Ukrainian hackers of the anonymous cyber-group alliance FalconsFlame and Trinity launched an operation at 00:00 on May 9, 2016 coded #OpMay9. It involved 9+ successful hackings of the web sites of Donetsk People’s Republic (DPR) terrorist organization, Russian private military companies (PMC’s) operating under the protection of the FSB in Ukraine and Syria, as well as Russian web outlets disseminating aggressive anti-Ukrainian propaganda.
On the defaced websites, the hackers left the hashtags #OpMay9 and #оп9Мая, as well as 3 short videos about the World War 2 and the contribution of the Ukrainian people in the victory over Nazism.
Follow these links to view the videos which were posted on the defaced web sites:
Eternal Glory to the Heroes! UKRAINE in WW2
Eternal Glory to the Heroes! WW2 veteran Ivan Zaluzhny lost a grandson in the war in the east of Ukraine
7 million Ukrainians fought Nazism in the Allied armies
The hackers used again the meme of “Lviv Underground” for their new address that was embedded on the defaced terrorist web sites.
It is worth noting, that the Ukrainian cyber-guerillas exclusively granted InformNapalm access to their video in advance, saying that as soon as it is published on YouTube, they will start their operation and will show “how easily light overcomes darkness”.
From Z-hour on, terrorist web sites were transformed one after the other.
Official site of the DPR (dnr-online.ru screen) got the first injection of the “truth serum”, it kept streaming the videos till 8AM on May 9. It was followed with a torrent of content transformations: DPR Pravda (dnr-pravda.ru, screenshot), the official web site of the occupied Donetsk (gorod-donetsk.com, screenshot), DPR Municipal Engineering Supervision office (gkgtn.ru, screenshot), DPR EMERCOM (dnmchs.ru, screenshot), anti-Ukrainian propaganda website (crimes.dnr-online.ru, screenshot), the site of the “DPR Office for Humanitarian Operations” (nvr-cknr.ru, screenshot), a propaganda outlet Voskhod Info (voskhodinfo.com, screenshot), the Messenger of the Faithful website (вестникверных.рф, screenshot) and aggressive propaganda outlet of the Russian private military company E.N.O.T corp (enotcorp.org, archive, screenshot).
By the way, the mercenaries of the E.N.O.T corp have repeatedly featured in the InformNapalm investigations.
In April 2015, the information collected from open-sources revealed that Russian social movement People’s Cathedral and Vladimir Khomyakov, the co-chairman of the Russian party Great Fatherland were behind this organization. The People’s Cathedral includes more than 250 different organizations and groups across Russia, including the “war vets” and “military-patriotic” organizations, which traditionally are under the patronage of the Federal Security Service, the principal security agency of the Russian Federation.
Read more: Khomyakov’s “raccoons” busting “Novorossia cossacks” (VIDEO)
Infographics: private military companies (PMCs) on combat missions abroad in the interests of the Russian Federation.
According to the hackers, web site of the E.N.O.T corp PMC and of the Messenger of the Faithful propaganda outlet are on the same host. It is listed to the telling name of certain Evgeny Gennadievich Besov (note: “bes” in Russian means a demon).
Thus, on May 9, 2016 Ukrainian hackers performed one of the most complex and unprecedented information operations, having penetrated and paralyzed the whole network of Russian web outlets supporting terrorist activities against Ukraine.
In their video address, they sent a message which is very important and necessary today:
“…We have enough strength and will to successfully overcome the aggressor, it only takes faith and contributing efforts from all of us to reach the common victory.…”. Their words are matched by action.
Full text of the address of the Ukrainian hackers
The international volunteer community InformNapalm calls for the active dissemination in the media and on social networks of the information about this local, but nevertheless very impressive victory of the Ukrainian volunteer community. We won then, and we will win again. God willing! Glory to Ukraine!
4 Responses to “9 hacks on MAY 9: successful operation of Ukrainian hackers #OpMay9 (VIDEO)”
05/18/2016
Ukraińscy hakerzy przeprowadzili na Krymie operację #opMay18 - InformNapalm.org (Polski)[…] że 9 maja ukraińscy hakerzy z grup FalconsFlame i Trinity przeprowadzili piękną operację #OpMay9, w ramach której włamano się na ponad 9 stron organizacji terrorystycznej „Doniecka Republika […]
06/01/2016
ESET Antivirus Company in Service of Donbas Terrorists - InformNapalm.org (English)[…] report, on May 9, the Ukrainian hackers from the cyber alliance of FalconsFlame and Trinity hacked the official websites of ‘DPR’ terrorist enclave and several outreach resources o…. Obviously, such a cheeky action seriously troubled the Russian leadership and security services. […]
07/22/2016
Ukrainska hackare genomför operation #opDay28 - InformNapalm på svenska[…] av ryska propaganda-avfallsupplaget ANNA-NEWS, som finansieras och övervakas av FSB. Den 9 maj 2016 genomfördes ett lysande «ingrepp» att förstöra nio 9 webbsidor. Därefter bröt sig alliansen […]
09/13/2016
Los hacktivistas celebraron el Día del programador con una operación del choque #op256thDay - InformNapalm.org (Español)[…] Recordemos que esta no es la primera exitosa operación conjunta de los kiberactivistas. Anteriormente, las operaciones que llevaron a cabo: #opDay28, #opMay18, #OpMay9. […]