Bellingcat @bellingcat Award-winning open source investigation. Want to donate? See here: www.patreon.com/bellingcat Jul. 26, 2019 1 min read

More cyberattacks against Bellingcat, this time a sophisticated operation against ProtonMail accounts used by Bellingcat and @the_ins_ru investigators working on our Skripal/GRU investigations  https://www.ft.com/content/876fb2d8-af92-11e9-8030-530adfa879c2 

Bellingcat has published a number of articles exposing GRU officers, first back in May 2018 exposing a suspect linked to the downing of MH17 known only as "Orion" as GRU Officer Oleg Ivannikov  https://www.bellingcat.com/news/uk-and-europe/2018/05/25/mh17-russian-gru-commander-orion-identified-oleg-ivannikov/ 

Most recently we exposed the travels of senior GRU officer Denis Sergeev, linked to the Skripal poisonings, through the UK and Switzerland
 https://www.bellingcat.com/news/uk-and-europe/2019/07/06/gru-globetrotters-2-the-spies-who-loved-switzerland/ 

Unlike earlier cyberattacks against Bellingcat staff members this appears to be highly targeted and very sophisticated, with ProtonMail describing it as "in the top 1 or 2 per cent in terms of sophistication"

More details relating to this attack will be published later, following Bellingcat for more details.


You can follow @bellingcat.



Bookmark

____
Tip: mention @threader_app on a Twitter thread with the keyword “compile” to get a link to it.

Enjoy Threader? Sign up.