Latest news with #OSINT


India Today
7 days ago
- Politics
- India Today
India hit Pak N-warheads depot Kirana Hills during Op Sindoor, claims OSINT expert
There is satellite imagery to suggest that India hit Pakistan's Kirana Hills, one of the storehouses of the country's nuclear warheads, according to renowned OSINT expert Damien Symon. However, replying to a query, Symon suggested that the image indicates it was a warning strike without any subterranean impact or the mini-war between India and Pakistan in May, India's retaliatory strikes, including those at Nur Khan airbase in Chaklala, made Islamabad call for a Indian military rejected that it had targeted Kirana Hills in Sargoda district of Pakistan's Punjab province. It is believed that reinforced caves within the mountains are one of the sites of where the Pakistani military stores its nuclear warhead."We have not hit Kirana Hills, whatever is there. I did not brief in my briefing yesterday," said Air Marshal AK Bharti on May 12 responding to a question from a journalist during a tri-services Symon shared Google Earth an image of Sargodha region of Pakistan that he claimed were from updated June 2025, saying that it showed the "impact location of India's strike on Kirana Hills in May 2025". Symon is a geo-intelligence researcher and Open Source Intelligence (OSINT) expert known for his work at The Intel is widely recognised for analysing satellite imagery and publicly available data to verify or debunk claims related to conflict zones, particularly in the India-Pakistan region."Imagery update from Google Earth of the Sargodha region, Pakistan, captured in June 2025, shows -1 - the impact location of India's strike on Kirana Hills in May 2025. 2 - repaired runways at Sargodha airbase post India's strikes in May 2025," Symon posted on X on July 18.A user asked Symon if the scar indicated it was a deep strike."No, this along with earlier imagery, neither indicate any subterranean impact or penetration, it's just one side of a hill with nothing of value in its immediate vicinity, must've been a warning strike on India's part, tunnels etc are further away & don't show any damage," replied media was abuzz with chatter on how Kirana Hills might have been hit in Operation Sindoor. Handles have shared images, videos and maps claiming a blast at the Kirana Hills in showed dense plumes of smoke rising from the base of the rugged Kirana Hills. But high-resolution satellite imagery was by India Today's OSINT team placed the smoke near the hills, based on the footage posted on the day of the IS OSINT EXPERT DAMIEN SYMON?Operating under the handle @detresfa on X, Symon has garnered attention for exposing disinformation, such as manipulated images and false claims by Pakistan's Inter-Services Public Relations (ISPR) during India's Operation Sindoor in May work includes confirming damage to Pakistani military installations, like the Sargodha airbase, and debunking fabricated narratives, such as doctored images of Indian uses tools like LANDSAT, KawaSpace, and MazarVision imagery to provide verifiable evidence, contributing to discussions on digital disinformation and military KIRANA HILLS HIT UNDER OPERATION SINDOOR?While the Mushaf airbase in Sargodha was confirmed as one of India's missile targets, Air Marshal Bharti denied reports of any strike on the facility at Kirana two sites are barely seven kilometres carried out strikes on terror camps inside Pakistan and Pakistan-occupied Kashmir (POK) on May 7 after Pakistani terrorists on April 22 killed 26 people in Kashmir's Pakistan targeted Indian military and civilian sites, India struck 11 military sites deep inside Pakistan, using precision targets included critical airbases in Rafiqui, Murid, Nur Khan, Rahim Yar Khan, Sukkur, Chunian, Pasrur, and Sialkot, according to India's Ministry of attack on Nur Khan military base near Rawalpindi, the headquarters of Pakistan's military establishment, is the most strike on Nur Khan airbase in Chaklala, near Rawalpindi, was significant as it lies in close proximity to the headquarters of the Strategic Plans Division, the body overseeing Pakistan's nuclear New York Times quoted a former US official familiar with Pakistan's nuclear programme, noting, "Pakistan's deepest fear is of its nuclear command authority being decapitated. The missile strike on Nur Khan could have been interpreted... as a warning that India could do just that."Satellite imagery also indicated a strike on the runway of Mushaf airbase in Sargodha with loitering munitions. This base is reportedly linked to underground nuclear storage sites beneath the Kirana strikes at Nur Khan and Sargodha were meant to indicate India's capability to neutralise Pakistan's nuclear arsenal in case of further escalation in the called Pakistan's nuclear bluff with its attack during Op target sites and videos on social media gave a boost to the buzz that Kirana Hills had been hit in an indicative attack, revealing India's strike capability. Though Indian military denied there was any attack, OSINT expert Damien Symon has now claimed that Google Earth images, updated in June, indicate Kirana Hills in Sargodha region were hit in a "warnig strike".- EndsMust Watch


India.com
17-07-2025
- Politics
- India.com
Operation Sindoor: China sends another HQ-16 to Pakistan as Asim Munir's army trembles in India's fear, Shehbaz Sharif also plan to...
China-Pakistan relationship New Delhi: During 'Operation Sindoor', India launched a brutal attack on Pakistan, destroying its air defense network completely. The Indian Armed Forces targeted nine terror camps in Pakistan and Pakistan-occupied Kashmir (PoK). It's been over 2 months now since India conducted Operation Sindoor, yet Pakistan continues to struggle with the aftermath. In a bid to support the bankrupt, China has once again stepped in to offer assistance. According to reports from open-source intelligence networks (OSINT), China has supplied a fresh batch of its HQ-16 medium-range surface-to-air missile systems to Pakistan. Reports suggest that China's Y-20 military transport aircraft was seen flying to Pakistan at least three times in recent weeks. These aircraft delivered consignments of the HQ-16 missile systems along with associated equipment. The Y-20 is a heavy-lift military jet capable of transporting up to 66 tons of military cargo. Why Was a New Batch of HQ-16 Needed? During Operation Sindoor, the Indian Air Force targeted key Pakistani airbases such as Noor Khan, Rahim Yar Khan, Sukkur, and Bholari. The Indian Air Force destroyed Pakistan's HQ-16 and HQ-9P air defense systems, along with China-made YLC-8E radars, using BrahMos and SCALP cruise missiles. Can the HQ-16 stop BrahMos? The HQ-16 has a strike range of around 40 kilometers and is primarily designed to intercept drones, fighter jets, and slow-moving missiles. However, the BrahMos missile, which flies at speeds of Mach 2.8 to 3.0 (nearly three times the speed of sound) and cruises at low altitudes, is extremely difficult for the HQ-16 to intercept. How significant is the new shipment to Pakistan? Currently, Pakistan's air defense capability is almost negligible. During the operation, India destroyed two out of its three surveillance aircraft. In this situation, China sending a new batch of equipment is more about boosting Pakistan's military morale — but it will not alter the strategic balance.


Edinburgh Reporter
16-07-2025
- Business
- Edinburgh Reporter
Verida AFI Reviews: A Real Strategy for Recovering Stolen Cryptocurrency
In the world of digital finance, promising technologies often come with high risks. Attacks on crypto wallets are becoming increasingly sophisticated—seed phrase hacks, phishing sites, malicious extensions, trojans… the threats are relentless. Fortunately, so are those who stand against them. UK-based law firm Verida AFI has developed an effective system to help recover stolen digital assets—even in seemingly hopeless cases. Positive reviews of Verida AFI show this service is in high demand. Success Stories That Speak Volumes Every successful case brings Verida AFI not only gratitude, but also new proof that recovering stolen cryptocurrency is not a pipe dream, but real-world practice. Find reviews on: HackMD Medium GitHub Clients highlight: The firm's effectiveness where local police wouldn't help Clear, jargon-free communication Fair terms—no upfront fees, only payout based on recovered funds 'I thought everything was lost. But after two months, part of the funds were back. A miracle? No, just Verida AFI doing their job.' Why Losing Crypto Isn't a Death Sentence The idea of crypto anonymity is a myth criminals love to exploit. But blockchain records every transaction permanently. If you know how to follow the trail, it's all there. Verida AFI uses this to turn the blockchain into a solid evidentiary trail—tracking funds through aliases, transit wallets, exchanges, and cash-out points. From Digital Trail to Real Funds Recovery begins with analyzing transaction flows using OSINT and blockchain analytics to identify: Wallet addresses tied to scammers Exchanges used for withdrawals IP addresses, devices, services involved Potential geographic locations Once the trail is found, Verida AFI takes legal action—filing freeze requests with exchanges, working with regulators, preparing claims, and, if needed, contacting law enforcement, Interpol, or international courts. Photo by Towfiqu barbhuiya: Merging Tech with Legal Expertise Verida AFI's strategy includes: Global coordination with exchanges and financial bodies Criminal claims and lawsuits Asset-freeze petitions Linking wallet addresses to criminals through documented analysis Helping restore wallet access, even if keys are compromised All actions follow legal frameworks, supported by high-tech blockchain analysis used in cybercrime investigations worldwide. Fee Structure That Protects You Their fee is based on success: 5–7% of recovered assets, paid only upon result. No upfront payments. This low-risk model makes their services accessible to those already affected. Who They Serve Clients include more than just crypto traders—they help NFT owners, DeFi participants, users deceived by 'trusted' investment platforms, and entrepreneurs holding funds in stablecoins. Regardless of the case, Verida AFI provides a tailored strategy, rooted in persistence and expertise. Your wallet was hacked and assets transferred elsewhere You fell victim to phishing or insider threats Malware or unauthorized access compromised your keys Or you simply want to understand where your crypto went and whether recovery is possible Verida AFI not only helps recover what was lost—they also teach you how to protect your assets in the future. In crypto, the most valuable asset is awareness. Conclusion As cybercriminal methods evolve, so do countermeasures. Don't stay silent or write off lost crypto as gone forever. A timely approach with Verida AFI could be the key to retrieval. In the digital world, nothing is truly lost—if you know where and how to look. Like this: Like Related


India.com
13-07-2025
- India.com
Forget B-2 Bomber, US to unveil its deadliest, most powerful B-21 raider, has thermal masking system, can carry 13 tonnes..., name is...
The B-21 Raider is a project that is among the most secretive defense programs in the United States. However, open-source intelligence (OSINT) and satellites have provided insight into the relatively quiet development of the program. Recently, multiple B-21 test flights were observed at Edwards Air Force Base in California, reported NavBharatTimes. According to several media reports, experts suggested that these test flights were part of the assessment of the bomber's stealth capabilities, that is, it can operate undetected and is totally invisible on active radar. Although the B-2 Spirit and the B-21 Raider are both stealth bombers, the B-21 has next-generation technology, making the B-21 as ready for future warfare as it can be. Although the B-2 could avoid radar, the B-21's stealth capability far exceeds the B-2. While the B-2 took measures to mitigate its heat signature as part of a stealth capability improvement, the B-21 boasts a complete thermal masking system that enables it to evade infrared detection as well. According to the NavBharatTimes report, the B-21 has smart capabilities, like integration of AI, as well as health monitoring systems that allow it to detect and diagnose its own technical anomalies. To date, there is no direct indication that live missile tests have been successfully conducted as of this writing. Nevertheless, there are plans for the B-21 Raider to conduct live test series weapon bay opening and dummy bomb tests in July of 2025; this includes testing to simulate Unified Combatant command-fight scenarios with dummy bombs to understand the effects of combat-weight and future release. Although the Pentagon and Northrop Grumman are not making any comments, there was a leak that indicated that the B-21 initial operational deployment phase should occur by 2027, with a full operational capability by 2029. And when the B-21 enters active service, aerial warfare will never be the same.


India Today
08-07-2025
- India Today
Beware: This traffic challan message can drain your bank account
The online vehicle services app, mParivahan, used primarily for e-challan management, has been at the centre of attention. The scam came to light when a Mumbai-based professional lost money through a cloned version of the mParivahan app and posted about the incident on wasn't an isolated case—nor is it the only government app being cloned by cybercriminals. Similar incidents of financial loss linked to government applications have been widely reported. To dig deeper, India Today's Open Source Intelligence(OSINT) team scoured the web for the rogue APK(Android Package Kit) file responsible for duping users and conducted a detailed malware scam starts with a WhatsApp message from an Indian number, carrying a fake APK file and the victim's vehicle number to make it look legit. Once installed, the app asks for access to contacts, call logs, and messages—giving hackers full access to your data. Moments later, unauthorised transactions take place—without warning or how does your critical data end up in a scammer's hand, like it's no big deal?India Today downloaded the infected app and ran a detailed malware analysis. The APK file was uploaded to the malware scanning platform VirusTotal, which flagged trojans like and RewardSteal—malware designed to steal sensitive user fake apk file is a near-identical clone of the official mParivahan app—with subtle tweaks that fool you into granting access to phone functions like calls and SMS. Behind the scenes, it retrieves your private data and silently transmits it to scammers via hidden Telegram bots. In an earlier report, India Today exposed the 'Vahan Parivahan' APK, which intercepted OTPs to enable fraudulent e-commerce transactions. The latest clone, however, shows a more advanced threat profile—designed to harvest Aadhaar credentials and banking information. It also exploits device permissions to access local files and storage, significantly heightening the risk of sensitive data infected, the device grants attackers access to SMS, contacts, and storage. The malware uses fake login screens, intercepts OTPs, and extracts sensitive files like Aadhaar documents—silently sending all data via hidden Telegram bots, enabling swift financial frauds. Attackers can monitor all pre-installed banking and payment apps on the infected scam's reach goes beyond the initial victim. By hijacking chats and OTPs, cybercriminals can target victims' family and contacts, attempting to steal their money too. This isn't merely a theoretical risk — in a recent case in Bengaluru, both the victim and his wife were targeted with attempted unauthorised transactions.A US-based mobile security firm, Zimperium, earlier reported a similar trend where malware is spread via WhatsApp as APK files disguised as legitimate government or banking apps. Once installed, these fake apps trick users into revealing sensitive financial and personal zLabs research team discovered nearly 900 malware samples primarily targeting Indian customers using net banking and mobile banking analysis also revealed shared code structures, user interface elements, and app logos, suggesting a coordinated effort by a single threat actor targeting mobile devices running the Android also found 222 exposed firebase storage buckets holding 2.5GB of stolen personal and financial data, highlighting the extensive scale of this threat.- Ends