InformNapalm volunteer intelligence community has received hard evidence of the successful hacking operation on the office of Vladislav Surkov (# SurkovLeaks) carried out by the Ukrainian cyber-alliance.

On Monday, October 24, 2016, news about the hacking of Vladislav Surkov, a presidential aide to Vladimir Putin, circled the majority of Ukrainian and Russian media. There were mixed reactions among our readers to the data presented: some found unconvincing the scanned passport copy provided in the announcement on cyberhunta.com.

On October 25, came the official Kremlin reaction to the news. Presidential press secretary Dmitry Peskov was vague while answering the journalists’ questions. He did not directly deny the fact of hacking of the Russian presidential aide’s mailbox, but parried the question with a compliment to Surkov calling him “a talented man,.. [hackers] have always been seeking to impute many different alleged intentions to him”.

Following numerous requests of the readers, InformNapalm community made a direct request to the cyber-alliance of Ukrainian hacktivist groups CYBERHUNTA, FalconsFlame, RUH8 and TRINITY for additional information, evidence and clarifications.

In the course of communication with the hacktivists, new details became known and we also received a Microsoft Outlook data file (.pst) of the [email protected] mailbox with 1GB worth of data (mailbox file on GOOGLE.DRIVE , mailbox file on RUH8 ).

(By the way, the hacktivists also possess data on Peskov obtained during hacking of a number of addresses of assistants and clerks of the Presidential Administration of the Russian Federation, but presenting them is beyond the scope of this publication).

The hacktivists obtained access to the mailbox of the reception office of Vladislav Surkov ([email protected]), as well as to a PC located in the reception office of the Russian president’s aide.

The hacktivists made the material from the period from September 2013 to November 2014 available to the general public. That was the time when major developments of the active phase of the Kremlin’s Novorossia project were unfolding.

The materials relating to the more recent period of 2015-2016 have been currently submitted for analysis to intelligence agencies, they are not subject to disclosure because of their operational value.

The correspondence contains detailed information about the business [1, 2] and media interests of the Russian Federation in Ukraine and, in particular, about the risks of economic blockade of the territories controlled by Donetsk People’s Republic (DPR) and Luhansk People’s Republic (LPR) terrorist organizations. The files also contain comprehensive lists and contact details of the staff of the Presidential Directorate for Social and Economic Cooperation with the Commonwealth of Independent States Member Countries and contact data of the so-called leadership of the self-proclaimed Republic of Abkhazia (RA). There also are agent leads for work with “key figures of RA” and much more.

The materials even contain scans of passports of Vladislav Surkov and his family. In addition, there are scans of all pages with Schengen visas in all the passports (PDF archive).

[ Vladislav Surkov passport PDF, Schengen PDF, Surkov’s son (Roman) passport PDF, Schengen PDF, Surkov’s wife (Natalia Dubovitskaya) passport PDF, Schengen PDF , Surkov’s daughter (Maria) passport PDF, Schengen PDF ]



It is worth reminding that Vladislav Surkov has been put on the EU and U.S. sanctions list in March 2014. He is banned from entering the EU countries and the U.S. Nevertheless, he accompanied Vladimir Putin to the meeting of Normandy contact group in Berlin, which raised a wave of criticism in the Ukrainian media of the spineless European diplomacy.

Read more: Ukrainian hacktivists: Russian trace behind Motorola’s blowup

Translated by Artem Velichko

× Disclaimer Disclaimer

Evidence data was exclusively provided to InformNapalm by the hacktivists of the Ukrainian Cyber Alliance for analysis and processing. InformNapalm Community bears no responsibility for the sources and origin of the data.

