Aller au contenu
Fini la pub... bienvenue à la cagnotte ! ×
AIR-DEFENSE.NET

Guerre Russie-Ukraine 2022+ : Opérations militaires


Messages recommandés

il y a une heure, metkow a dit :

Les deux points chaud du moment c'est l'assaut en cours sur Povrosk et Kupiansk, et les deux autres a surveiller sont Siversk et Lyman 

A mon sens c'est Pokrovsk (et potentiellement Vovshansk) et les autres fronts (Siversk, Lyman, Kupiansk, Kostiantiniivka) sont secondaires. Mais j'imagine que c'est fonction de des métriques qu'on considère importante.

Dans mon cas c'est les batailles qui pourraient générer un déséquilibre, et qui sont gagnables par un des partis

Lien vers le commentaire
Partager sur d’autres sites

Il y a 2 heures, gustave a dit :

Pas vu cela. Un lien?

Les documents ont été partagés sur un énorme forum d'échange de données piratées. Première tentative le 7 juillet, qui a fait flop. Un mois plus tard ils remettent ça, l'attaque réputationnelle fonctionne, et ils balancent la documentation en clair sur le net sans rien faire payer à quiconque, Naval Group ayant refusé de céder au chantage.

Très étonnant pour des hackers habitués à vouloir faire de l'argent.

Et puis là, soudainement, juste dans la foulée, le forum en question est saisi par une opération conjointe du SBU Ukrainien, de la Police Judiciaire Française, et d'Europol.

Mais tout ceci n'est que pure coïncidence bien entendu. :rolleyes:

https://gbhackers.com/key-operator-of-worlds-largest-xss-dark-web/

Gwja-Qp1-XUAA5h-X5.jpg

 

Pour aller plus loin si le domaine t'intéresse:

https://vulners.com/krebs/KREBS:BAFEAE892A3E0F76A2EE651ECBCFBDDF

Who Got Arrested in the Raid on the XSS Crime Forum?

06 Aug 2025 14:12:37 Reported by BrianKrebsType  krebs krebsonsecurity.com

Europol arrested a 38-year-old XSS forum administrator Toha, linked to major cybercrime groups.

On July 22, 2025, the European police agency Europol said a long-running investigation led by the French Police resulted in the arrest of a 38-year-old administrator ofXSS, a Russian-language cybercrime forum with more than 50,000 members. The action has triggered an ongoing frenzy of speculation and panic among XSS denizens about the identity of the unnamed suspect, but the consensus is that he is a pivotal figure in the crime forum scene who goes by the hacker handle “Toha.” Here’s a deep dive on what’s knowable about Toha, and a short stab at who got nabbed.

An unnamed 38-year-old man was arrested in Kiev last month on suspicion of administering the cybercrime forum XSS. Image: ssu.gov.ua.

Europol did not name the accused, but published partially obscured photos of him from the raid on his residence in Kiev. The police agency said the suspect acted as a trusted third party – arbitrating disputes between criminals – and guaranteeing the security of transactions on XSS. A statement from Ukraine’s SBU security service said XSS counted among its members many cybercriminals from various ransomware groups, including REvil,LockBit,Conti, andQiliin.

Since the Europol announcement, the XSS forum resurfaced at a new address on the deep web (reachable only via the anonymity network Tor). But from reviewing the recent posts, there appears to be little consensus among longtime members about the identity of the now-detained XSS administrator.

The most frequent comment regarding the arrest was a message of solidarity and support for Toha, the handle chosen by the longtime administrator of XSS and several other major Russian forums. Toha’s accounts on other forums have been silent since the raid.

Europol said the suspect has enjoyed a nearly 20-year career in cybercrime, which roughly lines up with Toha’s history. In 2005, Toha was a founding member of the Russian-speaking forum Hack-All. That is, until it got massively hacked a few months after its debut. In 2006, Toha rebranded the forum toexploit[.]in, which would go on to draw tens of thousands of members, including an eventual Who’s-Who of wanted cybercriminals.

Toha announced in 2018 that he was selling the Exploit forum, prompting rampant speculation on the forums that the buyer was secretly a Russian or Ukrainian government entity or front person. However, those suspicions were unsupported by evidence, and Toha vehemently denied the forum had been given over to authorities.

One of the oldest Russian-language cybercrime forums was DaMaGeLaB , which operated from 2004 to 2017, when its administrator “Ar3s” was arrested. In 2018, a partial backup of the DaMaGeLaB forum was reincarnated as xss[.]is, with Toha as its stated administrator.

CROSS-SITE GRIFTING

Clues about Toha’s early presence on the Internet – from ~2004 to 2010 – are available in the archives of Intel 471 , a cyber intelligence firm that tracks forum activity. Intel 471 shows Toha used the same email address across multiple forum accounts, including at Exploit,Antichat,Carder[.]suandinattack[.]ru.

DomainTools.com finds Toha’s email address –toschka2003@yandex.ru– was used to register at least a dozen domain names – most of them from the mid- to late 2000s. Apart from exploit[.]in and a domain calledixyq[.]com , the other domains registered to that email address end in .ua, the top-level domain for Ukraine (e.g. deleted.org[.]ua, lj.com[.]ua, and blogspot.org[.]ua).

A 2008 snapshot of a domain registered to toschka2003@yandex.ru and to Anton Medvedovsky in Kiev. Note the message at the bottom left, “Protected by Exploit,in.” Image: archive.org.

Nearly all of the domains registered to toschka2003@yandex.ru contain the name Anton Medvedovskiy in the registration records, except for the aforementioned ixyq[.]com, which is registered to the nameYuriy Avdeev in Moscow.

This Avdeev surname came up in a lengthy conversation with Lockbitsupp, the leader of the rapacious and destructive ransomware affiliate group Lockbit. The conversation took place in February 2024, when Lockbitsupp asked for help identifying Toha’s real-life identity.

In early 2024, the leader of the Lockbit ransomware group – Lockbitsupp – asked for help investigating the identity of the XSS administrator Toha, which he claimed was a Russian man named Anton Avdeev.

Lockbitsupp didn’t share why he wanted Toha’s details, but he maintained that Toha’s real name was Anton Avdeev. I declined to help Lockbitsupp in whatever revenge he was planning on Toha, but his question made me curious to look deeper.

It appears Lockbitsupp’s query was based on a now-deleted Twitter post from 2022, when a user by the name “3xp0rt” asserted that Toha was a Russian man named Anton Viktorovich Avdeev , born October 27, 1983.

Searching the web for Toha’s email address toschka2003@yandex.ru reveals a 2010 sales thread on the forum bmwclub.ru where a user named Honeypo was selling a 2007 BMW X5. The ad listed the contact person as Anton Avdeev and gave the contact phone number9588693.

A search on the phone number 9588693 in the breach tracking service Constella Intelligence finds plenty of official Russian government records with this number, date of birth and the name Anton Viktorovich Avdeev. For example, hacked Russian government records show this person has a Russian tax ID and SIN (Social Security number), and that they were flagged for traffic violations on several occasions by Moscow police; in 2004, 2006, 2009, and 2014.

Astute readers may have noticed by now that the ages of Mr. Avdeev (41) and the XSS admin arrested this month (38) are a bit off. This would seem to suggest that the person arrested is someone other than Mr. Avdeev, who did not respond to requests for comment.

A FLY ON THE WALL

For further insight on this question, KrebsOnSecurity sought comments from Sergeii Vovnenko , a former cybercriminal from Ukraine who now works at the security startupparanoidlab.com. I reached out to Vovnenko because for several years beginning around 2010 he was the owner and operator ofthesecure[.]biz , an encrypted “Jabber” instant messaging server that Europol said was operated by the suspect arrested in Kiev. Thesecure[.]biz grew quite popular among many of the top Russian-speaking cybercriminals because it scrupulously kept few records of its users’ activity, and its administrator was always a trusted member of the community.

The reason I know this historic tidbit is that in 2013, Vovnenko – using the hacker nicknames “Fly ,” and "Flycracker " – hatched a plan to have a gram of heroin purchased off of the Silk Road darknet market and shipped to our home in Northern Virginia. The scheme was to spoof a call from one of our neighbors to the local police, saying this guy Krebs down the street was a druggie who was having narcotics delivered to his home.

I happened to be lurking on Flycracker’s private cybercrime forum when his heroin-framing plan was carried out, and called the police myself before the smack eventually arrived in the U.S. Mail. Vovnenko was later arrested for unrelated cybercrime activities, extradited to the United States, convicted, and deported after a 16-month stay in the U.S. prison system [on several occasions, he has expressed heartfelt apologies for the incident, and we have since buried the hatchet].

Vovnenko said he purchased a device for cloning credit cards from Toha in 2009, and that Toha shipped the item from Russia. Vovnenko explained that he (Flycracker) was the owner and operator of thesecure[.]biz from 2010 until his arrest in 2014.

Vovnenko believes thesecure[.]biz was stolen while he was in jail, either by Toha and/or an XSS administrator who went by the nicknames N0klos and Sonic.

“When I was in jail, [the] admin of xss.is stole that domain, or probably N0klos bought XSS from Toha or vice versa,” Vovnenko said of the Jabber domain. “Nobody from [the forums] spoke with me after my jailtime, so I can only guess what really happened.”

N0klos was the owner and administrator of an early Russian-language cybercrime forum known as Darklife[.]ws. However, N0kl0s also appears to be a lifelong Russian resident, and in any case seems to have vanished from Russian cybercrime forums several years ago.

Asked whether he believes Toha was the XSS administrator who was arrested this month in Ukraine, Vovnenko maintained that Toha is Russian, and that “the French cops took the wrong guy.”

WHO IS TOHA?

So who did the Ukrainian police arrest in response to the investigation by the French authorities? It seems plausible that the BMW ad invoking Toha’s email address and the name and phone number of a Russian citizen was simply misdirection on Toha’s part – intended to confuse and throw off investigators. Perhaps this even explains the Avdeev surname surfacing in the registration records from one of Toha’s domains.

But sometimes the simplest answer is the correct one. “Toha” is a common Slavic nickname for someone with the first name “Anton,” and that matches the name in the registration records for more than a dozen domains tied to Toha’s toschka2003@yandex.ru email address: Anton Medvedovskiy.

Constella Intelligence finds there is an Anton Gannadievich Medvedovskiy living in Kiev who will be 38 years old in December. This individual owns the email addressitsmail@i.ua , as well an an Airbnb account featuring a profile photo of a man with roughly the same hairline as the suspect in the blurred photos released by the Ukrainian police. Mr. Medvedovskiy did not respond to a request for comment.

My take on the takedown is that the Ukrainian authorities likely arrested Medvedovskiy. Toha shared on DaMaGeLab in 2005 that he had recently finished the 11th grade and was studying at a university – a time when Mevedovskiy would have been around 18 years old. On Dec. 11, 2006, fellow Exploit members wished Toha a happy birthday. Records exposed in a 2022 hack at the Ukrainian public services portal diia.gov.ua show that Mr. Medvedovskiy’s birthday is Dec. 11, 1987.

The law enforcement action and resulting confusion about the identity of the detained has thrown the Russian cybercrime forum scene into disarray in recent weeks, with lengthy and heated arguments about XSS’s future spooling out across the forums.

XSS relaunched on a new Tor address shortly after the authorities plastered their seizure notice on the forum’s homepage, but all of the trusted moderators from the old forum were dismissed without explanation. Existing members saw their forum account balances drop to zero, and were asked to plunk down a deposit to register at the new forum. The new XSS “admin” said they were in contact with the previous owners and that the changes were to help rebuild security and trust within the community.

However, the new admin’s assurances appear to have done little to assuage the worst fears of the forum’s erstwhile members, most of whom seem to be keeping their distance from the relaunched site for now.

Indeed, if there is one common understanding amid all of these discussions about the seizure of XSS, it is that Ukrainian and French authorities now have several years worth of private messages between XSS forum users, as well as contact rosters and other user data linked to the seized Jabber server.

“The myth of the ‘trusted person’ is shattered,” the user “GordonBellford” cautioned on Aug. 3 in an Exploit forum thread about the XSS admin arrest. “The forum is run by strangers. They got everything. Two years of Jabber server logs. Full backup and forum database.”

GordonBellford continued:

> And the scariest thing is: this data array is not just an archive. It is material for analysis that has ALREADY BEEN DONE . With the help of modern tools, they see everything:
>
> Graphs of your contacts and activity.
> Relationships between nicknames, emails, password hashes and Jabber ID.
> Timestamps, IP addresses and digital fingerprints.
> Your unique writing style, phraseology, punctuation, consistency of grammatical errors, and even typical typos that will link your accounts on different platforms.
>
> They are not looking for a needle in a haystack. They simply sifted the haystack through the AI sieve and got ready-made dossiers.

Modifié par Patrick
  • J'aime (+1) 1
  • Merci (+1) 1
Lien vers le commentaire
Partager sur d’autres sites

Il y a 10 heures, Patrick a dit :

Les documents ont été partagés sur un énorme forum d'échange de données piratées. Première tentative le 7 juillet, qui a fait flop. Un mois plus tard ils remettent ça, l'attaque réputationnelle fonctionne, et ils balancent la documentation en clair sur le net sans rien faire payer à quiconque, Naval Group ayant refusé de céder au chantage.

Très étonnant pour des hackers habitués à vouloir faire de l'argent.

Et puis là, soudainement, juste dans la foulée, le forum en question est saisi par une opération conjointe du SBU Ukrainien, de la Police Judiciaire Française, et d'Europol.

Mais tout ceci n'est que pure coïncidence bien entendu. :rolleyes:

https://gbhackers.com/key-operator-of-worlds-largest-xss-dark-web/

Gwja-Qp1-XUAA5h-X5.jpg

 

Pour aller plus loin si le domaine t'intéresse:

https://vulners.com/krebs/KREBS:BAFEAE892A3E0F76A2EE651ECBCFBDDF

Who Got Arrested in the Raid on the XSS Crime Forum?

06 Aug 2025 14:12:37 Reported by BrianKrebsType  krebs krebsonsecurity.com

Europol arrested a 38-year-old XSS forum administrator Toha, linked to major cybercrime groups.

On July 22, 2025, the European police agency Europol said a long-running investigation led by the French Police resulted in the arrest of a 38-year-old administrator ofXSS, a Russian-language cybercrime forum with more than 50,000 members. The action has triggered an ongoing frenzy of speculation and panic among XSS denizens about the identity of the unnamed suspect, but the consensus is that he is a pivotal figure in the crime forum scene who goes by the hacker handle “Toha.” Here’s a deep dive on what’s knowable about Toha, and a short stab at who got nabbed.

An unnamed 38-year-old man was arrested in Kiev last month on suspicion of administering the cybercrime forum XSS. Image: ssu.gov.ua.

Europol did not name the accused, but published partially obscured photos of him from the raid on his residence in Kiev. The police agency said the suspect acted as a trusted third party – arbitrating disputes between criminals – and guaranteeing the security of transactions on XSS. A statement from Ukraine’s SBU security service said XSS counted among its members many cybercriminals from various ransomware groups, including REvil,LockBit,Conti, andQiliin.

Since the Europol announcement, the XSS forum resurfaced at a new address on the deep web (reachable only via the anonymity network Tor). But from reviewing the recent posts, there appears to be little consensus among longtime members about the identity of the now-detained XSS administrator.

The most frequent comment regarding the arrest was a message of solidarity and support for Toha, the handle chosen by the longtime administrator of XSS and several other major Russian forums. Toha’s accounts on other forums have been silent since the raid.

Europol said the suspect has enjoyed a nearly 20-year career in cybercrime, which roughly lines up with Toha’s history. In 2005, Toha was a founding member of the Russian-speaking forum Hack-All. That is, until it got massively hacked a few months after its debut. In 2006, Toha rebranded the forum toexploit[.]in, which would go on to draw tens of thousands of members, including an eventual Who’s-Who of wanted cybercriminals.

Toha announced in 2018 that he was selling the Exploit forum, prompting rampant speculation on the forums that the buyer was secretly a Russian or Ukrainian government entity or front person. However, those suspicions were unsupported by evidence, and Toha vehemently denied the forum had been given over to authorities.

One of the oldest Russian-language cybercrime forums was DaMaGeLaB , which operated from 2004 to 2017, when its administrator “Ar3s” was arrested. In 2018, a partial backup of the DaMaGeLaB forum was reincarnated as xss[.]is, with Toha as its stated administrator.

CROSS-SITE GRIFTING

Clues about Toha’s early presence on the Internet – from ~2004 to 2010 – are available in the archives of Intel 471 , a cyber intelligence firm that tracks forum activity. Intel 471 shows Toha used the same email address across multiple forum accounts, including at Exploit,Antichat,Carder[.]suandinattack[.]ru.

DomainTools.com finds Toha’s email address –toschka2003@yandex.ru– was used to register at least a dozen domain names – most of them from the mid- to late 2000s. Apart from exploit[.]in and a domain calledixyq[.]com , the other domains registered to that email address end in .ua, the top-level domain for Ukraine (e.g. deleted.org[.]ua, lj.com[.]ua, and blogspot.org[.]ua).

A 2008 snapshot of a domain registered to toschka2003@yandex.ru and to Anton Medvedovsky in Kiev. Note the message at the bottom left, “Protected by Exploit,in.” Image: archive.org.

Nearly all of the domains registered to toschka2003@yandex.ru contain the name Anton Medvedovskiy in the registration records, except for the aforementioned ixyq[.]com, which is registered to the nameYuriy Avdeev in Moscow.

This Avdeev surname came up in a lengthy conversation with Lockbitsupp, the leader of the rapacious and destructive ransomware affiliate group Lockbit. The conversation took place in February 2024, when Lockbitsupp asked for help identifying Toha’s real-life identity.

In early 2024, the leader of the Lockbit ransomware group – Lockbitsupp – asked for help investigating the identity of the XSS administrator Toha, which he claimed was a Russian man named Anton Avdeev.

Lockbitsupp didn’t share why he wanted Toha’s details, but he maintained that Toha’s real name was Anton Avdeev. I declined to help Lockbitsupp in whatever revenge he was planning on Toha, but his question made me curious to look deeper.

It appears Lockbitsupp’s query was based on a now-deleted Twitter post from 2022, when a user by the name “3xp0rt” asserted that Toha was a Russian man named Anton Viktorovich Avdeev , born October 27, 1983.

Searching the web for Toha’s email address toschka2003@yandex.ru reveals a 2010 sales thread on the forum bmwclub.ru where a user named Honeypo was selling a 2007 BMW X5. The ad listed the contact person as Anton Avdeev and gave the contact phone number9588693.

A search on the phone number 9588693 in the breach tracking service Constella Intelligence finds plenty of official Russian government records with this number, date of birth and the name Anton Viktorovich Avdeev. For example, hacked Russian government records show this person has a Russian tax ID and SIN (Social Security number), and that they were flagged for traffic violations on several occasions by Moscow police; in 2004, 2006, 2009, and 2014.

Astute readers may have noticed by now that the ages of Mr. Avdeev (41) and the XSS admin arrested this month (38) are a bit off. This would seem to suggest that the person arrested is someone other than Mr. Avdeev, who did not respond to requests for comment.

A FLY ON THE WALL

For further insight on this question, KrebsOnSecurity sought comments from Sergeii Vovnenko , a former cybercriminal from Ukraine who now works at the security startupparanoidlab.com. I reached out to Vovnenko because for several years beginning around 2010 he was the owner and operator ofthesecure[.]biz , an encrypted “Jabber” instant messaging server that Europol said was operated by the suspect arrested in Kiev. Thesecure[.]biz grew quite popular among many of the top Russian-speaking cybercriminals because it scrupulously kept few records of its users’ activity, and its administrator was always a trusted member of the community.

The reason I know this historic tidbit is that in 2013, Vovnenko – using the hacker nicknames “Fly ,” and "Flycracker " – hatched a plan to have a gram of heroin purchased off of the Silk Road darknet market and shipped to our home in Northern Virginia. The scheme was to spoof a call from one of our neighbors to the local police, saying this guy Krebs down the street was a druggie who was having narcotics delivered to his home.

I happened to be lurking on Flycracker’s private cybercrime forum when his heroin-framing plan was carried out, and called the police myself before the smack eventually arrived in the U.S. Mail. Vovnenko was later arrested for unrelated cybercrime activities, extradited to the United States, convicted, and deported after a 16-month stay in the U.S. prison system [on several occasions, he has expressed heartfelt apologies for the incident, and we have since buried the hatchet].

Vovnenko said he purchased a device for cloning credit cards from Toha in 2009, and that Toha shipped the item from Russia. Vovnenko explained that he (Flycracker) was the owner and operator of thesecure[.]biz from 2010 until his arrest in 2014.

Vovnenko believes thesecure[.]biz was stolen while he was in jail, either by Toha and/or an XSS administrator who went by the nicknames N0klos and Sonic.

“When I was in jail, [the] admin of xss.is stole that domain, or probably N0klos bought XSS from Toha or vice versa,” Vovnenko said of the Jabber domain. “Nobody from [the forums] spoke with me after my jailtime, so I can only guess what really happened.”

N0klos was the owner and administrator of an early Russian-language cybercrime forum known as Darklife[.]ws. However, N0kl0s also appears to be a lifelong Russian resident, and in any case seems to have vanished from Russian cybercrime forums several years ago.

Asked whether he believes Toha was the XSS administrator who was arrested this month in Ukraine, Vovnenko maintained that Toha is Russian, and that “the French cops took the wrong guy.”

WHO IS TOHA?

So who did the Ukrainian police arrest in response to the investigation by the French authorities? It seems plausible that the BMW ad invoking Toha’s email address and the name and phone number of a Russian citizen was simply misdirection on Toha’s part – intended to confuse and throw off investigators. Perhaps this even explains the Avdeev surname surfacing in the registration records from one of Toha’s domains.

But sometimes the simplest answer is the correct one. “Toha” is a common Slavic nickname for someone with the first name “Anton,” and that matches the name in the registration records for more than a dozen domains tied to Toha’s toschka2003@yandex.ru email address: Anton Medvedovskiy.

Constella Intelligence finds there is an Anton Gannadievich Medvedovskiy living in Kiev who will be 38 years old in December. This individual owns the email addressitsmail@i.ua , as well an an Airbnb account featuring a profile photo of a man with roughly the same hairline as the suspect in the blurred photos released by the Ukrainian police. Mr. Medvedovskiy did not respond to a request for comment.

My take on the takedown is that the Ukrainian authorities likely arrested Medvedovskiy. Toha shared on DaMaGeLab in 2005 that he had recently finished the 11th grade and was studying at a university – a time when Mevedovskiy would have been around 18 years old. On Dec. 11, 2006, fellow Exploit members wished Toha a happy birthday. Records exposed in a 2022 hack at the Ukrainian public services portal diia.gov.ua show that Mr. Medvedovskiy’s birthday is Dec. 11, 1987.

The law enforcement action and resulting confusion about the identity of the detained has thrown the Russian cybercrime forum scene into disarray in recent weeks, with lengthy and heated arguments about XSS’s future spooling out across the forums.

XSS relaunched on a new Tor address shortly after the authorities plastered their seizure notice on the forum’s homepage, but all of the trusted moderators from the old forum were dismissed without explanation. Existing members saw their forum account balances drop to zero, and were asked to plunk down a deposit to register at the new forum. The new XSS “admin” said they were in contact with the previous owners and that the changes were to help rebuild security and trust within the community.

However, the new admin’s assurances appear to have done little to assuage the worst fears of the forum’s erstwhile members, most of whom seem to be keeping their distance from the relaunched site for now.

Indeed, if there is one common understanding amid all of these discussions about the seizure of XSS, it is that Ukrainian and French authorities now have several years worth of private messages between XSS forum users, as well as contact rosters and other user data linked to the seized Jabber server.

“The myth of the ‘trusted person’ is shattered,” the user “GordonBellford” cautioned on Aug. 3 in an Exploit forum thread about the XSS admin arrest. “The forum is run by strangers. They got everything. Two years of Jabber server logs. Full backup and forum database.”

GordonBellford continued:

> And the scariest thing is: this data array is not just an archive. It is material for analysis that has ALREADY BEEN DONE . With the help of modern tools, they see everything:
>
> Graphs of your contacts and activity.
> Relationships between nicknames, emails, password hashes and Jabber ID.
> Timestamps, IP addresses and digital fingerprints.
> Your unique writing style, phraseology, punctuation, consistency of grammatical errors, and even typical typos that will link your accounts on different platforms.
>
> They are not looking for a needle in a haystack. They simply sifted the haystack through the AI sieve and got ready-made dossiers.

Bah l'article ne va pas du tout dans ton sens en fait. Toha est Ukrainien ou à minima un citoyen Russe qui vit a Kiev et est aussi Ukrainophone ( ce qui n'est pas absolument impossible, mais très improbable à côté du simple fait qu'il soit Ukrainien).

Il n'y a pas de liens fait avec l'état Russe, malgré la situation actuelle et la facilité déconcertante avec laquelle ça serait prouvable, en ayant la main sur ses DB.

Et pour finir

-on voit assez mal ce que l'Ukraine gagnerait à "venger" ( pas certains que ça soit nécessaire) NG, en sacrifiant une carte forte.

- De même qu'on voit assez mal l'état Russe (et pour cause) sacrifier des accès aux DB de NG pour une demande de rançons 

Bref comme dirait l'autre on est en pleins dans le farpaitement. La vérité c'est qu'on ne saura jamais rien de ce qui se joue vraiment à ce niveau

 

D'ailleurs si contrairement à moi on ne trouve pas "très bête" le fait de révéler ces données, y a une version beaucoup plus simple à défendre :

 

- dans un contexte où Lavrov parlé de guerre nucléaire et Trump de SNLE, ce leaks est peut être un message du berger à la bergère en lui disant "on sait où sont les vôtres" ou à minima " on a accès à de la data concernant les vôtres".  Tout en gardant les mains propres aux USA qui tiennent à leur position de conciliation

Modifié par Coriace
  • J'aime (+1) 1
  • Upvote (+1) 1
Lien vers le commentaire
Partager sur d’autres sites

Double post, mais sujet totalement différent

Côté Russe, RAS si ce n'est que les troupes pousseraient au delà de Kamianske (le long du Dniepr) et soit en position de prendre le prochain village dans la direction de Zaporizhzhia

Côté Ukrainiens, ils auraient pénètres à nouveau en Russie, dans Poroz

Lien vers le commentaire
Partager sur d’autres sites

Il y a 15 heures, Coriace a dit :

A mon sens c'est Pokrovsk (et potentiellement Vovshansk) et les autres fronts (Siversk, Lyman, Kupiansk, Kostiantiniivka) sont secondaires. Mais j'imagine que c'est fonction de des métriques qu'on considère importante.

Dans mon cas c'est les batailles qui pourraient générer un déséquilibre, et qui sont gagnables par un des partis

C'est aussi mes critères (importance + possibilité): 

- Povrosk : sa chute permettrait aux russes d'améliorer grandement toute la logistique dans ce secteur, et c'est la dernière grande localité direction Nord

- Kupiansk : la prise de la ville mettrait en danger toute la poche ukrainienne a l'est de la rivière Oskil (plus de 1000km2) 

 

 

Lien vers le commentaire
Partager sur d’autres sites

Quelques nouvelles du front.

  • Kherson. Les russes chercherait à isoler "l'ile" qui forme le sud de la ville en détruisant les ponts à coups de missile. On suppose que l'idée c'est de rendre la tenue de cette zone plus compliqué parce qu'elle deviendra isolé du reste de la ville par la rivière. Donc il existera une menace qui obligera probablement les ukrainiens à conserver des forces non négligeable à Kherson plutot qu'ailleurs.
  • Zapo. Au sud de la ville le front se réactive devant Stepnohirsk, bombardement, mouvement de reconnaissance. Les russes serait au niveau de l'échangeur sur la M-18.
  • Zelene Pole et Komar, sur le front vers l'ouest. Les russes grignotent extrêmement lentement villages après villages. Mais il y a tellement de village dans le coin, que ca peut durer des mois. On peut supposer que les russes testent, puis ne s'aventurent que vers les zones plus molle du front ce qui leur permet de grignoter sans trop s'exposer ici.
  • Pokrovsk. La présence des russes au centre de la ville se confirme, et pour le moment ca ne change pas beaucoup. Ils ont réussi à établir un saillant assez étroit depuis le sud-ouest jusqu'au centre ville, et essaie de le consolider.
  • Udachne serait sur le point d'etre pris. C'est un village qui fait l'objet d'une intense bataille depuis le début de l'offensive sur Pokrovsk, et le contournement par le sud. Sa prise ouvrirait un fire control possible sur la M-30 qui ravitaille la zone autour de Pokrovsk.
  • Rodynske. La situation est assez confuse. Les russes contrôlent la mine à l'est, mais c'est au nord de la ville que ca semble confus. On a du mal à savoir ou est la ligne de contact et si l'enveloppement russe avance beaucoup ou pas. Sukhetse apparait un coup en zone grise, un coup russe ... aussi bien dans les médias russes qu'ukrainiens.
  • Kleban-Byk. La poche au sud du réservoir se vide lentemen. Seul le village de Kleban-Byk lui meme serait encore au mains des ukrainiens, et les nouvelles ne semblent pas bonnes, les russes étant à priori en train de l'attaquer depuis l'est.
  • Siversk. Les russes continuent à approcher et à bombarder tout ce qu'ils peuvent. A priori ils ont des positions à 2000m des premières maison au nord-est de la ville.
  • Serebryanka. La ville est toujours partagé. Meme chose pour la foret de l'autre coté de la riviere. Les russes poussent mais les ukrainiens tiennent pour le moment.
  • Zarichne. Des combats ont lieu dans la ville, mais les russes qui sont déjà rentrés et ont été repoussés, semblent plus accroché maintenant.
  • L'enveloppement nord-ouest de Kupinask se poursuit les russes serait vers Sobolivka, un lieu dit dans la foret. Ca menacerait un peu plus la H-26. D'autant que les routes logistique ne sont pas très nombreuse dans le coin en dehors des pistes forestieres. Meme si ca ne change pas grand chose pour la défense de Kupiansk en soi, ca complique les échanges avec l'arriere.
  • Soumy. Le front au nord est toujours actif, et s'élargit à défaut d'avancer les russes attaquent sur les zones contiguës du front, probablement pour obliger les ukrainiens à maintenir des forces dans la zone, meme si ce front ne semble pas pouvoir évoluer beaucoup plus. Soumy - une assez grosse ville - semblant un bien trop gros morceau.

En gros rien ne change. La Russie continue à miser sur son plus gros volume de force pour diluer les défenseurs ukrainiens, et attaquer là ou ils se retrouvent en infériorité numérique... Et ça continue de fonctionner. Et pour le moment tactiquement on ne voit pas trop comment les ukrainiens peuvent faire autre chose qu'autant de freinage que possible.

  • Merci (+1) 2
  • Upvote (+1) 1
Lien vers le commentaire
Partager sur d’autres sites

apparemment nouvelle attaque coordonner par camions drones facon spiderweb a voir les résultats les russes n'allant sortir aucunes images légales on attend les publications du SBU et des russes aux smartphone mais l'attaque s'est fait de nuit avec une Russie qui s'est déjà fait avoir donc probablement aillant mis en place des contre-mesure donc faut pas s'attendre aux même dégâts. Mais le fait que cela soit toujours possible est déjà impressionnant en soit.

 

 

 

 

 

 

 

 

  • J'aime (+1) 1
Lien vers le commentaire
Partager sur d’autres sites

Très étrange dans Pokrovsk, les Russes ont bien un peu élargis leur saillant sur la gauche, mais surtout sur son est. De façon très étonnante, il y a des vidéos, les Russes ont pris des bâtiments forteresses, en pleins coeur de la ville.

Je trouve ça improbable, sauf a considérer que les Ukrainiens ont abandonnés ce secteur, donc à voir dans le temps 

Lien vers le commentaire
Partager sur d’autres sites

Veuillez vous connecter pour commenter

Vous pourrez laisser un commentaire après vous êtes connecté.



Connectez-vous maintenant
  • Statistiques des membres

    6 159
    Total des membres
    3 754
    Maximum en ligne
    Paris_est_magic_2
    Membre le plus récent
    Paris_est_magic_2
    Inscription
  • Statistiques des forums

    21,7k
    Total des sujets
    1,8m
    Total des messages
  • Statistiques des blogs

    4
    Total des blogs
    3
    Total des billets
×
×
  • Créer...