top of page

Search Results

6 items found for ""

  • Landingpage | CyberPartisans

    Belarusian Cyber Partisans About US The Belarusian Cyber Partisans is a highly organized hacktivist collective that is fighting for the liberation of Belarus from dictatorial rule, the establishment of democratic rights, and the rule of law in the country. The group is known for its various cyberattacks against the Belarusian regime, Russian regime, and Russian military forces on the territory of Belarus. The Cyber Partisans emerged in the wake of the 2020 protests in Belarus against the dictator Lukashenko, who had illegally seized power in the country. There are no professional hackers among us. Most of the participants are regular IT specialists who do not agree with the lawless regime and decided to use their technical expertise to confront the dictatorship within the confines of their abilities. All members of the group remain anonymous since otherwise they and their families will be subject to persecution by Lukashenko’s regime. The only non-anonymous participant and official representative of the group is Yuliana Shemetovets. Yuliana graduated from the Belarusian State University in 2016 with a degree in World Economics from the Faculty of International Relations. She also holds a Master's degree in Political Science from Rutgers University, New Jersey, and a Data Analytics from the University of Harrisburg, Pennsylvania, USA. Yuliana joined the Cyber Partisan group in August 2021 after a successful attack on the Ministry of Internal Affairs of Belarus. The Cyber Partisans collaborate with many human rights organizations and independent journalists, such as Helsinki Committee, Bellingcat, OCCRP, Belarusian Investigative Center, and Belsat. The Cyber Partisans also provide technical support to dozens of opposition groups and create safe means of communication, such as Partisan Telegram and Partisan SMS. Our representative was invited to the panel discussions hosted by Bloomberg, European Cyber Conflict Research Initiative, BBC, Harward, Yale, NYU, Michigan universities, and many more. Since December 2022, the Cyber Partisans have joined forces with the Kastus Kalinouski Regiment, which is fighting in Ukraine as one of the units of the Ukrainian Armed Forces. We engage in cyber offensives targeting adversary infrastructure, performing reconnaissance, and ensuring cybersecurity. Operations & Projects "Heat Wave" The hacktivist operation "Heat Wave" was launched in June 2021. During this high-scale operation, the group successfully obtained and processed a wide range of the Belarusian dictatorship government data: passport database traffic police database violations database of the Ministry of Internal Affairs surveillance database of the Ministry of Internal Affairs video surveillance system of a government detention center etc. This data helps to uncover dictatorship secret service agents infiltrated in Belarusian freedom-fighting organizations, in EU and Ukrainian NGOs and government organizations. Moreover, this data plays a crucial role in the investigation of the crimes of the Belarusian dictatorship regime. "Scorching Heat" We launched a large-scale hacktivist campaign "Scorching Heat" in November 2021. As the result, the working routine of multiple major state organizations and dictatorship-related companies was severely disrupted. The most famous and most important attack we performed is the attack against the Belarusian railway during the beginning of the war in Ukraine. Russian military exploited the Belarusian railway infrastructure to escort their military units to the north Ukrainian front. We hacked railway it-infrastructure and made manual mode the only option to conduct and control railway traffic. The logistics of the Russian army were nearly ruined. Other Other hacktivist operations performed by Cyber Partisans are: hacking dictatorship communication infrastructure (websites, mailboxes and TV-channels) releasing the real COVID-19 mortality numbers in Belarus releasing enhanced-security "Partisan Telegram" application release encrypted SMS application "P-SMS" for secure communication in case of internet outages providing secure communication channels for over 100 freedom-fighting organizations providing secure Internet-communication channels for hundreds of thousand freedom-fighting individuals during internet outages etc. 1 2 3 More Info Source https://twitter.com/maxwsmeets/status/1525108258356498432/ Source https://twitter.com/maxwsmeets/status/1525108258356498432/ Source https://twitter.com/maxwsmeets/status/1525108258356498432/ 1/2 What is hacktivism? Hacktivism is a combination of hacking and activism. It means misusing a computer or the internet, primarily by way of hacking into unauthorized networks, to expose a believed injustice. ​ It’s important to note that protests and activism are a protected activity, while hacking is illegal. ​ People who carried out hacktivism attacks are hacktivists. They generally claim to operate with altruistic intentions, meaning not to cause malicious harm but rather to draw attention to a cause that’s important to the hacktivist group. ​​ Hacktivism is much like activism in our physical world, whereby people cause disruption to bring about change. One difference is that the disruption is entirely online and conducted anonymously. ​ Source We conduct our cyber operations with the minimum possible damage to citizens. The safety of ordinary citizens is our priority. Our attacks solely target entities aligned with the dictatorship regime in Belarus and Russia. We do not fulfill commercial orders. Our group works to overthrow the dictatorship in Belarus, and not for personal enrichment. We do not use the data and information received for personal use and selfish purposes. Only for solving crimes and countering dictatorial regimes in Belarus and Russia. We take care of the personal data of Belarusian citizens, and we make every effort to protect their personal data. We only reveal information that is related to the regime and people who committed crimes against Belarusian citizens. Our principles Applications Hundreds of Belarusians were arrested and persecuted because of their anti-dictatorship Internet activity. Free media are completely banned in Belarus. A simple "Like" reaction may lead to years of imprisonment, regular political chatting in a messenger ends with state-sanctioned torture. In the face of dictatorship people of Belarus demand secure ways to communicate with each other and to access freedom media. Bypassing the state's surveillance is crucial. We constantly develop and update our applications to help avoid the political persecution. Partisan Telegram Partisan Telegram (PTG from here on) is a modification (‘fork’) of the well-known messenger Telegram adapted for the purpose of data protection of politically engaged users living under repressive regimes. The adaptation introduces a number of data protection features under various scenarios, including the automatic locking of sensitive data away from being accessed by authorities when a user is being detained. It also features some additional improvements in confidentiality and security for Telegram users. Github Partisan SMS To have the ability to communicate in case of Internet blackouts, we developed P-SMS application. Our application encrypts regular SMS messages with a secret key and no one but the sender and recipient is able to read it. In 2020 during the protests against the dictatorship authorities regularly restricted Internet access for Belarusians. The lack of secure communication was the real problem and we solved that problem for now. Github Activists' stories about Partisan Telegram A year ago, during interrogation, they tried to get into my Telegram [on the phone]. I ‘helped’ them by entering with the fake passcode and showed them through ([during which] dialogues, channels, etc. were all removed [automatically by PTG behind the scenes]). I guess they did not understand or did not show that they noticed that this was a PTG. They simply tried to get through the two-factor authentication. Donation spending report Donations4 Donations4 1/2 Media about CyberPartisans

  • About Us | Belarusian Cyber Partisans

    Belarusian Cyber Partisans The Belarusian Cyber Partisans is a highly organized hacktivist collective that is fighting for the liberation of Belarus from dictatorial rule, the establishment of democratic rights and the rule of law in the country. The group emerged in the aftermath of the 2020 protests in Belarus against the tyrant Lukashenko, who had unlawfully taken control of the country. There are no professional hackers among us; most participants are ordinary IT specialists who are unwilling to tolerate lawlessness and are committed to combating dictatorship in any feasible way. All members of the group remain anonymous since otherwise they and their families will be subject to persecution by Lukashenko’s regime. The only non-anonymous participant and official representative of the group is Yuliana Shemetovets. ​ Yuliana graduated from the Belarusian State University in 2016 with a degree in World Economics from the Faculty of International Relations. She also holds a Master's degree in Political Science from Rutgers University, New Jersey, and a Data Analytics from the University of Harrisburg, Pennsylvania, USA. Yuliana joined the Cyber Partisan group in August 2021 after a successful attack on the Ministry of Internal Affairs of Belarus. Our principles The Belarusian Cyber Partisans is a group of activists who, under conditions of severe political repression in Belarus, have chosen the only possible form of civil protest and resistance: challenging the institutions of Lukashenko's regime through online means. We are unequivocally a group of hacktivists, not a hacking organization, bringing together professionals from various fields without any commercial objectives. We do not conduct attacks that could endanger people's health and safety. Our targets are solely entities that support the dictatorial regime. We do not carry out commercial orders. Our group works to overthrow the dictatorship in Belarus, and not for personal enrichment. We do not use the obtained information for personal gain. Only for solving crimes and countering dictatorial regimes in Belarus and Russia. We take care of the personal data of Belarusian citizens, and we make every effort to protect their personal data. We only reveal information that is related to the regime and people who committed crimes against Belarusian citizens. Our operations As our fight persists, we are unable to discuss the majority of our hacks, access to sensitive systems, and data that we have. Among the publicized operations, the most remarkable ones include: September 26, 2020 Hacking of state-run news websites The group hacked the transmissions of Belarus' state channels (ONT and Belarus-1), which regularly disseminated content in favor of the Lukashenko regime. They broadcasted videos featuring scenes of torture inflicted on individuals detained by Interior Ministry officers during peaceful protests in August 2020. July 26-30, 2021 The beginning of Operation Heat Hacking of numerous state databases of Belarus, including the traffic police database, the AIS Passport system, the database recording citizens' appeals to the Ministry of Internal Affairs, and the operational drone video recordings service of the Ministry of Internal Affairs, among others. August 9, 2021 Hacking of the servers of the Department of Operational and Investigative Activity Provision of the Ministry of Internal Affairs of the Republic of Belarus The group successfully infiltrated the database of the Department of Operational and Investigative Activity Provision under the Ministry of Internal Affairs of Belarus. Consequently, we obtained terabytes of phone conversation records of Belarusian citizens, unveiling extensive surveillance orchestrated by entities controlled by the dictator Lukashenko. August 29, 2021 Hacking of phone databases of all operators in Belarus The group hacked databases containing details of all mobile numbers in Belarus September 2, 2021 Hacking of Unified State Register of Real Estat databases The Unified State Register of Real Estate was hacked. The group gained access to information about all real estate in Belarus. November 1, 2021 Hacking of the Social Security Fund database The National Social Security Fund was hacked. The group obtained access to records concerning official employment in Belarus and the corresponding salary information. November 8, 2021 Hacking of the Passenger Trafic Database November 17, 2021 The beginning of Operation Heat. The group obtained access to information about all individuals who crossed the border of Belarus through official checkpoints. Hacking of the internal network of the Academy of Public Administration of Belarus (so-called Lukashenko’s personal school). November 29, 2021 Cyberattack on the computer network of Belaruskali, one of the largest state-owned companies of Belarus. It used to be one of the largest producers of potash fertilizers in the world. We encrypted the computers and servers of the academy. We set wallpapers on the computers in honor of Roman Bondarenko - a Belarusian who was killed by employees of the Ministry of Internal Affairs after a peaceful protest in the yard of his own home. November 30, 2021 Hacking of the wiretapped conversations within prison cells in Belarus Obtained recordings of conversations from prisoners in Belarus, which were illegally created by prison staff. December 10, 2021 Cyberattack on the computer network of "MogilevTransMash", the largest car company in Belarus The internal network of the enterprise was encrypted, all databases were downloaded. Wallpapers in honor of Andrey Zeltser, a protester killed by KGB employees, were installed on the computers of the staff. January 24, 2022 Cyberattack on the computer network of the Belarusian Railway The primary part of servers, databases, and workstations was encrypted to slow down and disrupt the operations of the Belarusian Railway, through which Russian occupation forces were permitted. Backups were destroyed. Automation and security systems were intentionally NOT affected by the cyberattack to prevent emergency situations. February 27, 2022 Attack on communication nodes and gateways of the Belarusian Railway Restriction on the movement of Russian military equipment through the territory of Belarus towards the borders of Ukraine. November 18, 2022 Cyberattack on the General Radio Frequency Centre, a subdivision of Roskomnadzor We encrypted workstations and extracted over 2 TB of data, which was then passed on to journalists from independent media. This exposure led to the revelation of extensive surveillance by Roskomnadzor of individuals who don't support the Kremlin's policies. May 22, 2023 Cyberattack on "WAGON-SERVICE", Russian logistic company "WAGON-SERVICE" logistics company maintains trains for Russian Railways, which in turn supplies military equipment and ammunition to the front. Workstations were encrypted. All document flow, emails, and data from servers (over 2 TB) were extracted. July 4, 2023 Cyberattack on the Belarusian State University The university's administration is involved in the political suppression of both students and faculty members. Workstations have been encrypted, and more than 3 terabytes of data have been downloaded. All websites were inaccessible. December 31, 2023 Attack on the Belarusian Telegraphic Agency The computer network of the main state propagandists of Lukashenko's criminal regime was attacked. Internal network and main sites hacked. (web archive available here ). Domain controllers affected. Downloaded 90GB of data. Cleared workstations, archives, backups, website servers. April 17, 2024 Cyber Attack on "Grodno Azot" "Grodno Azot" is one of the largest enterprises in Belarus. It's an open joint-stock company, state-run producer of nitrogen compounds and fertilizers. The management of "Grodno Azot" is engaged in political repression against workers and circumvents economic sanctions imposed by Western countries for supporting the Lukashenko regime. Internal emails, document circulation, and hundreds of workstations have been encrypted. Backups of databases, servers, emails, and document circulation have been destroyed. Security systems and surveillance cameras have been breached. The operation of the boiler room has been disrupted. The official website has been targeted (web archive accessible via link ). April 26, 2024 Breach of Belarusian KGB Website We announced that the Belarusian State Security Committee (KGB) website was hacked in the fall of 2023. The database of the website has been made public, which includes approximately 40 thousand inquiries to the KGB from citizens of various countries between September 2014 and August 2023. May 5, 2024 Second Cyber-Attack on Grodno Azot The management of the Grodno Azot plant engages in political repression against workers and circumvents economic sanctions imposed by Western countries for supporting the Lukashenko regime. Our group has erased data from many hundreds of worker computers, cleared document circulation, and affected domain controllers and other servers. Since December 2022, the Cyber Partisans have joined forces with the Kastus Kalinouski Regiment , which is fighting in Ukraine as one of the units of the Ukrainian Armed Forces. We engage in cyber offensives targeting adversary infrastructure, performing cyber intelligence, and ensuring cybersecurity.

  • Home | Belarusian Cyber Partisans

    Breaking news ⚡️ New Cyberpartisan investigation into political suspensions and dismissals at Belarus State University! New All N ews > Investigations YouTube for Lukashenko In late May 2024, the network broke the news that Belarus would be creating its own media platform. It's a YouTube analogue, but only for... Cybersecurity Partisan Telegram is NOT ONLY for partisans P-Telegram from Cyberpartisan has advantages over the original Telegram, thanks to which it will come in handy NOT only in countries with... Investigations BSU Uncut: 2020-2024. Part 2 The political repression within the walls of the country's leading university - Belarusian State University (BSU) - which has been going... Investigations BSU Uncut: 2020-2024. Part 1 Numerous denunciations, brutal arrests, mass dismissals and expulsions for political reasons have now become the norm within the walls of... Hacks Grodno Azot Is Under Attack Again! The first attack on Grodno Azot's network involved planting viruses which were scheduled to be triggered. Yesterday, the first series of... Cyber Leaks Leak Of Denunciations To the KGB: About 40 Thousand Appeals On the KGB Website Over 9 Years For those who didn't know, together with the database of the KGB website we put online the denunciations sent to the KGB via the portal... Belarusian Cyber Partisans The Belarusian Cyber Partisans is a highly organized hacktivist collective that is fighting for the liberation of Belarus from dictatorial rule, the establishment of democratic rights, and the rule of law in the country. The group emerged in the wake of the 2020 protests in Belarus against the dictator Lukashenko, who had illegally seized power in the country. There are no professional hackers among us. Most of the participants are regular IT specialists who do not agree with the lawless regime and decided to use their technical expertise to confront the dictatorship within the confines of their abilities. Our operations Over 50 public known cyber operations against dictatorship regimes. However, dozens of the most successful ones have not been disclosed to maintain access to sensitive systems. Hundreds of investigations by independent journalists have been made possible due to the operations conducted by the Cyber Partisans. > 10,000 downloads of Partisan Telegram, a messenger for safe communication between activists. More than 100 Telegram chatbots for independent media and protest organizations in Belarus What are the goals of the Cyber Partisans? To overthow the dictatorship regime of Lukashenko. To preserve the independence and territorial integrity of Belarus. To stabilize Belarus during the transition period, returning to democratic principles of governance and rule of law. How do the Cyber Partisans choose targets for attacks? Attacks are intended to minimize harm to ordinary citizens and maximize to regime's people. Targets are selected in a manner that genuinely damages dictaroship regimes or acquires important information that aids in causing such damage. We do not operate on systems unrelated to dictatorship regimes. We work within our means. Not all networks can be accessed. However, the more people and resources we have, the broader the range of targets available to us. Within the group, we define a common strategy. Periodically, we gather and prioritize goals based on the current political climate. Our hacktivists then work in line with the approved strategy. Can one order a cyberattack, hack, or information search from you? We do not accept commercial orders. All targets for attacks are chosen in a way that brings us closer to achieving the organization's main goals. How do you assist journalists? Thanks to hacks on structures supporting the dictators Lukashenko and Putin, the Cyber Partisans have obtained a vast amount of databases and documents. This information sheds light on the crimes of dictatorship regimes in Belarus and Russia. All data, which do not compromise the confidentiality and safety of ordinary citizens, are handed over upon request for journalistic investigations. Is it safe to install Partisan Telegram for communication? Partisan Telegram has undergone an independent security audit. Moreover, the application offers the maximum possible settings to disguise itself as the original Telegram. For activists' safety, we have also implemented a passwordless mode feature. If this option is activated, the application does not prompt for the code-password, which could raise suspicion among law enforcement and intelligence personnel. However, Partisan Telegram can be identified through a detailed forensic analysis of the device. We recommend considering this before installing the application. Do the Cyber Partisans provide paid services? All organizations, activists, and individuals adhering to democratic principles can expect our free assistance that aligns with our principles. However, due to our limited resources, immediate and/or long-term information-providing services are only available on a paid basis. For the details and contacts, please refer to the 'Contacts and Donations' section. What financial resources does the group have? The primary source of funds is financial assistance from private donors who care about the fate of Belarus. Any assistance is valuable and propels us toward achieving our main goals. What assistance will be most effective for Cyber Partisans? As a non-commercial volunteer organization, the best assistance for us would be donations of any amount acceptable to you. Funds are needed to support servers with databases, feedback bots, equipment, and the work of specialists. See the details in the 'Contacts and Donations' section. You can also make a significant contribution by joining our volunteer team. To do this, write to our bot @cpartisans_join_bot. Let's free Belarus from dictatorship! Help financially ➤ To become a cyber partisan ➤

  • Our Security Apps | Belarusian Cyber Partisans

    Our Security Apps Partisan Telegram (P-Telegram) Partisan Telegram is a modification of the well-known messenger program Telegram adapted for the purpose of data protection of politically engaged users living under repressive regimes. After installation, all your chats, contacts, saved messages, and channels are migrated to it. However, P-Telegram distinguishes itself from the original application by enabling the creation of a fake code-password or accessing the messenger along with the standard code-password. This additional code is utilized when forced to grant access to your account by strangers. When you enter a fake code-password, P-Telegram automatically executes pre-set actions, such as concealing specific chats, channels, or even the entire account. The app offers added security features like the capability to: - Read channels without subscribing. - Send messages that vanish once read. - Apply password protection. - Alert chosen contacts in emergencies, and more. Find additional information about P-Telegram on YouTube Answers to common questions and a settings guide Support the project via BTC (Bitcoin) - bc1qw4yqlzgjxnl9dtzchxj7nkjdlw6uz2gdkp0679 Download for Android Download for PC Partisan SMS (P-SMS) Partisan SMS is employed for urgent SMS communication during Internet blackouts. With its help, you can send encrypted SMS messages, the contents of which are decipherable only by those possessing the encryption key. Both you and your correspondent must have the application installed and an encryption key shared beforehand, either in person or through secure methods. Anyone without the key who tries to read the text will only see an unintelligible encryption, including the mobile operator. More about P-SMS on Youtube Settings Guide Support the project (BTC) - bc1qw4yqlzgjxnl9dtzchxj7nkjdlw6uz2gdkp0679 Download for Android Download for iOS P-Telegram reviews Belarus Ukraine A year ago, during interrogation, they tried to get into my Telegram [on the phone]. I ‘helped’ them by entering with the fake passcode and showed them through ([during which] dialogues, channels, etc. were all removed [automatically by PTG behind the scenes]). I guess they did not understand or did not show that they noticed that this was a PTG. They simply tried to get through the two-factor authentication. I was saved by your app. I hid the Ukrainian chats, and those chats in which I sent positions of the occupiers to the Ukrainian Armed Forces. They [Russians] grabbed me on the street and first beat me and then checked my phone. They asked me what the Telegram code was, I gave them the fake passcode. And then they stopped beating me. And after a few minutes they let me go. I think if I'd turned on that new thing where the app goes into a mode where it's like there's no code, maybe I wouldn't have been beaten at all. Cybersecurity Partisan Telegram is NOT ONLY for partisans P-Telegram from Cyberpartisan has advantages over the original Telegram, thanks to which it will come in handy NOT only in countries with... Vartagram has been upgraded to Telegram version 10.5.2 Exciting new features include: 🔹 Creation dates are now displayed not only for channels but also for chats, provided you have access to... Telegram for iOS by Cyberpartisans – Vartagram Externally, Vartagram is NOT masquerading as Telegram (as per Apple's policy), but you can transfer your accounts with all your data into... 1 2 3 4

  • Volunteers | Belarusian Cyber Partisans

    How to Become a Cyber Partisan We welcome volunteers who share the primary goals and principles of the Cyber Partisan group. ​ Having free time is crucial. You can be a professional specialist, but you won't help the group if you only devote a couple of hours a month to the tasks. ​ No prior experience in IT? No problem. Our group comprises individuals with various specialties such as designers, video editors, managers, and more. There are tasks suitable for anyone who's proactive. ​ Not a citizen of Belarus? No issue. We welcome individuals from various countries , as long as they have the enthusiasm to help us accomplish our objectives. We are looking for volunteers! Even if you lack expertise in the listed specialties, you can join us and aid in testing security applications such as P-Telegram and P-SMS. You don't need IT knowledge , just free time, attentiveness and willingness to help. ​ Any form of participation will bring us closer to victory over dictatorship! Long Live Belarus ❤️ 🔹 Pentester: Penetration Testing & Cybersecurity Software 🔹 System Administrator 🔹 Network Engineer 🔹 Desktop Developers C++ (Windows/Linux/Mac) 🔹 Android Developers (Java) 🔹 Video Editor & Designer 🔹 Grant Writing manager / Grant Writer (IT) How to join 01 Reach out to the Telegram bot @cpartisans_join_bot or email cyberpartisans@protonmail.com with the following details: - How you can help. - Your skills and experience. 02 Do NOT block the bot and anticipate a response. Due to the workload of our administrators, the answer may not be immediately, please wait a while. 03 We will reach out to you as soon as possible.

  • Contacts & Donations | Belarusian Cyber Partisans

    Contacts Telegram Channels @cpartisans_by — provides the most current information about hacks, major leaks, and important events for the group. @cpartisans_dumps — focuses on data leaks and cyber investigations. @cpartisans_security — offers information on our app updates and shares useful security tips. Telegram Chatbots @cpartisans_bot — our primary anonymous bot. @cpartisans_urgent_bot — urgent bot (only for media, hackers, and assistance with access to regime systems). @partisan_qa_bot — bot for those interested in helping us test P-Telegram on Android, iOS, PC, P-SMS, and more. @cpartisans_join_bot — bot for those interested in joining our team. @partisan_telegram_bot — bot to address questions and report bugs related to P-Telegram and P-SMS applications. E-mail cyberpartisans@protonmail.com Twitter twitter.com/cpartisans Youtube www.youtube.com/c/cpartisans How To Help the Belarusian Cyber Partisans We are an organization run by volunteers, and our operations are primarily sustained through the generous donations of those who support our fight against dictatorship. You can contribute any amount to assist us. Transfer From a Bank Card 5354 5670 1711 0254 Partizan Wave (do not transfer from Belarusian banks ❗️) Support on Patreon Instructions for safe donations via Patreon Make a Bank Transfer Fundacja Białoruś Liberty (Foundation Belarus Liberty) z siedzibą w Warszawie, przy ul. Al. Jana Pawła II 43A/37B, 01-001 Warszawa NIP: 5213996842 REGON: 523918575 Help With Cryptocurrency BTC - bc1qprsr2escj8csq93qha9hdxperuj4aexlnzj5hu TRX - THpabeV9rTasBZzT8dCiv6AWoKErbYCqbz ETH - 0x6bE4E40E2778F46546639Eb2Ac47F94F89157AbC USDT (ETH) - 0x6bE4E40E2778F46546639Eb2Ac47F94F89157AbC XMR - 44aWk8qQKhkEhWdzQnnDctetNtTz51nEk4Xd4efaTUTg3LUTfvPQZz9VpprEeE2MbmGSU3zu4BaUXgafgsL5RhksCSd6dW5 Instructions for secure donations from a bank card to a cryptocurrency wallet in Belarus and Russia ❗️ PL 65 1140 2004 0000 3002 8357 3067 mBank S.A. ul. Prosta 18 00-850 Warszawa KOD SWIFT/BIC: BREXPLPWMBK ​ Do not transfer from Belarusian banks ❗ What are the goals of the Cyber Partisans? To overthow the dictatorship regime of Lukashenko. To preserve the independence and territorial integrity of Belarus. To stabilize Belarus during the transition period, returning to democratic principles of governance and rule of law. How do the Cyber Partisans choose targets for attacks? Attacks are intended to minimize harm to ordinary citizens and maximize to regime's people. Targets are selected in a manner that genuinely damages dictaroship regimes or acquires important information that aids in causing such damage. We do not operate on systems unrelated to dictatorship regimes. We work within our means. Not all networks can be accessed. However, the more people and resources we have, the broader the range of targets available to us. Within the group, we define a common strategy. Periodically, we gather and prioritize goals based on the current political climate. Our hacktivists then work in line with the approved strategy. Can one order a cyberattack, hack, or information search from you? We do not accept commercial orders. All targets for attacks are chosen in a way that brings us closer to achieving the organization's main goals. How do you assist journalists? Thanks to hacks on structures supporting the dictators Lukashenko and Putin, the Cyber Partisans have obtained a vast amount of databases and documents. This information sheds light on the crimes of dictatorship regimes in Belarus and Russia. All data, which do not compromise the confidentiality and safety of ordinary citizens, are handed over upon request for journalistic investigations. Is it safe to install Partisan Telegram for communication? Partisan Telegram has undergone an independent security audit. Moreover, the application offers the maximum possible settings to disguise itself as the original Telegram. For activists' safety, we have also implemented a passwordless mode feature. If this option is activated, the application does not prompt for the code-password, which could raise suspicion among law enforcement and intelligence personnel. However, Partisan Telegram can be identified through a detailed forensic analysis of the device. We recommend considering this before installing the application. Do the Cyber Partisans provide paid services? All organizations, activists, and individuals adhering to democratic principles can expect our free assistance that aligns with our principles. However, due to our limited resources, immediate and/or long-term information-providing services are only available on a paid basis. For the details and contacts, please refer to the 'Contacts and Donations' section. What financial resources does the group have? The primary source of funds is financial assistance from private donors who care about the fate of Belarus. Any assistance is valuable and propels us toward achieving our main goals. What assistance will be most effective for Cyber Partisans? As a non-commercial volunteer organization, the best assistance for us would be donations of any amount acceptable to you. Funds are needed to support servers with databases, feedback bots, equipment, and the work of specialists. See the details in the 'Contacts and Donations' section. You can also make a significant contribution by joining our volunteer team. To do this, write to our bot @cpartisans_join_bot.

bottom of page