c.im is one of the many independent Mastodon servers you can use to participate in the fediverse.
C.IM is a general, mainly English-speaking Mastodon instance.

Server stats:

2.8K
active users

#svr

0 posts0 participants0 posts today

"Pot calling kettle black!"🙄

Dear #British people,

You got a new title from #Russia: the biggest warmongers.

#Russian foreign intelligence service called you that accused you of sabotaging #US efforts for peace and blaming you for starting both World Wars - #the_Telegraph.

“It is time to expose them and send a clear signal to the treacherous #Albion and its elites: you will not succeed,” the #SVR intelligence agency stated.

#ukraine #putinisamasskiller #putinisawarcriminal @kardinal691

“US-UK directing attacks on Russian military bases in Syria: SVR”

By Al Mayadeen English

“The Russian Intelligence Service has revealed US-UK plots to further destabilize Syria and the region through continuous occupation and attacks on Russian military bases.”

english.almayadeen.net/news/po

U.S. military vehicle is seen on a patrol in the countryside near the town of Qamishli, Syria, Sunday, Dec. 4, 2022. (AP)
Al Mayadeen English · US-UK directing attacks on Russian military bases in Syria: SVRBy Al Mayadeen English
#Press#US#UK

Russian government hackers are using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group.

In a blog post on Thursday, Google said it is not sure how the Russian government acquired the exploits,
but said this is an example of how exploits developed by spyware makers can end up in the hands of
“dangerous threat actors.”

In this case, Google says the threat actors are , a group of hackers widely attributed to Russia’s Foreign Intelligence Service, or the .

APT29 is a highly capable group of hackers,
known for its long-running and persistent campaigns aimed at conducting espionage and data theft against a range of targets,
including tech giants Microsoft and SolarWinds, as well as foreign governments.

Google said it found the hidden exploit code embedded on Mongolian government websites between November 2023 and July 2024.

During this time, anyone who visited these sites using an iPhone or Android device could have had their phone hacked and data stolen, including passwords, in what is known as a “watering hole” attack.

techcrunch.com/2024/08/29/russ

TechCrunch · Russian government hackers found using exploits made by spyware companies NSO and Intellexa | TechCrunchGoogle said the findings were an example of how exploits developed by spyware makers can end up in the hands of "dangerous threat actors."