Friday, August 02, 2019

Assessing the Recently Leaked FSB Contractor Data - A Peek Inside Russia's Understanding of Social Network Analysis and Tailored Access Operations

I've recently managed to obtain a copy of the recently leaked FSB contractor data courtesy of 0v1ru$ and "Digital Revolution" and I've decided to take a closer look including an in-depth overview and discussion of the leaked data in the context of today's modern-driven AI-powered automated OSINT technologies in the broader context of the U.S Intelligence Community in particular the utilization of rogue TOR exit nodes for the purpose of intercepting and harvesting TOR exit node data within the Russian Federation including social-network analysis data-mining and possible "lawful surveillance" and "lawful interception" including possible data collection type of Tailored Access Operation campaigns launched by "0day Technologies" and "SyTech".

Sample Company Logo:

Sample Company Logo:

Sample personal photos of the individuals behind "0day Technologies" and "SyTech":










Sample Screenshots of the User-Interface behind the "Lawful Surveillance" and "Lawful Interception":



Sample Screenshots of the Rogue and Bogus Tor-Exit-Node Research Project:


Sample URLs involved in the campaign:
hxxp://0day.ru
hxxp://sytech.ru

Sample Telegram account involved in the campaign:
hxxp://t.me/D1G1R3V_DigitalRevolution

Sample Vkontakt account involved in the campaign:
hxxp://vk.com/d1g1r3v

Sample Twitter account involved in the campaign:
hxxp://twitter.com/d1g1r3v
hxxp://twitter.com/0v1ruS

Sample URL known to have participated in the campaign:
hxxp://d1g1r3v.net

Related URL of the currently leaked data:
https://mega.nz/#F!3c0lTaLI!jVUS_O7Q0opCHUPYgK1E_w