Dan Black
banner
danwblack.bsky.social
Dan Black
@danwblack.bsky.social
Previously Google, NATO, 🇨🇦 Government. Views mine and mine only.
APT28 🤝 war crimes
July 18, 2025 at 12:40 PM
Importantly, this threat is not unique to Signal, and is already seeing wider use outside of Ukraine. See, for example, UNC5792’s effort to compromise the WhatsApp account of Christo Grozev using a fake invite to the World Economic Forum in Davos.
February 19, 2025 at 11:05 AM
A reference to 29155 (not the VIO as some might assume) per WaPo:

www.washingtonpost.com/world/2024/1...
January 1, 2025 at 8:50 PM
December 31, 2024 at 11:12 PM
December 30, 2024 at 10:30 PM
Peak dystopia: when the hannukah gelt are now bitcoin
December 29, 2024 at 12:40 AM
The implications of Musk's economic entanglements in China for Starlink's future reliability in emerging crises and conflicts is a pressing issue.

Good to see it featured here by the @washingtonpost.com
December 22, 2024 at 8:02 PM
Please don't be terrible
December 21, 2024 at 9:34 PM
A phenomenal graphic showing the scale and diversity of Russia's salvo targeting Ukraine's energy grid yesterday
November 18, 2024 at 12:24 AM
The remarkable part is the first evidence required for more measured assessment was less than 24 hours away
October 18, 2023 at 7:25 AM
To no surprise, Russia clearly sees possibility in Israel-Palestine conflict. Expect opportunistic exploitation of events to divert attention (and resources if possible) away from Ukraine.
October 16, 2023 at 6:51 AM
Russian grievances with the International Olympic Committee have been a historical driver of full spectrum cyber operations.

Decision to suspend Russia is likely to animate similar efforts. Don't discount Moscow's ability to service emerging requirements in parallel to Ukrainian priorities.
October 12, 2023 at 2:46 PM
It's worth noting this is highly likely the same underlying logic to Russia's opening wiper salvo in Ukraine - to disorganize Ukraine's response.

Crucial to consider how Beijing's thinking has since been shaped by Russia's cyber offensive
July 29, 2023 at 7:52 PM
But not all things stay the same. We've seen significant changes in Russia’s disruptive tool choices. In Ukraine, the GRU has heavily favored “pure” wipers that are pre-packaged and primed for immediate use. Another likely adaptation to a wartime operating environment.
July 12, 2023 at 2:33 PM
The GRU has also continued to integrate self-proclaimed hacktivist personas into its cyber operations. Many of the activities carried out by these false fronts – crowdsourcing DDoS, leaking documents, claiming responsibility for ops – echo all the way back to 2014.
July 12, 2023 at 2:33 PM
It’s also important to understand this playbook in Russia’s own terms. The components of the playbook integrate Russia’s full spectrum of information confrontation (Информационное противоборство) capabilities conceptually defined as KRIKS (КРИКС), ITV (ИТВ), and IPV (ИПВ).
July 12, 2023 at 2:31 PM
The takeaway: The GRU has followed the same five phase disruptive playbook throughout the war. Alternatives have existed, but the GRU has opted for the same tradecraft on repeat. We assess that these choices are calculated adaptations to a wartime operating environment.
July 12, 2023 at 2:31 PM
Big Turla takedown vibes
May 20, 2023 at 4:55 PM
Greetings from the NAFO Brussels chapter.
May 18, 2023 at 3:46 PM