP archives containing weaponized LNK files via spearphishing emails, which extract and execute payloads that create scheduled tasks disguised as legitimate software. The attack establishes dual-encrypted anonymous tunnels using obfs4 protocol to bypass deep packet inspection, while mapping sensitive ports (SMB/445, RDP/3389) to Onion domains for persistent backdoor access. The campaign leverages sophisticated anti-analysis techniques including sandbox detection, file disguise, and process masquerading to evade detection and maintain long-term unauthorized control over compromised systems for intelligence collection.
Pulse ID: 69f1f50a5410ca637c84368c
Pulse Link: https://otx.alienvault.com/pulse/69f1f50a5410ca637c84368c
Pulse Author: AlienVault
Created: 2026-04-29 12:09:46Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #Email #Espionage #InfoSec #LNK #OTX #Onion #OpenThreatExchange #Phishing #RAT #RDP #SMB #SSH #Sandworm #SpearPhishing #Worm #ZIP #bot #AlienVault
-
疑似APT-C-13(Sandworm)组织利用SSH+TOR隧道实现隐蔽持久化的攻击活动分析-安全资讯-360官网
Pulse ID: 69f1f472cc1acc636d7983ef
Pulse Link: https://otx.alienvault.com/pulse/69f1f472cc1acc636d7983ef
Pulse Author: CyberHunter_NL
Created: 2026-04-29 12:07:14Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #InfoSec #OTX #OpenThreatExchange #SSH #Sandworm #Worm #bot #CyberHunter_NL
-
Attack Activity Analysis Using SSH+TOR Tunnels for Covert Persistence
APT-C-13 (Sandworm), also known as FROZENBARENTS, is a state-sponsored advanced persistent threat group conducting global cyber espionage targeting government agencies, diplomatic departments, energy enterprises, and research organizations. Recently detected samples reveal the group's use of nested SSH and TOR tunnel architecture to establish covert communication channels. The attack begins with spear-phishing emails delivering malicious LNK files disguised as PDF documents. Upon execution, the payload deploys TOR hidden services mapping internal ports (SMB/445, RDP/3389) to onion domains, while SSH services with public key authentication provide encrypted remote access. The malware employs obfs4 protocol to obfuscate TOR traffic, evading deep packet inspection. Persistence is achieved through scheduled tasks masquerading as legitimate applications like Opera GX and Dropbox, establishing an anonymous shadow management infrastructure for sustained intelligence collection.
Pulse ID: 69f06b1eeeb1fca735cb0bb8
Pulse Link: https://otx.alienvault.com/pulse/69f06b1eeeb1fca735cb0bb8
Pulse Author: AlienVault
Created: 2026-04-28 08:09:02Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #Dropbox #Email #Espionage #Government #InfoSec #LNK #Malware #OTX #Onion #OpenThreatExchange #Opera #PDF #Phishing #RDP #SMB #SSH #Sandworm #SpearPhishing #Worm #bot #AlienVault
-
Europe’s Power Grid Faces Hybrid Warfare Threat
European electricity infrastructure has become a target of sustained hybrid warfare, and a new report from Eurelectric, the…
#Europe #EU #CriticalInfrastructure #cyberattack #DTEK #EURELECTRIC #European #Fingrid #gridresilience #HybridWarfare #Sandworm
https://www.europesays.com/europe/3489/ -
The Sandworm by Travis Knight
#sandworm #worm #technical #illustration #design #art #illustration #TravisKnight #Knight
-
Jeśli ktoś chce zerknąć do świeżo wydanego raportu firmy Dragos dotyczącego ataku na polski sektor energetyczny, to link znajdzie poniżej. Wskazywana przez badaczy grupa Electrum to nic innego jak Sandworm (wg nazewnictwa stosowanego przez ESET) czy po prostu APT44, czyli ślady prowadzą do Rosji. Ale szczegółów brak, same ogólniki. Sugeruję poczekać na publikację polskiego CERT-u, która ma szansę pojawić się już jutro.
https://5943619.hs-sites.com/hubfs/Reports/dragos-2025-poland-attack-report.pdf
-
Amazon: Russian GRU hackers favor misconfigured devices over vulnerabilities https://hackread.com/amazon-russia-gru-hackers-misconfigured-vulnerabilities/ #SeashellBlizzard #CurlyCOMrades #Cybersecurity #Vulnerability #CyberAttack #CyberCrime #Security #Sandworm #Malware #Amazon #Russia #APT44 #0day #AWS #GRU
-
🔐 🖥️ 🌐 🛡️ Russian state-sponsored hackers are moving away from security vulnerabilities and breaking into critical infrastructure through misconfigured devices, warns Amazon Threat Intelligence. ⚠️ 🏭 🔍
Read: https://hackread.com/amazon-russia-gru-hackers-misconfigured-vulnerabilities/
-
AWS Blames Russia’s GRU for Years-Long Espionage Campaign Targeting Western Energy Infrastructure https://thecyberexpress.com/espionage-western-critical-infrastructure/ #WesternCriticalInfrastructure #criticalinfrastructure #EnergyInfrastructure #RussianThreatActor #EnergySupplyChain #FirewallDaily #RussianGRU #CyberNews #Espionage #Sandworm #APT44
-
🚀🐛 Oh no! A #sandworm named Shai-Hulud decided to slither into our #dev machine and throw a #party on our #GitHub org. But don’t worry, we've got a fancy timeline of how "invincible" our #AI #agents were and how we’re "building next" the ultimate road to... nowhere! 🤖📉
https://trigger.dev/blog/shai-hulud-postmortem #mishap #tech #humor #HackerNews #ngated -
Russia’s notorious Sandworm group isn’t just hitting power grids anymore—they’re now targeting Ukraine’s grain sector and food security. How deep does this cyber siege go?
#sandworm
#apt44
#cyberwarfare
#ukraine
#criticalinfrastructure
#databreach
#malware
#ransomware
#cyberattacks -
Cyble Detects Advanced Backdoor Targeting Defense Systems via Belarus Military Lure https://thecyberexpress.com/belarus-military-hit-by-ssh-tor-backdoor/ #TheCyberExpressNews #Belarusianmilitary #TheCyberExpress #FirewallDaily #DarkWebNews #CyberNews #Backdoor #Sandworm #darkweb
-
🚀 #Raspberry Pi 4 : mise à jour d'#OpenMediaVault 6 #Shaitan (basé sur #Debian 11) vers 7 #Sandworm (basé sur Debian 12) effectuée en quelques minutes, avec succès !
#️⃣ #Linux #OpenSource #FOSS #FLOSS #FreeSoftware #NAS #OperatingSystem #RaspberryPi #RaspberryPi4 #Kodi #OMV #LogicielsLibres
-
Seashell Blizzard Attack Detection: A Long-Running Cyber-Espionage “BadPilot” Campaign by russian-linked Hacking Group – Source: socprime.com https://ciso2ciso.com/seashell-blizzard-attack-detection-a-long-running-cyber-espionage-badpilot-campaign-by-russian-linked-hacking-group-source-socprime-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #SeashellBlizzard #Latestthreats #socprimecom #BadPilot #Sandworm #socprime #APT44 #Blog #APT
-
The russian-backed Seashell Blizzard aka #APT44 or #Sandworm is behind a stealthy “BadPilot” campaign focused on gaining persistent network access. Detect adversary activity targeting critical sectors with #Sigma rules from SOC Prime Platform.
https://socprime.com/blog/seashell-blizzard-attack-detection/?utm_source=mastodon&utm_medium=social&utm_campaign=cert-ua&utm_content=blog-post -
🚨🚀 Breaking news: an article claims to uncover the mind-blowing connection between Lawrence of Arabia and #Dune, but surprise! 🚫 It's locked tighter than a sandworm's jaws. Who needs content when you have a "403 Forbidden" error page to ponder instead? 😂🌵
https://reactormag.com/lawrence-of-arabia-paul-atreides-and-the-roots-of-frank-herberts-dune/ #BreakingNews #LawrenceOfArabia #403Forbidden #ErrorPage #Sandworm #HackerNews #ngated -
#CERTUA warns defenders of targeted activity to launch cyber-attacks against the critical infrastructure sector in Ukraine and beyond linked to UAC-0212, a subcluster of #Sandworm #APT. Detect intrusions with #Sigma rules from SOC Prime Platform.
https://socprime.com/blog/detecting-uac-0212-attacks-linked-to-sandworm/?utm_source=mastodon&utm_medium=social&utm_campaign=cert-ua&utm_content=blog-post -
#CERTUA warns defenders of targeted activity to launch cyber-attacks against the critical infrastructure sector in Ukraine and beyond linked to UAC-0212, a subcluster of #Sandworm #APT. Detect intrusions with #Sigma rules from SOC Prime Platform.
https://socprime.com/blog/detecting-uac-0212-attacks-linked-to-sandworm/?utm_source=mastodon&utm_medium=social&utm_campaign=cert-ua&utm_content=blog-post -
#CERTUA warns defenders of targeted activity to launch cyber-attacks against the critical infrastructure sector in Ukraine and beyond linked to UAC-0212, a subcluster of #Sandworm #APT. Detect intrusions with #Sigma rules from SOC Prime Platform.
https://socprime.com/blog/detecting-uac-0212-attacks-linked-to-sandworm/?utm_source=mastodon&utm_medium=social&utm_campaign=cert-ua&utm_content=blog-post -
How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying https://www.securityweek.com/how-russian-hackers-are-exploiting-signals-linked-devices-for-real-time-spying/ #Malware&Threats #SignalMessenger #cyberespionage #NationState #Featured #Mandiant #Sandworm #QRcode #APT44
-
How Russian Hackers Are Exploiting Signal ‘Linked Devices’ Feature for Real-Time Spying https://www.securityweek.com/how-russian-hackers-are-exploiting-signals-linked-devices-for-real-time-spying/ #Malware&Threats #SignalMessenger #cyberespionage #NationState #Featured #Mandiant #Sandworm #QRcode #APT44
-
Russian Seashell Blizzard Hackers Have Access to Critical Infrastructure: Microsoft – Source: www.securityweek.com https://ciso2ciso.com/russian-seashell-blizzard-hackers-have-access-to-critical-infrastructure-microsoft-source-www-securityweek-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #SeashellBlizzard #securityweekcom #securityweek #NationState #Microsoft #FEATURED #Sandworm #Russia #APT44
-
Russian Seashell Blizzard Hackers Gain, Maintain Access to High-Value Targets: Microsoft https://www.securityweek.com/russian-seashell-blizzard-hackers-gain-maintain-access-to-high-value-targets-microsoft/ #SeashellBlizzard #Nation-State #Microsoft #Sandworm #Russia #APT44
-
Russian Seashell Blizzard Hackers Gain, Maintain Access to High-Value Targets: Microsoft https://www.securityweek.com/russian-seashell-blizzard-hackers-gain-maintain-access-to-high-value-targets-microsoft/ #SeashellBlizzard #Nation-State #Microsoft #Sandworm #Russia #APT44
-
Sandworm APT Attacks Detection: russian State-Sponsored Hackers Deploy Malicious Windows KMS Activators to Target Ukraine – Source: socprime.com https://ciso2ciso.com/sandworm-apt-attacks-detection-russian-state-sponsored-hackers-deploy-malicious-windows-kms-activators-to-target-ukraine-source-socprime-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #DarkCrystalRAT #Latestthreats #socprimecom #Sandworm #socprime #UAC0145 #APT44 #Blog #APT
-
Happy Wednesday everyone!
This resources has been popping up on my feed everywhere so I took a look at it and I see why! When he is not instructing the #SANS FOR589, Will Thomas is creating highly valuable resources like the Russian APT Tool Matrix.
Will has taken the time to correlate the tools of Russian #APTs such as #CozyBear and #Sandworm and even supplied the aliases that go along with them as well. This is a great resource if you are an organization who is APT focused to prioritize your threat hunting! Thanks a ton Will!
Enjoy and Happy Hunting!
Russian APT Tool Matrix:
https://github.com/BushidoUK/Russian-APT-Tool-Matrix/blob/main/GroupProfiles/Sandworm.mdIntel 471 #ThreatIntel #ThreatHunting #ThreatDetection #readoftheday #HappyHunting Cyborg Security, Now Part of Intel 471
-
📬 Lesetipps: APT44 – Einblicke in Russlands bekannteste Hackergruppe
#Lesetipps #APT44 #Atari #CyberSabotage #Malware #PaloAltoNetworks #Sandworm #TikTok #Vorratsdatenspeicherung https://sc.tarnkappe.info/d2682a -
Mandiant graduates the Russian cyberespionage Sandworm to APT44. Sandworm is publicly attributed to Unit 74455 of the Russian Main Intelligence Directorate (GRU) by the US Government. APT44 conducts missions like collecting intelligence, sabotaging networks, or conducting information operations. Mandiant's threat actor profile (40 page report) of APT44 offers a look at how cyberwarfare will be played out in future conflicts. IOC included. 🔗 https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm/
#Sandworm #cyberespionage #Russia #APT #APT44 #threatintel #RussiaUkraineWar #IOC
-
Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm.
#cybersecurity #Russia #APT44 #sandworm #GRU
https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm -
📬 Sandworm: Wenn russische Hacker den Strom abschalten
#Cyberangriffe #ABB #AGKritis #Blackout #Cyberangriff #HonkHase #Mandiant #ManuelAtug #Sandworm #tarnkappeinfopodcast https://tarnkappe.info/artikel/cyberangriff/sandworm-wenn-russische-hacker-den-strom-abschalten-282512.html -
#Sandworm Disrupts #Power in Ukraine Using a Novel Attack Against Operational Technology
"While we were unable to identify the SCIL commands executed, we believe they were probably commands to open #CircuitBreakers in the victim’s #substation environments."
https://www.mandiant.com/resources/blog/sandworm-disrupts-power-ukraine-operational-technology -
I recently finished reading the book #Sandworm by Andy Greenberg.
I think one of the main thing I will take from that book is a scene where it is explained how a company responsible for selling accounting software were (ab)used to distribute #NotPetya around the world. It is then explained how the company did not have #APT or Nation States as part of their threat model because "we are not big or significant enough to be interesting to them".
The take away then being: "You probably can't exclude Nation States from your threat model".
-
‘Infamous Chisel’ Malware Targets Crypto Wallets and Exchanges: A Joint Warning by FBI and GCHQ - The “Infamous Chisel,” a new sophisticated malware, has been targeting crypto wall... - https://news.bitcoin.com/infamous-chisel-malware-targets-crypto-wallets-and-exchanges-a-joint-warning-by-fbi-and-gchq/ #networkbackdoor #infamouschisel #cryptowallets #cybersecurity #exfiltration #trustwallet #espionage #security #coinbase #sandworm #android #binance #malware #gchq #fbi #ssh
-
Спецслужби РФ атакують українських військових, використовуючи новий бекдор Android — розвідка США та Великої Британії https://itc.ua/ua/novini/rosijski-spetssluzhby-zapustyly-nove-shkidlyve-pz-natsilene-na-android-prystroyi-ukrayinskyh-vijskovyh/ #InfamousChisel #Кібератаки #ШкідливеПЗ #Sandworm #Україна #Android #Новини #Хакери #Війна #ЗСУ #СБУ