top of page

Search Results

66 results found with an empty search

Blog Posts (58)

  • ❗️CYBERATTACK ON KHIMVOLOKNO

    We struck the computer network of Khimvolokno, the largest supplier of nylon yarn in Russia — the material used to make the lining for helmets and body armor for the Russian army. 👊💥 Cyberattack on Khimvolokno — Details We targeted Khimvolokno as part of our campaign against the Lukashenko regime. The plant routinely circumvents EU sanctions and supplies technical polyamide yarn to Russia , where manufacturers use it to produce military-grade fabrics, including body armor and combat helmets. Several former employees of Khimvolokno and its parent company, Grodno Azot, are currently political prisoners under the Lukashenko regime. We launched the operation on February 24, the anniversary of Russia’s full-scale invasion of Ukraine. The cyberoperation lasted about 24 hours. During that time, we moved freely through the company’s network and gained full domain administrator privileges. Domain controller of the Khimvolokno corporate network On the night of February 25–26, we breached the most secure segment of the IT infrastructure — the data center. We destroyed all eight physical servers, along with dozens of critical virtual machines running on them. Khimvolokno data center — security camera footage We disabled domain controllers, servers, virtual machines, and workstations. Some devices now carry “cyber time bombs.” In total, we gained access to roughly 1,000 machines, including servers involved in core production processes. Khimvolokno’s employees can now prepare for forced leave. Office operations, accounting, marketing and sales, shipping, as well as technical and administrative processes have all been disrupted. Extracting marketing and sanctions-evasion supply data from Khimvolokno’s network We took down ERP systems and databases, corporate email, the Directum document management system, backup systems, and more. Recovery will take weeks, and some data is gone for good. Permanent deletion of large-scale data storage systems We also compromised the security and video surveillance systems, which allowed us to monitor Khimvolokno’s operations in real time. We watched employees pull servers out and attempt to “resuscitate” them. Khimvolokno employees attempt to “resuscitate” the data center — security camera footage We are publishing excerpts from the facility’s security cameras, including footage from production areas, offices, corridors, and entry checkpoints. Surveillance footage shows that Khimvolokno’s warehouses are severely overstocked — typically a sign of serious sales problems. Security camera footage from the Khimvolokno facility Security camera footage from the Khimvolokno facility The Lukashenko regime has halted the release of political prisoners and continues to support Putin’s war. If it wants to avoid further cyber sanctions, it must resume releasing hostages and stop aiding the Russian war machine.

  • P-Telegram Without Passcode Lock

    When security services or law enforcement officers see a passcode prompt on the Telegram login screen, they often suspect that the app is P-Telegram. To reduce suspicion, we introduced a passwordless mode. How it works 1️⃣ Enable the feature: Passcode Lock Menu → Choose the Fake Passcode → Passwordless Mode. 2️⃣ Enter your Fake Passcode when opening Telegram. 3️⃣ The app applies all Fake Passcode settings and will NO longer display the passcode screen on startup. 4️⃣ To restore the original setup, type your Real Passcode into the search bar and tap the back arrow. Who may find this useful Anyone who hides channels, chats, or accounts and wants to avoid drawing attention during an inspection. You can keep P-Telegram in decoy mode at all times and enter your real passcode only when you want to access political chats or channels. 🎥 Watch the video attached to the post for detailed instructions. Please share this post so more people learn about the new feature. Stay safe 🙏

  • Accidental Tap Protection in Partisan Telegram

    Worried about accidentally subscribing to a channel or reacting to a comment? Turn on the Accidental Tap Protection  feature. Once enabled, the app will ask you to confirm actions such as: Opening links outside Telegram Joining chats or channels Reacting to messages (excluding channel posts) Posting comments in chats and channels ⚙️ How to enable Settings → Privacy and Security → Passcode Lock → Partisan Settings → Protection against accidental clicks (Enable)

View All

Other Pages (8)

  • Our Security Apps | Partisan Telegram

    Partisan Telegram (P-TG) — version of Telegram with a number of features that enhance your security. It helps you hide sensitive information, communicate securely, and read independent media news even under dictatorship and military occupation. Download on Android, MacOS, Windows, Linux. Our Security Apps Partisan Telegram (P-Telegram, PTelegram) Partisan Telegram is a version of Telegram with a number of features that enhance your security. It helps you hide sensitive information, communicate securely, and read independent media news even under dictatorship and military occupation. PTelegram looks like regular Telegram, including icons and design looking the same as for the original application. It can also be disguised as any app on your phone of your choice (when installing a special version with masking capabilities). After installation, Partisan Telegram will have all the same chats, contacts, saved messages, channels, and other information as the regular app. Download for Android Download for PC Support P-Telegram Contact us How P-Telegram helps protect your account A brief overview of the main features of Partisan Telegram that help protect your correspondence, subscriptions, and other sensitive account information from unauthorised access. Here is a list of key features; the full guide is available at the link . If you are forced to grant access P-Telegram has a feature called Fake Passcode. You enter this second code if outsiders force you to give them access to your account. When you do this, actions you have set in advance are automatically performed, such as hiding certain chats, channels, or even the account itself. More details Hide or delete sensitive information When the Fake Passcode is entered, the specified actions are performed automatically and invisibly to the person requesting access. You can configure the hiding or deletion of specific chats, channels, and accounts, as well as other settings in case of a dangerous situation. More details Emergency notificaiton(s) In Partisan Telegram, you can set up an SOS message with text of your choice. The message will be sent to pre-selected chats if you enter the wrong password to log into the messenger. More details Secret group chats Original Telegram application makes secret chats are possible between two users only. We put a feature with the ability to create secret groups (group charts) into Partisan Telegram. More details View Telegram channels without joining them Partisan Telegram has a ‘Saved Channels’ section. You can add channels to it to keep them handy, even if you are not subscribed to them. More details Self-deleting messages Partisan Telegram lets you set up automatic deletion of certain messages in any private chat immediately after reading. This can be useful when you need to transfer sensitive information to reduce the risk of data leakage. More details Video — What is P-Telegram? We briefly explain and show what Partisan Telegram is, how it differs from regular Telegram, and why it is worth installing for anyone who cares about the security of their information in the messenger. What else can P-Telegram do? Renaming chats and channels You can set your own names for any chats/channels. For example, to protect against accidental glances at your smartphone screen. >>> Warning about fake information Fake bots, contacts, and channels in the Belarusian segment of Telegram are marked with the FAKE icon. >>> Removal of text about foreign agents When this option is enabled, text about foreign agents in the Russian segment of Telegram is automatically removed. >>> Voice alteration in video/audio You can change your voice during audio/video calls and messages to make it harder to identify. >>> Quick message cleanup The ‘Delete My Messages’ option is available in private chats. You don't need to view the entire chat history to clear messages. >>> Protection against accidental clicks If this option is enabled, the messenger requests confirmation before subscribing to a channel, setting a reaction, etc. >>> Partisan Telegram for Android You may make Partisan Telegram to look like a version of Telegram downloaded from the official messenger website or Google Play. You can also install a version disguised as any smartphone application of your choice. Select your disguising option. Telegram website Google Play Any application of your choice Looking as downloaded from the Telegram website This version of the Partisan Telegram has the same app icon as the original Telegram downloaded from the official messenger website . However, Telegram is not displayed among the installed programs in Google Play. The same happens if you actually download the messenger from the official website. If someone checks your phone and asks why Telegram is not displayed among the installed programs in Google Play, a plausible explanation would be that you downloaded the messenger from the official Telegram website. Download Looking as downloaded from Google Play This version of the Partisan Telegram has the same icon as the original Telegram downloaded from the Google Play app store, which is available on most smartphones running the Android operating system. At the same time, Google Play displays that you have supposedly installed the original Telegram from the store. This version of Partisan Telegram differs from the version disguised as an app from the official messenger website only by its icon. The messenger will not be updated via Google Play. You can update the version via a notification in the app. Download Looking as any application of your choice We offer you @MaskedPtgBot which lets you request and set up Partisan Telegram to mimic any application of your choice, such as Calculator, Notes, or any popular game. V ideo guide — how to work with the bot. User Manual. ⚠️ This version of P-Telegram has its own update workflow: Video tutorial — Upgrade P-Telegram using @MaskedPtgBot . Upgrade instructions in text . The source code for the application is available here . Partisan Telegram was a subject to an independent audit by RIT ESL Global Cybersecurity Institute with financial support from Open Tech Funds. Partisan Telegram for PC To install Partisan Telegram on your computer you do not need to uninstall the original Telegram first. Follow the link or watch the video to check additional information about installation and basic features. Windows х64 Download Windows х86 Download MacOS Download Linux Download The source code for the application is available here . Support PTelegram We need your support to keep expand Partisan Telegram functionality! Please, consider a donation of any amount you can afford. Every contribution is important for our fight for freedom! BTC bc1qprsr2escj8csq93qha9hdxperuj4aexlnzj5hu Check crypto alternatives here . Instructions for secure donations from a bank card to a cryptocurrency wallet in Belarus and Russia ❗️ Donation to a bank card/account Technical support Telegram bot @partisan_telegram_bot Our Telegram channel @cpartisans_security Become a volunteer @cpartisans_join_bot P-Telegram reviews Belarus Ukraine A year ago, during interrogation, they tried to get into my Telegram [on the phone]. I ‘helped’ them by entering with the fake passcode and showed them through ([during which] dialogues, channels, etc. were all removed [automatically by PTG behind the scenes]). I guess they did not understand or did not show that they noticed that this was a PTG. They simply tried to get through the two-factor authentication. I was saved by your app. I hid the Ukrainian chats, and those chats in which I sent positions of the occupiers to the Ukrainian Armed Forces. They [Russians] grabbed me on the street and first beat me and then checked my phone. They asked me what the Telegram code was, I gave them the fake passcode. And then they stopped beating me. And after a few minutes they let me go. I think if I'd turned on that new thing where the app goes into a mode where it's like there's no code, maybe I wouldn't have been beaten at all. FAQ The app does not install. What should I do? The most common cause is a conflict with an existing Telegram installation. PTelegram conflicts with whichever Telegram version it mimics. So if installation fails, first try installing an APK with a different disguise mode. For example, if PTelegram_GooglePlay.apk (https://github.com/wrwrabbit/Partisan-Telegram-Android/releases/latest/download/PTelegram_GooglePlay.apk)fails (disguised as the Google Play version), try installing PTelegram.apk (https://github.com/wrwrabbit/Partisan-Telegram-Android/releases/latest/download/PTelegram.apk)(disguised as the website version). See the documentation here (https://github.com/wrwrabbit/Partisan-Telegram-Android/wiki/Q&A-english#what-is-the-difference-between-ptelegram-builds-with-different-disguise-modes)for more details about the differences between versions. If none of the APK files install, remove the official Telegram client and try installing PTelegram again. If you use a "second space" or an app that clones or hides Telegram (such as Knox Secure Folder), remove the original Telegram there as well. On some devices, you may need to delete the app that creates the “second space” entirely to install Partisan Telegram. You do not need to uninstall third-party Telegram clients such as Telegram X, BGram, or Telegraph. Additional steps that also may help: • save the APK file to the Downloads folder and install it from there; • make sure your phone has enough free storage; • disable Google Play and clear its data. If installation still fails, contact Cyber Partisans support: https://t.me/partisan_telegram_bot(https://t.me/partisan_telegram_bot) Why does the app display user IDs? How can I hide this information? User IDs are not confidential information. While the mobile Telegram app hides them by default, the official desktop client allows to display them. This information is sometimes necessary for administrators of bots and channels. When you unlock PTelegram with a fake passcode, the app hides user IDs automatically and looks like the original Telegram. You can also disable user IDs manually in the Partisan settings.(http://github.com/wrwrabbit/Partisan-Telegram-Android/wiki/Functionality#Partisan-Settings) I am afraid of my phone is searched and because of the presence of a passcode for Telegram, they will be able to figure out that I use the Partisan Telegram. What should I do in this situation? In this case, we recommend using the password-free mode in Partisan Telegram. If this option is enabled, the messenger will default to ‘false password entered’ mode, meaning that all subscriptions, chats, and other information that should not be seen by outsiders when accessing your account will be hidden. To display hidden information, you need to enter the real password in the search bar. We provide more details about the password-free mode of Partisan Telegram here.(https://by.cpartizans.org/en/post/p-telegram-without-passcode-lock) Password-free mode helps to reduce suspicion, but does not mask the application 100%. If the phone is taken for forensic analysis, the installed P-Telegram will be detected. I’m trying to log in, but I don’t receive the SMS code. What should I do? Partisan Telegram does not send login codes via SMS. Therefore, you must first log in to the official Telegram application and enter the code that will be sent via SMS message. Then sign in to the same account using Partisan Telegram. The login code will arrive as a message inside the official Telegram app. If the code does not arrive in the official app, wait 24 hours. After that, Telegram will start sending codes. I can’t take screenshots in PTelegram. How do I enable this option? By default, PTelegram blocks screenshots. To allow them, go to: Settings → Privacy and Security → Passcode Lock Enter your real passcode and enable “App Content in Task Switcher" option. If it possible to restore chats/accounts if I accidentally entered the wrong password and deleted everything? Unfortunately, this is not possible. We prioritize safety over recoverability in this case. I can't change the phone number for my account in Partisan Telegram. What should I do? You have to change your phone number using the original Telegram app.

  • Volunteers | Belarusian Cyber Partisans

    Anyone who shares the group's main goals and values can become a Cyber Partisan. We are looking for volunteers with various talents and experience! (not just in IT) How to Become a Cyber Partisan We welcome volunteers who share the primary goals and principles of the Cyber Partisan group. Having free time is crucial. You can be a professional specialist, but you won't help the group if you only devote a couple of hours a month to the tasks. No prior experience in IT? No problem. Our group comprises individuals with various specialties such as designers, video editors, managers, and more. There are tasks suitable for anyone who's proactive. Not a citizen of Belarus? No issue. We welcome individuals from various countries , as long as they have the enthusiasm to help us accomplish our objectives. We are looking for volunteers! Even if you lack expertise in the listed specialties, you can join us and aid in testing security applications such as P-Telegram and P-SMS. You don't need IT knowledge , just free time, attentiveness and willingness to help. Any form of participation will bring us closer to victory over dictatorship! Long Live Belarus ❤️ 🔹 Pentester: Penetration Testing & Cybersecurity Software 🔹 System Administrator 🔹 Network Engineer 🔹 Desktop Developers C++ (Windows/Linux/Mac) 🔹 Android Developers (Java) 🔹 Video Editor & Designer 🔹 Grant Writing manager / Grant Writer (IT) How to join 01 Reach out to the Telegram bot @cpartisans_join_bot or email cyberpartisans@protonmail.com with the following details: - How you can help. - Your skills and experience. 02 Do NOT block the bot and anticipate a response. Due to the workload of our administrators, the answer may not be immediately, please wait a while. 03 We will reach out to you as soon as possible.

  • About Us | Belarusian Cyber Partisans

    The Cyber Partisans is a group of hacktivists fighting against dictatorship and lawlessness in Belarus. Belarusian Cyber Partisans The Belarusian Cyber Partisans is a highly organized hacktivist collective that is fighting for the liberation of Belarus from dictatorial rule, the establishment of democratic rights and the rule of law in the country. The group emerged in the aftermath of the 2020 protests in Belarus against the tyrant Lukashenko, who had unlawfully taken control of the country. There are no professional hackers among us; most participants are ordinary IT specialists who are unwilling to tolerate lawlessness and are committed to combating dictatorship in any feasible way. All members of the group remain anonymous since otherwise they and their families will be subject to persecution by Lukashenko’s regime. The only non-anonymous participant and official representative of the group is Yuliana Shemetovets. Yuliana graduated from the Belarusian State University in 2016 with a degree in World Economics from the Faculty of International Relations. She also holds a Master's degree in Political Science from Rutgers University, New Jersey, and a Data Analytics from the University of Harrisburg, Pennsylvania, USA. Yuliana joined the Cyber Partisan group in August 2021 after a successful attack on the Ministry of Internal Affairs of Belarus. Since December 2022, the Cyber Partisans have joined forces with the Kastus Kalinouski Regiment , which is fighting in Ukraine as one of the units of the Ukrainian Armed Forces. We engage in cyber offensives targeting adversary infrastructure, performing cyber intelligence, and ensuring cybersecurity. Our Code Cyberpartisans is a group of activists who, in the face of harsh political repression in Belarus, have chosen the only possible form of civil protest and resistance: fighting the structures of Lukashenko's regime online. We are a hacktivist organisation, not a hacker organisation. We bring together specialists from different professions and do not specialise in commercial orders. We work to overthrow the dictatorship in Belarus, not for personal gain. We recognise that there are no ethical criteria for hacktivism, as it is a new method of resistence against dictatorial regimes and warfare. Therefore, we constantly analyse our work and are open to communication with independent experts. We have also developed our own Code of Conduct as a moral guideline that we adhere to. We conduct cyber operations with the minimum possible harm to ordinary Belarusians. Protecting the safety of Belarusian citizens who do not support the Lukashenko regime is our priority. Our work is conducted with equal respect for the rights of all participants, regardless of their nationality, religion, gender or any other affiliation. We do not use the obtained information for personal gain. Only for solving crimes and countering dictatorial regimes in Belarus and Russia. We take care of the personal data of Belarusian citizens, and we make every effort to protect their personal data. We only reveal information that is related to the regime and people who committed crimes against Belarusian citizens. Download the full version of the Code in PDF Our operations As our fight persists, we are unable to discuss the majority of our hacks, access to sensitive systems, and data that we have. Among the publicized operations, the most remarkable ones include: September 26, 2020 Hacking of state-run news websites The group hacked the transmissions of Belarus' state channels (ONT and Belarus-1), which regularly disseminated content in favor of the Lukashenko regime. They broadcasted videos featuring scenes of torture inflicted on individuals detained by Interior Ministry officers during peaceful protests in August 2020. July 26-30, 2021 The beginning of Operation Heat Hacking of numerous state databases of Belarus, including the traffic police database, the AIS Passport system, the database recording citizens' appeals to the Ministry of Internal Affairs, and the operational drone video recordings service of the Ministry of Internal Affairs, among others. August 9, 2021 Hacking of the servers of the Department of Operational and Investigative Activity Provision of the Ministry of Internal Affairs of the Republic of Belarus The group successfully infiltrated the database of the Department of Operational and Investigative Activity Provision under the Ministry of Internal Affairs of Belarus. Consequently, we obtained terabytes of phone conversation records of Belarusian citizens, unveiling extensive surveillance orchestrated by entities controlled by the dictator Lukashenko. August 29, 2021 Hacking of phone databases of all operators in Belarus The group hacked databases containing details of all mobile numbers in Belarus September 2, 2021 Hacking of Unified State Register of Real Estat databases The Unified State Register of Real Estate was hacked. The group gained access to information about all real estate in Belarus. November 1, 2021 Hacking of the Social Security Fund database The National Social Security Fund was hacked. The group obtained access to records concerning official employment in Belarus and the corresponding salary information. November 8, 2021 Hacking of the Passenger Trafic Database November 17, 2021 The beginning of Operation Heat. The group obtained access to information about all individuals who crossed the border of Belarus through official checkpoints. Hacking of the internal network of the Academy of Public Administration of Belarus (so-called Lukashenko’s personal school). November 29, 2021 Cyberattack on the computer network of Belaruskali, one of the largest state-owned companies of Belarus. It used to be one of the largest producers of potash fertilizers in the world. We encrypted the computers and servers of the academy. We set wallpapers on the computers in honor of Roman Bondarenko - a Belarusian who was killed by employees of the Ministry of Internal Affairs after a peaceful protest in the yard of his own home. November 30, 2021 Hacking of the wiretapped conversations within prison cells in Belarus Obtained recordings of conversations from prisoners in Belarus, which were illegally created by prison staff. December 10, 2021 Cyberattack on the computer network of "MogilevTransMash", the largest car company in Belarus The internal network of the enterprise was encrypted, all databases were downloaded. Wallpapers in honor of Andrey Zeltser, a protester killed by KGB employees, were installed on the computers of the staff. January 24, 2022 Cyberattack on the computer network of the Belarusian Railway The primary part of servers, databases, and workstations was encrypted to slow down and disrupt the operations of the Belarusian Railway, through which Russian occupation forces were permitted. Backups were destroyed. Automation and security systems were intentionally NOT affected by the cyberattack to prevent emergency situations. February 27, 2022 Attack on communication nodes and gateways of the Belarusian Railway Restriction on the movement of Russian military equipment through the territory of Belarus towards the borders of Ukraine. November 18, 2022 Cyberattack on the General Radio Frequency Centre, a subdivision of Roskomnadzor We encrypted workstations and extracted over 2 TB of data, which was then passed on to journalists from independent media. This exposure led to the revelation of extensive surveillance by Roskomnadzor of individuals who don't support the Kremlin's policies. May 22, 2023 Cyberattack on "WAGON-SERVICE", Russian logistic company "WAGON-SERVICE" logistics company maintains trains for Russian Railways, which in turn supplies military equipment and ammunition to the front. Workstations were encrypted. All document flow, emails, and data from servers (over 2 TB) were extracted. July 4, 2023 Cyberattack on the Belarusian State University The university's administration is involved in the political suppression of both students and faculty members. Workstations have been encrypted, and more than 3 terabytes of data have been downloaded. All websites were inaccessible. December 31, 2023 Attack on the Belarusian Telegraphic Agency The computer network of the main state propagandists of Lukashenko's criminal regime was attacked. Internal network and main sites hacked. (web archive available here ). Domain controllers affected. Downloaded 90GB of data. Cleared workstations, archives, backups, website servers. April 17, 2024 Cyber Attack on "Grodno Azot" "Grodno Azot" is one of the largest enterprises in Belarus. It's an open joint-stock company, state-run producer of nitrogen compounds and fertilizers. The management of "Grodno Azot" is engaged in political repression against workers and circumvents economic sanctions imposed by Western countries for supporting the Lukashenko regime. Internal emails, document circulation, and hundreds of workstations have been encrypted. Backups of databases, servers, emails, and document circulation have been destroyed. Security systems and surveillance cameras have been breached. The operation of the boiler room has been disrupted. The official website has been targeted (web archive accessible via link ). April 26, 2024 Breach of Belarusian KGB Website We announced that the Belarusian State Security Committee (KGB) website was hacked in the fall of 2023. The database of the website has been made public, which includes approximately 40 thousand inquiries to the KGB from citizens of various countries between September 2014 and August 2023. May 5, 2024 Second Cyber-Attack on Grodno Azot The management of the Grodno Azot plant engages in political repression against workers and circumvents economic sanctions imposed by Western countries for supporting the Lukashenko regime. Our group has erased data from many hundreds of worker computers, cleared document circulation, and affected domain controllers and other servers. March 25, 2025 Hack of the CERT Website — Incident Response Team Under Control of Belarus’s Operational and Analytical Center (OAC) The group announced that the CERT website, the national incident response team controlled by the OAC of dictator Lukashenko, was breached. July 28, 2025 Cyberattack on Russian Aeroflot Aeroflot flights were paralyzed for more than a day. Over 7,000 servers and workstations in the Sheremetyevo and Melkisarovo offices, as well as related data centers, were destroyed. Databases and information systems, along with other elements of the corporate network infrastructure, were wiped. Numerous databases, employee wiretaps, emails, and much more were extracted. February 26, 2026 Cyberattack on the Khimvolokno Plant in Grodno We struck the computer network of the Khimvolokno plant in Grodno — the largest supplier to Russia of nylon threads used to make the lining for helmets and body armor for the Russian army. Domain controllers, servers, virtual machines, and workstations were destroyed. Office operations were disrupted, including accounting, marketing and sales, shipments, as well as technical and administrative processes. We also breached the plant’s security systems, including surveillance cameras and access control checkpoints. Media about Cyber Partisans

View All
  • Telegram-icon-on-transparent-background-PNG_edited
  • Twitter
  • Youtube

© 2026 by CyberPartisans

bottom of page