Goodbye, Robert Redford

My Redford story, which is really my mother’s story.

A woman who worked for her lived in North Vancouver, and in the early 80’s it wasn’t as built ip as it is now. There was basically one highway that everyone took to get to the bridge to Vancouver. She’s driving to work at 6:30 one morning and her car breaks down. It limps to the shoulder and she gets out and pops the hood, as one does in order to stare quizzically at the engine, understanding nothing.

A zippy little sports car pulls up and a gorgeous man gets out and asks if she needs help. She says she can’t tell what’s wrong and does he know engines?

He does not. BUT! he does know a really good garage not far from there and he can drive her if she’d like. They open soon.

She ponders for a moment and decides that if she IS going to be raped and murdered by this total stranger, hey, what a way to go, or words to that effect. She gets in his car.

As they drive, they chat. His kids go to the same school hers do. Is working in medical records interesting (it is)? Is her family from here? He moved up from the US a couple of years ago and loves the lifestyle.

And she begins to think he looks familiar. That perfect jawline. The flawless blond hair. Those gentle blue eyes…OH MY GOD THIS IS ROBERT REDFORD!

DONT BE STUPID, IT CANT BE ROBERT REDFORD. WHAT WOULD ROBERT REDFORD BE DOING IN NORTH VAN AT 6:30 IN THE MORNING???

She begins to have difficulty keeping up her end of the conversation, preoccupied with IS HE OR ISNT HE?

They arrive at the garage. She gets out of the car and thanks him profusely for the ride. He leans over to close the door and says, “You’re welcome. By the way, I am exactly who you think I am.”

And he drives off.

Continued Attacks on the Drone Industry in Russia by the IT Army of Ukraine

The IT Army of Ukraine continues its attacks on the Russian drone industry for the second day, with an expanded target list.

raincoaster's avatarThe Cryptosphere

Whatever y’all are doing, it’s working. One of the things you’re doing is adding related target suggestions by emailing them to the ITAU, so today we have an update to yesterday’s list, still drone-focused. Let’s get to it!

Announcements

We continue to prevent equip the orcs with drones. Your recommendations have been added to the list of targets.

You can grant access to your cloud resources to our bot that will launch a coordinated attack from all the available servers. It has been improved and it is already possible to transfer servers with a non-standard ssh port. More info

(https://itarmy.com.ua/bot/?lang=en)

Продовжуємо заважати доукомплектовувати орків. Додали до цілей ваші рекомендації.

Кожен бажаючий може надати свої хмарні ресурси боту, який буде централізовано запускати атаку одночасно з усіх отриманих серверів. Його доопрацювали і вже можна переносити сервери з нестандартним портом ssh. Детальніше (https://itarmy.com.ua/bot/)

Targets

http://www.nwht.ru/
92.63.111.127 (80/tcp)
https://justalk.ru/
46.8.255.136 (80/tcp, 443/tcp)
https://www.technopark.ru/
178.248.235.59…

View original post 81 more words

Russian Drone Suppliers in the Crosshairs of the IT Army of Ukraine

The latest list of targets from the IT Army of Ukraine to hacktivist supporters. While the Telegram group is down from 400,000, it’s still a solid quarter of a million hacktivists.

raincoaster's avatarThe Cryptosphere

We’re back! Here’s hoping the internet and power hold up long enough for us to get this list up.

Announcements

Copter drone shops is the next valid target to diminish its availability for russian troops. Please let us know if you can share more web addresses with a special form on the website (https://itarmy.com.ua/).

Для того, щоб зменшити надходження цивільних дронів для орків пропонуємо атакувати спеціалізовані інтернет магазини. Якщо ви знаєте адреси інших ресурсів, де можна придбати дрон, що може використовуватися для розвідки або наведення, просимо пропонувати їх через спеціальну форму на нашому сайті (https://itarmy.com.ua/).

Zelenskyy and NAFO put Russian drone suppliers on notice

Targets

http://copterdrone.ru/
46.229.214.41 (80/tcp)
http://idrone.ru/
http://mydrone.ru/
http://1drone.ru/
217.25.89.70 (80/tcp)
https://dronecentre.ru/
92.53.96.119 (443/tcp)
https://gopro.ru/
http://camera.ru/
85.119.149.175 (80/tcp, 443/tcp)
http://rc-go.ru/
5.189.231.189 (80/tcp)
https://aerolike.ru/
95.183.15.176 (443/tcp)
https://www.techport.ru/
178.248.233.61 (443/tcp)
http://rocket-market.ru/
62.109.22.132 (80/tcp)
https://4vision.ru/
5.183.188.2 (443/tcp)
https://bespilotnik24.ru/
81.200.113.9 (80/tcp, 443/tcp)
https://terradrones.ru/
178.170.244.102 (443/tcp)
https://brlab.ru/
92.53.96.4 (443/tcp)
https://turbopult.ru/
62.182.157.232 (443/tcp)
https://coptertime.ru/

View original post 189 more words

MHDDoS_Proxy Updated, plus Russian Diplomatic Targets from the IT Army of Ukraine

A major change in the cyberwar in Ukraine: the IT Army of Ukraine has switched from open source tools to closed. This allows them to control the target lists completely so that they will ONLY attack Russian targets: the Russians or their allies had been using the open source tools against Ukrainian targets. That’s no longer possible.

raincoaster's avatarThe Cryptosphere

Sorry we’ve been offline: Ottawa has had a massive internet outage that’s still not fully resolved (we’d like to think that’s Russia trying to stop us from posting these, but we’d like the liability courts NOT to think that). And dropping the phone in the bathtub effectively removed all our other alternatives. Anyhoodle, we’re back. Let’s get to it, shall we? Big one today.

Announcements

Another update of mhddos_proxy (https://github.com/porthole-ascend-cinnamon/mhddos_proxy) has been released, simplifying its use and improving security.

Recently, we’ve noticed that tools created by volunteers are increasingly being used by a hostile party. This also applies to everyone’s favorite mhddos_proxy through open-source code, the enemy could use it against us and our allies.

The only solution, according to its developers, was to close the source code. We do not want to provide such an effective cyber weapon to our enemy, so we fully support such a decision.

This…

View original post 404 more words

New Russian Targets from the IT Army of Ukraine

Hey! Didja know that over at The Cryptosphere we’re sharing the IT Army of Ukraine’s daily target lists? Today we’re hitting Russian media. Care to join the biggest hacktivist action in history? Links in the post to everything you need.

raincoaster's avatarThe Cryptosphere

Here we go, people! Remember: Tor, then VPN, then happy hunting!

Russia ruins everything
Russia ruins everything

Announcements

Well done! For the last two days, the Russians have not been able to access their CRM. As always, on weekends we switch to Russian mass media.

Хороша робота! Останні два дні росіянам не вдавалося поправцювати в своїх CRM. Як завжди на вихідних переходимо до росзмі

Targets

https://plamya-truda.ru/
https://zeml-trub.ru/
https://gazeta-suzemka.ru/
https://unecha-gazeta.ru/
https://www.rosniva.ru/
https://znamya-truda32.ru/
https://gazeta-rognedino.ru/
https://voshod-surag.ru/
https://volgograd24.tv/
https://www.xn--32-6kc4bi9i.xn--p1ai/
https://www.pravda-sevsk.ru/
213.159.210.204 (443/tcp)
https://newsorel.ru/
91.215.41.25 (443/tcp)
http://www.myudm.ru/online-efir-udmurtia
78.85.14.157 (80/tcp)
https://pg11.ru/
https://gorodkirov.ru/
https://progorod43.ru/
https://progorodnn.ru/
212.41.26.46 (443/tcp)
https://gubdaily.ru/
91.215.42.25 (443/tcp)
https://kaluganews.ru/
91.215.41.18 (443/tcp)
https://novgorod-tv.ru/teleproekty/novgorodskoe-televidenie-glavnyj-efir/
185.71.67.110 (443/tcp)
https://www.kbpravda.ru/
85.173.96.134 (443/tcp)
http://xn--80aaajllyo6c2h.xn--p1ai/
185.246.65.253 (80/tcp)
https://bloknot-volgograd.ru/
https://bloknot-astrakhan.ru/
https://bloknot-rostov.ru/
https://bloknot-voronezh.ru/
91.206.127.28 (443/tcp)
https://gazetanovgorod.ru/
185.71.67.94 (443/tcp)
https://vashgorod.ru/
185.98.87.245 (443/tcp)
http://xn—-7sbbdcrylc1ahd6a1as4e7b.xn--p1ai/
31.31.198.201 (80/tcp)
https://www.mvestnik.ru/
185.253.34.49 (443/tcp)
https://raybudni.ru/
45.130.41.6 (443/tcp)
http://xn—-7sbemcagqeo2b3bkwe.xn--p1ai/
31.31.198.122 (80/tcp)
https://communa.ru/
91.215.42.1 (443/tcp)
http://www.pryamayarech.ru/
91.189.114.8 (80/tcp)
https://www.penza-press.ru/
185.165.123.185 (443/tcp)
http://www.desnyanka.ru/
188.127.241.86 (80/tcp)
https://riavrn.ru/
85.193.84.43 (443/tcp)
https://gtrk.tv/b24
91.206.127.61 (443/tcp)
https://ranpress.ru/
82.202.170.145 (443/tcp)
https://vesti-omsk.ru/
91.206.127.31 (443/tcp)

View original post 137 more words