Latest news with #OSINT


India.com
3 days ago
- Politics
- India.com
Operation Sindoor: China sends another HQ-16 to Pakistan as Asim Munir's army trembles in India's fear, Shehbaz Sharif also plan to...
China-Pakistan relationship New Delhi: During 'Operation Sindoor', India launched a brutal attack on Pakistan, destroying its air defense network completely. The Indian Armed Forces targeted nine terror camps in Pakistan and Pakistan-occupied Kashmir (PoK). It's been over 2 months now since India conducted Operation Sindoor, yet Pakistan continues to struggle with the aftermath. In a bid to support the bankrupt, China has once again stepped in to offer assistance. According to reports from open-source intelligence networks (OSINT), China has supplied a fresh batch of its HQ-16 medium-range surface-to-air missile systems to Pakistan. Reports suggest that China's Y-20 military transport aircraft was seen flying to Pakistan at least three times in recent weeks. These aircraft delivered consignments of the HQ-16 missile systems along with associated equipment. The Y-20 is a heavy-lift military jet capable of transporting up to 66 tons of military cargo. Why Was a New Batch of HQ-16 Needed? During Operation Sindoor, the Indian Air Force targeted key Pakistani airbases such as Noor Khan, Rahim Yar Khan, Sukkur, and Bholari. The Indian Air Force destroyed Pakistan's HQ-16 and HQ-9P air defense systems, along with China-made YLC-8E radars, using BrahMos and SCALP cruise missiles. Can the HQ-16 stop BrahMos? The HQ-16 has a strike range of around 40 kilometers and is primarily designed to intercept drones, fighter jets, and slow-moving missiles. However, the BrahMos missile, which flies at speeds of Mach 2.8 to 3.0 (nearly three times the speed of sound) and cruises at low altitudes, is extremely difficult for the HQ-16 to intercept. How significant is the new shipment to Pakistan? Currently, Pakistan's air defense capability is almost negligible. During the operation, India destroyed two out of its three surveillance aircraft. In this situation, China sending a new batch of equipment is more about boosting Pakistan's military morale — but it will not alter the strategic balance.


Edinburgh Reporter
4 days ago
- Business
- Edinburgh Reporter
Verida AFI Reviews: A Real Strategy for Recovering Stolen Cryptocurrency
In the world of digital finance, promising technologies often come with high risks. Attacks on crypto wallets are becoming increasingly sophisticated—seed phrase hacks, phishing sites, malicious extensions, trojans… the threats are relentless. Fortunately, so are those who stand against them. UK-based law firm Verida AFI has developed an effective system to help recover stolen digital assets—even in seemingly hopeless cases. Positive reviews of Verida AFI show this service is in high demand. Success Stories That Speak Volumes Every successful case brings Verida AFI not only gratitude, but also new proof that recovering stolen cryptocurrency is not a pipe dream, but real-world practice. Find reviews on: HackMD Medium GitHub Clients highlight: The firm's effectiveness where local police wouldn't help Clear, jargon-free communication Fair terms—no upfront fees, only payout based on recovered funds 'I thought everything was lost. But after two months, part of the funds were back. A miracle? No, just Verida AFI doing their job.' Why Losing Crypto Isn't a Death Sentence The idea of crypto anonymity is a myth criminals love to exploit. But blockchain records every transaction permanently. If you know how to follow the trail, it's all there. Verida AFI uses this to turn the blockchain into a solid evidentiary trail—tracking funds through aliases, transit wallets, exchanges, and cash-out points. From Digital Trail to Real Funds Recovery begins with analyzing transaction flows using OSINT and blockchain analytics to identify: Wallet addresses tied to scammers Exchanges used for withdrawals IP addresses, devices, services involved Potential geographic locations Once the trail is found, Verida AFI takes legal action—filing freeze requests with exchanges, working with regulators, preparing claims, and, if needed, contacting law enforcement, Interpol, or international courts. Photo by Towfiqu barbhuiya: Merging Tech with Legal Expertise Verida AFI's strategy includes: Global coordination with exchanges and financial bodies Criminal claims and lawsuits Asset-freeze petitions Linking wallet addresses to criminals through documented analysis Helping restore wallet access, even if keys are compromised All actions follow legal frameworks, supported by high-tech blockchain analysis used in cybercrime investigations worldwide. Fee Structure That Protects You Their fee is based on success: 5–7% of recovered assets, paid only upon result. No upfront payments. This low-risk model makes their services accessible to those already affected. Who They Serve Clients include more than just crypto traders—they help NFT owners, DeFi participants, users deceived by 'trusted' investment platforms, and entrepreneurs holding funds in stablecoins. Regardless of the case, Verida AFI provides a tailored strategy, rooted in persistence and expertise. Your wallet was hacked and assets transferred elsewhere You fell victim to phishing or insider threats Malware or unauthorized access compromised your keys Or you simply want to understand where your crypto went and whether recovery is possible Verida AFI not only helps recover what was lost—they also teach you how to protect your assets in the future. In crypto, the most valuable asset is awareness. Conclusion As cybercriminal methods evolve, so do countermeasures. Don't stay silent or write off lost crypto as gone forever. A timely approach with Verida AFI could be the key to retrieval. In the digital world, nothing is truly lost—if you know where and how to look. Like this: Like Related


India.com
13-07-2025
- India.com
Forget B-2 Bomber, US to unveil its deadliest, most powerful B-21 raider, has thermal masking system, can carry 13 tonnes..., name is...
The B-21 Raider is a project that is among the most secretive defense programs in the United States. However, open-source intelligence (OSINT) and satellites have provided insight into the relatively quiet development of the program. Recently, multiple B-21 test flights were observed at Edwards Air Force Base in California, reported NavBharatTimes. According to several media reports, experts suggested that these test flights were part of the assessment of the bomber's stealth capabilities, that is, it can operate undetected and is totally invisible on active radar. Although the B-2 Spirit and the B-21 Raider are both stealth bombers, the B-21 has next-generation technology, making the B-21 as ready for future warfare as it can be. Although the B-2 could avoid radar, the B-21's stealth capability far exceeds the B-2. While the B-2 took measures to mitigate its heat signature as part of a stealth capability improvement, the B-21 boasts a complete thermal masking system that enables it to evade infrared detection as well. According to the NavBharatTimes report, the B-21 has smart capabilities, like integration of AI, as well as health monitoring systems that allow it to detect and diagnose its own technical anomalies. To date, there is no direct indication that live missile tests have been successfully conducted as of this writing. Nevertheless, there are plans for the B-21 Raider to conduct live test series weapon bay opening and dummy bomb tests in July of 2025; this includes testing to simulate Unified Combatant command-fight scenarios with dummy bombs to understand the effects of combat-weight and future release. Although the Pentagon and Northrop Grumman are not making any comments, there was a leak that indicated that the B-21 initial operational deployment phase should occur by 2027, with a full operational capability by 2029. And when the B-21 enters active service, aerial warfare will never be the same.


India Today
08-07-2025
- India Today
Beware: This traffic challan message can drain your bank account
The online vehicle services app, mParivahan, used primarily for e-challan management, has been at the centre of attention. The scam came to light when a Mumbai-based professional lost money through a cloned version of the mParivahan app and posted about the incident on wasn't an isolated case—nor is it the only government app being cloned by cybercriminals. Similar incidents of financial loss linked to government applications have been widely reported. To dig deeper, India Today's Open Source Intelligence(OSINT) team scoured the web for the rogue APK(Android Package Kit) file responsible for duping users and conducted a detailed malware scam starts with a WhatsApp message from an Indian number, carrying a fake APK file and the victim's vehicle number to make it look legit. Once installed, the app asks for access to contacts, call logs, and messages—giving hackers full access to your data. Moments later, unauthorised transactions take place—without warning or how does your critical data end up in a scammer's hand, like it's no big deal?India Today downloaded the infected app and ran a detailed malware analysis. The APK file was uploaded to the malware scanning platform VirusTotal, which flagged trojans like and RewardSteal—malware designed to steal sensitive user fake apk file is a near-identical clone of the official mParivahan app—with subtle tweaks that fool you into granting access to phone functions like calls and SMS. Behind the scenes, it retrieves your private data and silently transmits it to scammers via hidden Telegram bots. In an earlier report, India Today exposed the 'Vahan Parivahan' APK, which intercepted OTPs to enable fraudulent e-commerce transactions. The latest clone, however, shows a more advanced threat profile—designed to harvest Aadhaar credentials and banking information. It also exploits device permissions to access local files and storage, significantly heightening the risk of sensitive data infected, the device grants attackers access to SMS, contacts, and storage. The malware uses fake login screens, intercepts OTPs, and extracts sensitive files like Aadhaar documents—silently sending all data via hidden Telegram bots, enabling swift financial frauds. Attackers can monitor all pre-installed banking and payment apps on the infected scam's reach goes beyond the initial victim. By hijacking chats and OTPs, cybercriminals can target victims' family and contacts, attempting to steal their money too. This isn't merely a theoretical risk — in a recent case in Bengaluru, both the victim and his wife were targeted with attempted unauthorised transactions.A US-based mobile security firm, Zimperium, earlier reported a similar trend where malware is spread via WhatsApp as APK files disguised as legitimate government or banking apps. Once installed, these fake apps trick users into revealing sensitive financial and personal zLabs research team discovered nearly 900 malware samples primarily targeting Indian customers using net banking and mobile banking analysis also revealed shared code structures, user interface elements, and app logos, suggesting a coordinated effort by a single threat actor targeting mobile devices running the Android also found 222 exposed firebase storage buckets holding 2.5GB of stolen personal and financial data, highlighting the extensive scale of this threat.- Ends


Telegraph
07-07-2025
- Business
- Telegraph
Can the Houthis split the US carrier force and let Iran close Hormuz?
o over 90 per cent for the more valuable ships. Some 16 months of US strikes and coalition defensive operations followed but these figures barely changed. Then, on 15 March this year, President Trump turned the strike dial up to eleven. It cost the US war machine in excess of a billion dollars in expended munitions but by 6 May the bombardment had apparently worked, and the near daily missile firings stopped. The uneasy ceasefire held despite the 12-day war between Iran and Israel that followed. So why start again now? The anti-shipping campaign put the Houthis on the map, generating significant international attention and local status for them. It's perfectly possible that they just want to keep that going. That they didn't use missiles is interesting. This was by far the most common method before the ceasefire. Is that because the surge in US strikes in March has taken most of their missiles out, or are they keeping them back for another day? It's fair to assume that their supply lines from Iran have dried up, but it has also been assessed that the Houthis are now so proficient at making drones and missiles that they are in fact net exporters. My bet is that they are indeed down on missile stocks so thought they would try another way, though it isn't the first time. Anonymous OSINT account Intelschizo usefully reports 59 USV attacks have taken place since October 23 (compared to 866 drones and 319 missiles). But if you actually want to sink a ship rather than just cause a ruckus by hitting it, a USV at the waterline will often be more effective than the Houthis' lower-yield missiles, many of which have previously glanced off or been absorbed. But this may not just be Houthi grandstanding: it may be part of a coordinated plan to split the attention of US forces in the region. If Iran were minded to close the Strait of Hormuz or just mount interference there, this is how they would start off. There are two US aircraft carriers in the Gulf of Oman (GOO) just now, the USS Carl Vinson and the USS Nimitz. Asking, or directing, the Houthis to start up again will inevitably draw one of those ships West to cover that threat again, possibly even restarting US counter strikes where they left off in May. Then, with only one carrier left in the GOO, Iran is under less threat if it starts harassment and disruption in the Strait of Hormuz. I still wouldn't fancy trying to operate within reach of a hostile US carrier group, but better one than two. Also, by my maths, the USS Vinson only has a couple of months left on task and the Nimitz is on loan from the Pacific Command who will be keen to have her back. The USS Gerald R Ford is steaming across the Atlantic as we speak, ready to take up position in the Mediterranean but could, in theory, be pulled into the Red Sea. For the price of a few USVs, the Houthis are back in the game, although at a cost as Israeli rockets hit their ports in retaliation. What is clear between this attack and the subsequent counter, is that a key international chokepoint that appeared to have been pacified is under fire again. Whether it's the first move in a new Iranian campaign or simply the Houthis attention-seeking, what we have here is a terrorist organisation with a stranglehold over a major world shipping route – and that can't be a good thing.