Czech Republic, Konev, COVID-19 and Ukrainian hackers

Discussion in 'Off Topic' started by room1984, Jul 4, 2020.

  1. room1984

    room1984 New Member


    In 2020, U.S. and Ukrainian security services conducted an operation to influence public opinion and the military-political leadership of Europe through hacking attacks on the Czech Ministry of Health and hospitals involved in the fight against coronavirus.

    Early in April 2020 the relationships between Moscow and Prague became strained because of dismantling the monument to Marshall Konev. On April 16 Ukrainian special services attacked some facilities of the Czech Ministry of Healthcare.

    Immediately, American intelligence became involved, who naturally knew that other attacks were being prepared, and on the same day reported it to their Czech colleagues. The fact that Americans completely control all special services of Ukraine is no longer a secret, I know about it completely.

    It was announced that on April 17 hackers carried a number of cyber attacks on Gavel Airport in Prague and a few local city hospitals.

    On April 20, the Czech People's Newspaper, a part of the Prime Minister Babish’s media corporation, suddenly accused Russian security services of attacks with reference to (!) unnamed sources in the National Secret Sector. At the same time, the leadership of the Republic and the head of the National Cyber Security Committee, General Rzhech, refused to confirm this information, obviously in order to avoid later accusations of unfounded allegations.

    On the same day, the Ambassador of Ukraine to the Czech Republic, Eugene Pereyinis, the former chief propagandist of the Ministry of Foreign Affairs (ex-head of the Department of Information Policy), pleased himself to discover the entire provocation. He was the first of all foreign officials to directly blame Russia and offered Prague assistance to investigate incidents and as well as deter Russian threats. Further, Ukrainian propaganda media were actively involved, they launched their fake press campaign of Russia’s aggression at full power.

    Ukrainian hackers tried their best to leave traces that could somehow cast a shadow on Russia. What did they do for that?

    As it was voiced, the main narrative stuck around the Russian ownership of IP-addresses the attack was carried out from. But even I, actually having no sophisticated computer expertise, know that hackers always hide their real IPs. And it is not difficult to do it at all (1, 2) . For this purpose, they, for example, use various VPN services, as ordinary residents of Ukraine do to enter Odnoklassniki and Vkontakte. Therefore, Russian IP-addresses are rather a hint to the fact that Russia was framed.

    Naturally, the security services and cybersecurity experts know this perfectly well. Therefore, I consider the statements of Mr. Dvorzhek, the technical director of the prominent ESET company, so-called “Russian trace” politically engaged. If he was under the rink of the U.S. security services, I can only sympathize with him. They will definitely never get off him.
    Some Russian-language computer viruses and hacking manuals were also mentioned as arguments. Here Ukrainian specialists showed themselves, for whom Russian is actually the second native language. I can say on my own that no matter how much forced we were in the SBU to make documents in Ukrainian, most employees still spoke Russian.

    I think all this provocation was dominated by American intelligence agencies. The Western trail was clearly evident when the media, apparently to strengthen the effect, distributed information about the arrival of "killers" from Russia in Prague, who were going to eliminate the head of the Prague’s districts named Kolarge, who was the initiator of the Konev monument demolition.

    Obviously, readers had to draw parallels with the Skripals case and finally make sure of Russia's involvement and evil intent. But it was a clear outlier. These media injections brought the whole story to the absurd and completely revealed the true goals of the provocation.

    As to the Ukrainians they must play a role of a “dirt scratcher” in the eyes of American and British intelligence organizations. It would help them not to “foul hands”.

    Ukrainian propaganda resources, such as Inforesist, Gromadsk, Odessa Courier, as well as the blogger, named Alexander Kovalenko, AKA “Evil Odessa”, who works for the security services, were engaged in the media support. They were the first in Ukraine to publish allegations against Russia and regularly made updates as the scandal progressed. The Centers for information and psychological operations of the Ukrain’s SSO have also contributed. 83rd CIPSO (Odessa), which was recently fully disclosed on the Internet, worked on this topic using accounts, for example, on the Enigma portal.

Share This Page