Ukrainian Cyber Alliance: Difference between revisions

beginning copy edit
m (v2.03b - Bot T5 CW#16 - WP:WCW project (Unicode control characters))
(beginning copy edit)
{{Multiple issues|
<!--{{Copy edit|for=grammar and coherence|date=July 2020}}-->
{{POV|date=July 2020}}
'''The Ukrainian Cyber Alliance''' (UCA, [[Ukrainian language|ukr.]] ''Український кіберальянс'', УКА) is a community of Ukrainian [[Internet activism|cyber activists]] from various cities in Ukraine and around the world. The alliance emerged in the spring of 2016 from the merger of two cyber activists, FalconsFlame and Trinity, and was later joined by a group of cyber activists RUH8 and individual cyber activists from the CyberHunt group<ref>{{Cite web|date=2016-12-06|title=Український кіберальянс (Ukrainian Cyber Alliance)|url=|access-date=2020-03-08| (Українська)|language=uk}}</ref>. The hacktivists[[hacktivist]]s united to counter Russian aggression in Ukraine.{{Infobox website
| name = Ukrainian Cyber Alliance
| logo = Ukrainian Cyber Alliance.png
== Participation in the Russian-Ukrainian cyber war ==
{{Main|Russian-Ukrainian cyberwarfare}}
The hacktivists[[hacktivist]]s began to apply their knowledge to protect Ukraine in cyberspace in the spring of 2014.<ref>{{Cite web|date=2016-10-30|title=RUH8 про український хактивізм, кібервійну та операцію SurkovLeaks (ексклюзивне інтерв'ю)|url=|access-date=2020-03-08| (Українська)|language=uk}}</ref>. Over time, there was an understanding that individual attacks of war could not be won, and the hacktivists began to conduct joint operations. Gradually, some hacker groups united in the Ukrainian Cyber Alliance, so that(UCA), in accordance with {{abbr|Art. |article}}&nbsp;17 of the [[Constitution of Ukraine]] to defend the independence of their country, and its territorial integrity, because itas is the duty of every citizen.<ref>{{Citation|last=Euromaidan Press|title="We have no need for CIA help" - Ukrainian hackers of #SurkovLeaks {{!}} Exclusive interview|date=2016-11-02|url=|access-date=2017-07-23}}</ref><ref>{{Cite web|title=Кібервійна: партизани України проти військ Росії|url=|access-date=2020-03-08|website=Радіо Свобода|language=uk}}</ref><ref>{{Cite web|last=|first=|date=|title=Привиди львівського метро|url=|access-date=2020-03-08||publisher=|language=}}</ref>. The Ukrainian Cyber Alliance exclusively transmits the extracted data for analysis, reconnaissance and publication to the international intelligence community [[Inform Napalm]], as well as to the law enforcement agencies of Ukraine.<ref>{{Cite news|title=Кібервоїн Jeff: Це перша у світі кібервійна, і ми в ній воююча сторона – відео|language=uk-UA|work=5 канал|url=|access-date=2017-07-23}}</ref>.
== The most famousNotable operations of the Ukrainian Cyber Alliance ==
=== Operation #opDonbasLeaks ===
In the spring of 2016, the UkrainianUCA Cyber Alliance carried outconducted about aone hundred successful hacks of pages and mailboxes of militants, propagandists, their curators, as well asand hacked mailboxes of terrorist organizations operating in the occupied territories. The hacktivists also hacked the mailbox of the Russian organization «"Union of Volunteers of Donbass»". PassportFrom this was obtained passport data, photosand ofphoto documents of citizens of Italy, Spain, India and Finland, who are fighting in the ranks of the ghost «[[Prizrak» Brigade]], for which Russia opens and, if necessary, extends visas.<ref>{{Cite web|date=2016-04-03|title=Росія відкриває візи для терору в Україні — витік паспортних даних найманців|url=|access-date=2020-03-08| (Українська)|language=uk}}</ref>. It turnedwas outfound that Russian terrorists who were wounded during the fighting in eastern Ukraine arewere being treated in military hospitals of the Ministry of Defense.<ref>{{Cite web|date=2016-04-07|title=Медичні послуги для VIP-найманців Росії. Листування, документи, ідентифікація бойовиків|url=|access-date=2020-03-08| (Українська)|language=uk}}</ref><ref>{{Cite web|date=2016-04-08|title=Хакери та OSINT-аналітики розкрили подробиці гібридної історії військового ЗС Росії|url=|access-date=2020-03-08| (Українська)|language=uk}}</ref>.
=== Hacking of the propaganda site «AnnaANNA News» ===
On April 29, 2016, the [[Inform Napalm]] website, with a call to the Ukrainian Cyber AllianceUCA, reported on the hacking and interface of the Anna[[Abkhazian Network News Agency]] (ANNA News) propagandist news agency.<ref>{{Cite web|date=2016-04-29|title=Хакери знищили сайт російських пропагандистів «Anna News» і розмістили відеозвернення|url=|access-date=2020-03-08| (Українська)|language=uk}}</ref>. As a result of the hacking, the site did not work for more than 5 &nbsp;days. The hacktivists posted their first video message on the site's pages,<ref></ref>, in which they used the [[Lviv Metro]] meme. VideoThe message textstated (translation):
{{Cquote|“HiHi everyone. You are at the Lviv metro station. And this is a video appeal of Ukrainian hackers to our enemies and allies. If you are watching this video, then we have cleared the information space of another Russian terrorists site. Now we turn to the enemies. Today we have removed all confidential information from your resource. Your data of administrators and users were transferred to Inform Napalm volunteer intelligence, and also sent to the Ukrainian special services. Backups of your site were destroyed, they remained only with us. We give you one last chance to start from scratch and no longer use the information space for lies and terror. We turn to the allies. Friends! Georgia, Ukraine and Syria have faced vile terrorist aggression by the Russian Federation. Many of us have lost our homes, families and loved ones. But the key to victory over the aggressor is in the consolidation of society. We are ordinary programmers, engineers and volunteers. Our weapons are reason, faith and free will. Each of you can inflict losses on the enemy. Do not buy Russian goods, do not trust the Russian media. Support the Ukrainian military and patriots. Help those who need help and protection. Support each other. Together we are the force that will win the war against a vile and lying enemy. Glory to Ukraine!
}}{{longquote|date=September 2020}}
=== Operation #OpMay9 ===
On May 9, 2016, the Ukrainian Cyber AllianceUCA conducted Operationoperation #OpMay9.<ref>{{Cite web|date=2016-05-09|title=9 зломів 9 травня: українські хакери успішно провели операцію #OpMay9 (ВІДЕО)|url=|access-date=2020-03-08| (Українська)|language=uk}}</ref><ref>{{Cite web|title=Українські хакери зламали дев'ять сайтів ДНР на День перемоги|url=|access-date=2020-03-08|website=РБК-Украина|language=ru}}</ref>. Nine sites of [[Donetsk People's Republic]] (DNR) terrorists, propagandists, and Russian private military companies (RPMCs) were hacked. BrokenThe broken sites were injectedleft with «serum of truth» - hackers left the hashtags #OpMay9 and #oп9Травня and three short videos about World War &nbsp;II and the[[Ukraine contributionin ofWorld theWar II|Ukrainian peoplecontributions to the victory over Nazism]] – what UCA called the "serum of truth".<ref>{{Cite web|date=2016-05-10|title=Українські хакери до Дня Перемоги зламали сепаратистські та російські сайти|url=|access-date=2020-03-08|website=ТСН.ua|language=uk}}</ref>. The hacktivists also posted their new video message on the broken resources of terrorists<ref></ref>. Video message text:
{{Cquote|“GodGod forbid. And we are in the Lviv metro again. After our previous video on April 29, some viewers decided we were joking. But we are not joking, we are speaking quite seriously. After our last attack, the popular site of aggressive Russian propaganda Anna News was unavailable for about 5 days. It is an information resource aimed at spreading lies against Georgia, Ukraine and Syria. Our first video call hung on this site for more than 5 hours, and the administrators took more than 100 hours to at least partially restore the resource. At the same time, they lost much of their data forever. It was our small gift to society for the Great Feast of the Resurrection of Christ. We have shown how light easily destroys darkness. We have enough strength and will to successfully defeat the aggressor, we just need to believe and work hard for everyone to win together. And now about the victory. Kievan Rus, and then its successor Ukraine, the Cossacks of the Zaporozhian Sich and the Kholodny Yar, soldiers of the Ukrainian Insurgent Army and Ukrainians in the ranks of the Allied armies. These are our ancestors who fought with unbreakable strength of will and shed blood for their land and freedom. 70 &nbsp;years ago, the Ukrainian people lost about 7 &nbsp;million of their sons and daughters in the fight against the aggressor and the occupier. Now a new brown plague has come to our borders, disguised by the colors of striped ribbons and Russian tricolors. But no matter how strong the enemy may seem, his destiny is to be defeated and covered with shame. The Ukrainian people, their soldiers, patriots, volunteers have already proved that the indomitable will is embedded in their genetic code. Today, on the Day of Remembrance and Victory, we are giving a new gift to Ukrainian society. On this day, the entire network of information resources of the aggressor and the sites of Russian terrorists in Donbass will be paralyzed. This video message and other materials exposing the occupiers' lies will appear on many enemy websites. We won then, we will win now. To the glory of ancestors, to the glory of the heroes of the past and the future. Glory to Ukraine!"
}}{{longquote|date=September 2020}}
=== Operation #opMay18 ===
On May 18, 2016, on the day of remembrance of the tragic events of the [[deportation of the Crimean Tatar peopleTatars]] in 1944, the Ukrainian Cyber AllianceUCA conducted Operation # opMay18.<ref>{{Cite web|title=Архівована копія|url=|archive-url=|archive-date=8 October 2017|access-date=23 July 2017}}</ref><ref>{{Cite web|title=Hackers' #opMay18 operation: Aksyonov "deplores" Crimea deportation, "thanks" Jamala|url=|access-date=2020-03-08||language=en}}</ref>. AsIt a result of operationtargeted the protegewebsite of the occupying Russian forces appointed to a position of so-called «chairman of council of ministers of the [[Republic of Crimea»]], [[Sergey AksonovAksyonov]], receivedputting «truthin serum»his voice the fraudulent message:<ref>{{Cite web|date=2016-05-18|title=Українські хакери провели в Криму операцію #opMay18|url=|access-date=2020-03-08| (Українська)|language=uk}}</ref> and stated:
{{Cquote|"Dear citizens of Crimea, today I propose to honor the memory of those difficult days of 1944 and make every effort to prevent such tragic events again. Currently, the international situation is such that in 2017, Russians can be deported from the Crimea. In conclusion, I want to say that I am very glad that the Crimean Tatar singer Jamala won the Eurovision-2016 contest, and I look forward to the successful holding of Eurovision-2017 in Ukraine, namely in the Crimea."
=== «PervyyChannel kanal»One hacking ===
UkrainianThe CyberallianceUCA hacked the website of «Pervyy[[Pervy kanal»Kanal]] of(Channel theOne Russian FederationRussia), according to hacktivists, as part of a project to force Russia to deoccupy Donbass and fulfill its obligations under the [[Minsk agreementsagreement]]s.<ref></ref>. Details of the work of Russian «PervyyPervy kanal»Kanal propagandist Serhiy Zenin,'s incooperation particular,with aboutRussian hisstate-owned cooperationpropaganda withnetwork [[RT (TV network)|Russia Today,]] were also revealed. Documents obtained by the UCA show, thatalong with an official salarydocumentation of 100 thousand rubles, Zenin's hassalary anand apartmentlavish worth 450 thousand euros, three cars, resting on the Cote d'Azurlifestyle.<ref>{{Cite web|title=Українські хакери зламали дані та листування пропагандиста Путіна|url=|access-date=2020-03-08|website=Апостроф|language=uk}}</ref>. In Sergey Zenin's cloud storage 25were rollersfound on25 which shootingvideos of DNR terrorists ofshooting «DNR» onin the settlement of Nikishine of Donetsk region was filmed.<ref>{{Cite web|date=2016-06-16|title=Злом пропагандистів РФ. Частина 3: обстріл Нікішиного|url=|access-date=2020-03-08| (Українська)|language=uk}}</ref>.
=== Operation #opDay28 ===
In 2016, on the eve of [[Constitution Day (Ukraine)|Constitution Day]], the Ukrainian CyberallianceUCA conducted Operationoperation #opDay28.<ref>{{Cite web|title=Хакери зломали 17 російських сайтів: Захарченко і Плотницький вибачаються перед українцями|url=|access-date=2020-03-08||language=uk}}</ref>. 17 resources of Russian terrorists were hacked, a new video from Lviv Metro was posted on the hacked sites<ref></ref>. On behalf of the leader of the terrorist organization «DNR» O. Zakharchenko, the hacktivists published the following appeal on the broken resources<ref>{{Cite web|date=2016-06-28|title=Українські хакери провели операцію #opDay28|url=|access-date=2020-03-08| (Українська)|language=uk}}</ref>:{{Cquote|"On June 28, Ukraine celebrates another anniversary of the adoption of the Constitution. But now this holiday is overshadowed by the conflict in Donbass, which we, inferior fools, have resolved, and caused numerous violations of the constitutional rights of normal citizens. I have to admit that despite the work done by my stupid press service and loyal sly dogs of the mdb dnr, the whole world sees that we started playing not in our sandbox, because of which the civilian population of Donbass suffers and dies. The truth is that Rashka has once again framed us and is trying to squeeze the Donbass after the Crimea with our own hands. I personally apologize to all the people of Ukraine for their idiocy and I hope that this anniversary of the Constitution of Ukraine will be a turning point in the relations of Donbass with its Motherland - Ukraine! Contrary to racist propaganda, we are cured of schizophrenia, and the Ukrainian constitutional order will prevail in the Donbass! ”