top of page

Search Results

67 results found with an empty search

Blog Posts (58)

  • ❗️CYBERATTACK ON KHIMVOLOKNO

    We struck the computer network of Khimvolokno, the largest supplier of nylon yarn in Russia — the material used to make the lining for helmets and body armor for the Russian army. 👊💥 Cyberattack on Khimvolokno — Details We targeted Khimvolokno as part of our campaign against the Lukashenko regime. The plant routinely circumvents EU sanctions and supplies technical polyamide yarn to Russia , where manufacturers use it to produce military-grade fabrics, including body armor and combat helmets. Several former employees of Khimvolokno and its parent company, Grodno Azot, are currently political prisoners under the Lukashenko regime. We launched the operation on February 24, the anniversary of Russia’s full-scale invasion of Ukraine. The cyberoperation lasted about 24 hours. During that time, we moved freely through the company’s network and gained full domain administrator privileges. Domain controller of the Khimvolokno corporate network On the night of February 25–26, we breached the most secure segment of the IT infrastructure — the data center. We destroyed all eight physical servers, along with dozens of critical virtual machines running on them. Khimvolokno data center — security camera footage We disabled domain controllers, servers, virtual machines, and workstations. Some devices now carry “cyber time bombs.” In total, we gained access to roughly 1,000 machines, including servers involved in core production processes. Khimvolokno’s employees can now prepare for forced leave. Office operations, accounting, marketing and sales, shipping, as well as technical and administrative processes have all been disrupted. Extracting marketing and sanctions-evasion supply data from Khimvolokno’s network We took down ERP systems and databases, corporate email, the Directum document management system, backup systems, and more. Recovery will take weeks, and some data is gone for good. Permanent deletion of large-scale data storage systems We also compromised the security and video surveillance systems, which allowed us to monitor Khimvolokno’s operations in real time. We watched employees pull servers out and attempt to “resuscitate” them. Khimvolokno employees attempt to “resuscitate” the data center — security camera footage We are publishing excerpts from the facility’s security cameras, including footage from production areas, offices, corridors, and entry checkpoints. Surveillance footage shows that Khimvolokno’s warehouses are severely overstocked — typically a sign of serious sales problems. Security camera footage from the Khimvolokno facility Security camera footage from the Khimvolokno facility The Lukashenko regime has halted the release of political prisoners and continues to support Putin’s war. If it wants to avoid further cyber sanctions, it must resume releasing hostages and stop aiding the Russian war machine.

  • P-Telegram Without Passcode Lock

    When security services or law enforcement officers see a passcode prompt on the Telegram login screen, they often suspect that the app is P-Telegram. To reduce suspicion, we introduced a passwordless mode. How it works 1️⃣ Enable the feature: Passcode Lock Menu → Choose the Fake Passcode → Passwordless Mode. 2️⃣ Enter your Fake Passcode when opening Telegram. 3️⃣ The app applies all Fake Passcode settings and will NO longer display the passcode screen on startup. 4️⃣ To restore the original setup, type your Real Passcode into the search bar and tap the back arrow. Who may find this useful Anyone who hides channels, chats, or accounts and wants to avoid drawing attention during an inspection. You can keep P-Telegram in decoy mode at all times and enter your real passcode only when you want to access political chats or channels. 🎥 Watch the video attached to the post for detailed instructions. Please share this post so more people learn about the new feature. Stay safe 🙏

  • Accidental Tap Protection in Partisan Telegram

    Worried about accidentally subscribing to a channel or reacting to a comment? Turn on the Accidental Tap Protection  feature. Once enabled, the app will ask you to confirm actions such as: Opening links outside Telegram Joining chats or channels Reacting to messages (excluding channel posts) Posting comments in chats and channels ⚙️ How to enable Settings → Privacy and Security → Passcode Lock → Partisan Settings → Protection against accidental clicks (Enable)

View All

Other Pages (9)

  • Landingpage | CyberPartisans

    Belarusian Cyber Partisans About US The Belarusian Cyber Partisans is a highly organized hacktivist collective that is fighting for the liberation of Belarus from dictatorial rule, the establishment of democratic rights, and the rule of law in the country. The group is known for its various cyberattacks against the Belarusian regime, Russian regime, and Russian military forces on the territory of Belarus. The Cyber Partisans emerged in the wake of the 2020 protests in Belarus against the dictator Lukashenko, who had illegally seized power in the country. There are no professional hackers among us. Most of the participants are regular IT specialists who do not agree with the lawless regime and decided to use their technical expertise to confront the dictatorship within the confines of their abilities. All members of the group remain anonymous since otherwise they and their families will be subject to persecution by Lukashenko’s regime. The only non-anonymous participant and official representative of the group is Yuliana Shemetovets. Yuliana graduated from the Belarusian State University in 2016 with a degree in World Economics from the Faculty of International Relations. She also holds a Master's degree in Political Science from Rutgers University, New Jersey, and a Data Analytics from the University of Harrisburg, Pennsylvania, USA. Yuliana joined the Cyber Partisan group in August 2021 after a successful attack on the Ministry of Internal Affairs of Belarus. The Cyber Partisans collaborate with many human rights organizations and independent journalists, such as Helsinki Committee, Bellingcat, OCCRP, Belarusian Investigative Center, and Belsat. The Cyber Partisans also provide technical support to dozens of opposition groups and create safe means of communication, such as Partisan Telegram and Partisan SMS. Our representative was invited to the panel discussions hosted by Bloomberg, European Cyber Conflict Research Initiative, BBC, Harward, Yale, NYU, Michigan universities, and many more. Since December 2022, the Cyber Partisans have joined forces with the Kastus Kalinouski Regiment, which is fighting in Ukraine as one of the units of the Ukrainian Armed Forces. We engage in cyber offensives targeting adversary infrastructure, performing reconnaissance, and ensuring cybersecurity. Operations & Projects "Heat Wave" The hacktivist operation "Heat Wave" was launched in June 2021. During this high-scale operation, the group successfully obtained and processed a wide range of the Belarusian dictatorship government data: passport database traffic police database violations database of the Ministry of Internal Affairs surveillance database of the Ministry of Internal Affairs video surveillance system of a government detention center etc. This data helps to uncover dictatorship secret service agents infiltrated in Belarusian freedom-fighting organizations, in EU and Ukrainian NGOs and government organizations. Moreover, this data plays a crucial role in the investigation of the crimes of the Belarusian dictatorship regime. "Scorching Heat" We launched a large-scale hacktivist campaign "Scorching Heat" in November 2021. As the result, the working routine of multiple major state organizations and dictatorship-related companies was severely disrupted. The most famous and most important attack we performed is the attack against the Belarusian railway during the beginning of the war in Ukraine. Russian military exploited the Belarusian railway infrastructure to escort their military units to the north Ukrainian front. We hacked railway it-infrastructure and made manual mode the only option to conduct and control railway traffic. The logistics of the Russian army were nearly ruined. Other Other hacktivist operations performed by Cyber Partisans are: hacking dictatorship communication infrastructure (websites, mailboxes and TV-channels) releasing the real COVID-19 mortality numbers in Belarus releasing enhanced-security "Partisan Telegram" application release encrypted SMS application "P-SMS" for secure communication in case of internet outages providing secure communication channels for over 100 freedom-fighting organizations providing secure Internet-communication channels for hundreds of thousand freedom-fighting individuals during internet outages etc. 1 2 3 More Info Source https://twitter.com/maxwsmeets/status/1525108258356498432/ Source https://twitter.com/maxwsmeets/status/1525108258356498432/ Source https://twitter.com/maxwsmeets/status/1525108258356498432/ 1/2 What is hacktivism? Hacktivism is a combination of hacking and activism. It means misusing a computer or the internet, primarily by way of hacking into unauthorized networks, to expose a believed injustice. It’s important to note that protests and activism are a protected activity, while hacking is illegal. People who carried out hacktivism attacks are hacktivists. They generally claim to operate with altruistic intentions, meaning not to cause malicious harm but rather to draw attention to a cause that’s important to the hacktivist group. Hacktivism is much like activism in our physical world, whereby people cause disruption to bring about change. One difference is that the disruption is entirely online and conducted anonymously. Source We conduct our cyber operations with the minimum possible damage to citizens. The safety of ordinary citizens is our priority. Our attacks solely target entities aligned with the dictatorship regime in Belarus and Russia. We do not fulfill commercial orders. Our group works to overthrow the dictatorship in Belarus, and not for personal enrichment. We do not use the data and information received for personal use and selfish purposes. Only for solving crimes and countering dictatorial regimes in Belarus and Russia. We take care of the personal data of Belarusian citizens, and we make every effort to protect their personal data. We only reveal information that is related to the regime and people who committed crimes against Belarusian citizens. Our principles Applications Hundreds of Belarusians were arrested and persecuted because of their anti-dictatorship Internet activity. Free media are completely banned in Belarus. A simple "Like" reaction may lead to years of imprisonment, regular political chatting in a messenger ends with state-sanctioned torture. In the face of dictatorship people of Belarus demand secure ways to communicate with each other and to access freedom media. Bypassing the state's surveillance is crucial. We constantly develop and update our applications to help avoid the political persecution. Partisan Telegram Partisan Telegram (PTG from here on) is a modification (‘fork’) of the well-known messenger Telegram adapted for the purpose of data protection of politically engaged users living under repressive regimes. The adaptation introduces a number of data protection features under various scenarios, including the automatic locking of sensitive data away from being accessed by authorities when a user is being detained. It also features some additional improvements in confidentiality and security for Telegram users. Github Partisan SMS To have the ability to communicate in case of Internet blackouts, we developed P-SMS application. Our application encrypts regular SMS messages with a secret key and no one but the sender and recipient is able to read it. In 2020 during the protests against the dictatorship authorities regularly restricted Internet access for Belarusians. The lack of secure communication was the real problem and we solved that problem for now. Github Activists' stories about Partisan Telegram A year ago, during interrogation, they tried to get into my Telegram [on the phone]. I ‘helped’ them by entering with the fake passcode and showed them through ([during which] dialogues, channels, etc. were all removed [automatically by PTG behind the scenes]). I guess they did not understand or did not show that they noticed that this was a PTG. They simply tried to get through the two-factor authentication. Donation spending report Donations4 Donations4 1/2 Media about CyberPartisans

  • Home | Belarusian Cyber Partisans

    Official website of the Belarusian Cyber Partisans. Latest news about hacks, cyber attacks, data leaks, and investigations. New All N ews > ❗️CYBERATTACK ON KHIMVOLOKNO We struck the computer network of Khimvolokno, the largest supplier of nylon yarn in Russia — the material used to make the lining for helmets and body armor for the Russian army. 👊💥 Cyberattack on Khimvolokno — Details We targeted Khimvolokno as part of our campaign against the Lukashenko regime. The plant routinely circumvents EU sanctions and supplies technical polyamide yarn to Russia , where manufacturers use it to produce military-grade fabrics, including body armor a Hacks P-Telegram Without Passcode Lock When security services or law enforcement officers see a passcode prompt on the Telegram login screen, they often suspect that the app is P-Telegram. To reduce suspicion, we introduced a passwordless mode. How it works 1️⃣ Enable the feature: Passcode Lock Menu → Choose the Fake Passcode → Passwordless Mode. 2️⃣ Enter your Fake Passcode when opening Telegram. 3️⃣ The app applies all Fake Passcode settings and will NO longer display the passcode screen on startup. 4️⃣ To resto Cybersecurity Accidental Tap Protection in Partisan Telegram Worried about accidentally subscribing to a channel or reacting to a comment? Turn on the Accidental Tap Protection feature. Once enabled, the app will ask you to confirm actions such as: Opening links outside Telegram Joining chats or channels Reacting to messages (excluding channel posts) Posting comments in chats and channels ⚙️ How to enable Settings → Privacy and Security → Passcode Lock → Partisan Settings → Protection against accidental clicks (Enable) Cybersecurity Partisan Telegram — Voice Changer Feature Starting with version 4.3.0, Partisan Telegram includes a voice-changing option for calls and audio/video recordings. The feature is turned off by default. Here’s how to enable and use it. 📕 You can find answers to most common questions in the user guide . ⚠️ Please note: modifying your voice does not guarantee anonymity. Technical methods may still allow voice identification. Use this feature thoughtfully and with caution. Download Partisan Telegram disguised as the web ve Cybersecurity One-Tap Deletion of All Your Messages in P-Telegram In P-Telegram (Partisan Telegram) , you don’t have to scroll through chats and delete messages one by one. You can remove all of your messages from a private or group chat with a single tap. Reminder: Clear your messages before leaving a group chat. Otherwise, they may remain available to other participants and could appear in exported account history. How to delete your messages with one tap in P-Telegram 1️⃣ Open the chat and tap the three dots in the corner of the screen. Cybersecurity How to Hide Channels and Chats in Telegram from Prying Eyes If you use Partisan Telegram by Cyber Partisans, you can rename any channel or chat however you like and disable its avatar. This helps protect your privacy in everyday situations — for example, on public transport. If someone glances at your screen, they’ll only see the custom name you chose, which reveals nothing about the channel’s real content. Just follow the steps below to hide channels and chats in Telegram (more precisely, in Partisan Telegram). ⚙️ How to Rename Chann Cybersecurity Belarusian Cyber Partisans The Belarusian Cyber Partisans is a highly organized hacktivist collective that is fighting for the liberation of Belarus from dictatorial rule, the establishment of democratic rights, and the rule of law in the country. The group emerged in the wake of the 2020 protests in Belarus against the dictator Lukashenko, who had illegally seized power in the country. There are no professional hackers among us. Most of the participants are regular IT specialists who do not agree with the lawless regime and decided to use their technical expertise to confront the dictatorship within the confines of their abilities. Our operations Over 50 public known cyber operations against dictatorship regimes. However, dozens of the most successful ones have not been disclosed to maintain access to sensitive systems. Hundreds of investigations by independent journalists have been made possible due to the operations conducted by the Cyber Partisans. > 10,000 downloads of Partisan Telegram, a messenger for safe communication between activists. More than 100 Telegram chatbots for independent media and protest organizations in Belarus FAQ What are the goals of the Cyber Partisans? To overthow the dictatorship regime of Lukashenko. To preserve the independence and territorial integrity of Belarus. To stabilize Belarus during the transition period, returning to democratic principles of governance and rule of law. How do the Cyber Partisans choose targets for attacks? Attacks are intended to minimize harm to ordinary citizens and maximize to regime's people. Targets are selected in a manner that genuinely damages dictaroship regimes or acquires important information that aids in causing such damage. We do not operate on systems unrelated to dictatorship regimes. We work within our means. Not all networks can be accessed. However, the more people and resources we have, the broader the range of targets available to us. Within the group, we define a common strategy. Periodically, we gather and prioritize goals based on the current political climate. Our hacktivists then work in line with the approved strategy. Can one order a cyberattack, hack, or information search from you? We do not accept commercial orders. All targets for attacks are chosen in a way that brings us closer to achieving the organization's main goals. How do you assist journalists? Thanks to hacks on structures supporting the dictators Lukashenko and Putin, the Cyber Partisans have obtained a vast amount of databases and documents. This information sheds light on the crimes of dictatorship regimes in Belarus and Russia. All data, which do not compromise the confidentiality and safety of ordinary citizens, are handed over upon request for journalistic investigations. Is it safe to install Partisan Telegram for communication? Partisan Telegram has undergone an independent security audit. Moreover, the application offers the maximum possible settings to disguise itself as the original Telegram. For activists' safety, we have also implemented a passwordless mode feature. If this option is activated, the application does not prompt for the code-password, which could raise suspicion among law enforcement and intelligence personnel. However, Partisan Telegram can be identified through a detailed forensic analysis of the device. We recommend considering this before installing the application. Do the Cyber Partisans provide paid services? All organizations, activists, and individuals adhering to democratic principles can expect our free assistance that aligns with our principles. However, due to our limited resources, immediate and/or long-term information-providing services are only available on a paid basis. For the details and contacts, please refer to the 'Contacts and Donations' section. What financial resources does the group have? The primary source of funds is financial assistance from private donors who care about the fate of Belarus. Any assistance is valuable and propels us toward achieving our main goals. What assistance will be most effective for Cyber Partisans? As a non-commercial volunteer organization, the best assistance for us would be donations of any amount acceptable to you. Funds are needed to support servers with databases, feedback bots, equipment, and the work of specialists. See the details in the 'Contacts and Donations' section. You can also make a significant contribution by joining our volunteer team. To do this, write to our bot @cpartisans_join_bot. Let's free Belarus from dictatorship! Help financially ➤ To become a cyber partisan ➤

  • About Us | Belarusian Cyber Partisans

    The Cyber Partisans is a group of hacktivists fighting against dictatorship and lawlessness in Belarus. Belarusian Cyber Partisans The Belarusian Cyber Partisans is a highly organized hacktivist collective that is fighting for the liberation of Belarus from dictatorial rule, the establishment of democratic rights and the rule of law in the country. The group emerged in the aftermath of the 2020 protests in Belarus against the tyrant Lukashenko, who had unlawfully taken control of the country. There are no professional hackers among us; most participants are ordinary IT specialists who are unwilling to tolerate lawlessness and are committed to combating dictatorship in any feasible way. All members of the group remain anonymous since otherwise they and their families will be subject to persecution by Lukashenko’s regime. The only non-anonymous participant and official representative of the group is Yuliana Shemetovets. Yuliana graduated from the Belarusian State University in 2016 with a degree in World Economics from the Faculty of International Relations. She also holds a Master's degree in Political Science from Rutgers University, New Jersey, and a Data Analytics from the University of Harrisburg, Pennsylvania, USA. Yuliana joined the Cyber Partisan group in August 2021 after a successful attack on the Ministry of Internal Affairs of Belarus. Since December 2022, the Cyber Partisans have joined forces with the Kastus Kalinouski Regiment , which is fighting in Ukraine as one of the units of the Ukrainian Armed Forces. We engage in cyber offensives targeting adversary infrastructure, performing cyber intelligence, and ensuring cybersecurity. Our Code Cyberpartisans is a group of activists who, in the face of harsh political repression in Belarus, have chosen the only possible form of civil protest and resistance: fighting the structures of Lukashenko's regime online. We are a hacktivist organisation, not a hacker organisation. We bring together specialists from different professions and do not specialise in commercial orders. We work to overthrow the dictatorship in Belarus, not for personal gain. We recognise that there are no ethical criteria for hacktivism, as it is a new method of resistence against dictatorial regimes and warfare. Therefore, we constantly analyse our work and are open to communication with independent experts. We have also developed our own Code of Conduct as a moral guideline that we adhere to. We conduct cyber operations with the minimum possible harm to ordinary Belarusians. Protecting the safety of Belarusian citizens who do not support the Lukashenko regime is our priority. Our work is conducted with equal respect for the rights of all participants, regardless of their nationality, religion, gender or any other affiliation. We do not use the obtained information for personal gain. Only for solving crimes and countering dictatorial regimes in Belarus and Russia. We take care of the personal data of Belarusian citizens, and we make every effort to protect their personal data. We only reveal information that is related to the regime and people who committed crimes against Belarusian citizens. Download the full version of the Code in PDF Our operations As our fight persists, we are unable to discuss the majority of our hacks, access to sensitive systems, and data that we have. Among the publicized operations, the most remarkable ones include: September 26, 2020 Hacking of state-run news websites The group hacked the transmissions of Belarus' state channels (ONT and Belarus-1), which regularly disseminated content in favor of the Lukashenko regime. They broadcasted videos featuring scenes of torture inflicted on individuals detained by Interior Ministry officers during peaceful protests in August 2020. July 26-30, 2021 The beginning of Operation Heat Hacking of numerous state databases of Belarus, including the traffic police database, the AIS Passport system, the database recording citizens' appeals to the Ministry of Internal Affairs, and the operational drone video recordings service of the Ministry of Internal Affairs, among others. August 9, 2021 Hacking of the servers of the Department of Operational and Investigative Activity Provision of the Ministry of Internal Affairs of the Republic of Belarus The group successfully infiltrated the database of the Department of Operational and Investigative Activity Provision under the Ministry of Internal Affairs of Belarus. Consequently, we obtained terabytes of phone conversation records of Belarusian citizens, unveiling extensive surveillance orchestrated by entities controlled by the dictator Lukashenko. August 29, 2021 Hacking of phone databases of all operators in Belarus The group hacked databases containing details of all mobile numbers in Belarus September 2, 2021 Hacking of Unified State Register of Real Estat databases The Unified State Register of Real Estate was hacked. The group gained access to information about all real estate in Belarus. November 1, 2021 Hacking of the Social Security Fund database The National Social Security Fund was hacked. The group obtained access to records concerning official employment in Belarus and the corresponding salary information. November 8, 2021 Hacking of the Passenger Trafic Database November 17, 2021 The beginning of Operation Heat. The group obtained access to information about all individuals who crossed the border of Belarus through official checkpoints. Hacking of the internal network of the Academy of Public Administration of Belarus (so-called Lukashenko’s personal school). November 29, 2021 Cyberattack on the computer network of Belaruskali, one of the largest state-owned companies of Belarus. It used to be one of the largest producers of potash fertilizers in the world. We encrypted the computers and servers of the academy. We set wallpapers on the computers in honor of Roman Bondarenko - a Belarusian who was killed by employees of the Ministry of Internal Affairs after a peaceful protest in the yard of his own home. November 30, 2021 Hacking of the wiretapped conversations within prison cells in Belarus Obtained recordings of conversations from prisoners in Belarus, which were illegally created by prison staff. December 10, 2021 Cyberattack on the computer network of "MogilevTransMash", the largest car company in Belarus The internal network of the enterprise was encrypted, all databases were downloaded. Wallpapers in honor of Andrey Zeltser, a protester killed by KGB employees, were installed on the computers of the staff. January 24, 2022 Cyberattack on the computer network of the Belarusian Railway The primary part of servers, databases, and workstations was encrypted to slow down and disrupt the operations of the Belarusian Railway, through which Russian occupation forces were permitted. Backups were destroyed. Automation and security systems were intentionally NOT affected by the cyberattack to prevent emergency situations. February 27, 2022 Attack on communication nodes and gateways of the Belarusian Railway Restriction on the movement of Russian military equipment through the territory of Belarus towards the borders of Ukraine. November 18, 2022 Cyberattack on the General Radio Frequency Centre, a subdivision of Roskomnadzor We encrypted workstations and extracted over 2 TB of data, which was then passed on to journalists from independent media. This exposure led to the revelation of extensive surveillance by Roskomnadzor of individuals who don't support the Kremlin's policies. May 22, 2023 Cyberattack on "WAGON-SERVICE", Russian logistic company "WAGON-SERVICE" logistics company maintains trains for Russian Railways, which in turn supplies military equipment and ammunition to the front. Workstations were encrypted. All document flow, emails, and data from servers (over 2 TB) were extracted. July 4, 2023 Cyberattack on the Belarusian State University The university's administration is involved in the political suppression of both students and faculty members. Workstations have been encrypted, and more than 3 terabytes of data have been downloaded. All websites were inaccessible. December 31, 2023 Attack on the Belarusian Telegraphic Agency The computer network of the main state propagandists of Lukashenko's criminal regime was attacked. Internal network and main sites hacked. (web archive available here ). Domain controllers affected. Downloaded 90GB of data. Cleared workstations, archives, backups, website servers. April 17, 2024 Cyber Attack on "Grodno Azot" "Grodno Azot" is one of the largest enterprises in Belarus. It's an open joint-stock company, state-run producer of nitrogen compounds and fertilizers. The management of "Grodno Azot" is engaged in political repression against workers and circumvents economic sanctions imposed by Western countries for supporting the Lukashenko regime. Internal emails, document circulation, and hundreds of workstations have been encrypted. Backups of databases, servers, emails, and document circulation have been destroyed. Security systems and surveillance cameras have been breached. The operation of the boiler room has been disrupted. The official website has been targeted (web archive accessible via link ). April 26, 2024 Breach of Belarusian KGB Website We announced that the Belarusian State Security Committee (KGB) website was hacked in the fall of 2023. The database of the website has been made public, which includes approximately 40 thousand inquiries to the KGB from citizens of various countries between September 2014 and August 2023. May 5, 2024 Second Cyber-Attack on Grodno Azot The management of the Grodno Azot plant engages in political repression against workers and circumvents economic sanctions imposed by Western countries for supporting the Lukashenko regime. Our group has erased data from many hundreds of worker computers, cleared document circulation, and affected domain controllers and other servers. March 25, 2025 Hack of the CERT Website — Incident Response Team Under Control of Belarus’s Operational and Analytical Center (OAC) The group announced that the CERT website, the national incident response team controlled by the OAC of dictator Lukashenko, was breached. July 28, 2025 Cyberattack on Russian Aeroflot Aeroflot flights were paralyzed for more than a day. Over 7,000 servers and workstations in the Sheremetyevo and Melkisarovo offices, as well as related data centers, were destroyed. Databases and information systems, along with other elements of the corporate network infrastructure, were wiped. Numerous databases, employee wiretaps, emails, and much more were extracted. February 26, 2026 Cyberattack on the Khimvolokno Plant in Grodno We struck the computer network of the Khimvolokno plant in Grodno — the largest supplier to Russia of nylon threads used to make the lining for helmets and body armor for the Russian army. Domain controllers, servers, virtual machines, and workstations were destroyed. Office operations were disrupted, including accounting, marketing and sales, shipments, as well as technical and administrative processes. We also breached the plant’s security systems, including surveillance cameras and access control checkpoints. Media about Cyber Partisans

View All
  • Telegram-icon-on-transparent-background-PNG_edited
  • Twitter
  • Youtube

© 2026 by CyberPartisans

bottom of page