• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Taking over millions of developers exploiting an Open VSX Registry flaw

 | 

OneClik APT campaign targets energy sector with stealthy backdoors

 | 

APT42 impersonates cyber professionals to phish Israeli academics and journalists

 | 

Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

 | 

Cisco fixed critical ISE flaws allowing Root-level remote code execution

 | 

U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog

 | 

CitrixBleed 2: The nightmare that echoes the 'CitrixBleed' flaw in Citrix NetScaler devices

 | 

Hackers deploy fake SonicWall VPN App to steal corporate credentials

 | 

Mainline Health Systems data breach impacted over 100,000 individuals

 | 

Disrupting the operations of cryptocurrency mining botnets

 | 

Prometei botnet activity has surged since March 2025

 | 

The U.S. House banned WhatsApp on government devices due to security concerns

 | 

Russia-linked APT28 use Signal chats to target Ukraine official with malware

 | 

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Intelligence
  • Satellite images demonstrate that Ukraine is hit by pro-Russian troops across the border

Satellite images demonstrate that Ukraine is hit by pro-Russian troops across the border

Pierluigi Paganini July 28, 2014

The US Ambassador in Ukraine has released satellite images that prove Russia is firing rockets at Ukrainian troops across the border.

The US State Department has released a collection of satellite images, via the ambassador in Ukraine Geoffrey Pyatt,  that demonstrate that the Russian Army is firing rockets against Ukrainian troops located across the border. The images indicate fire from multiple rocket launchers locates “on the Russian side of the border”. The document was prepared by the US Office of the Director of National Intelligence (DNI), it includes the slides that reports what US officials claim to be “ground scarring at a multiple rocket launch site on the Russian side of the border oriented in the direction of Ukrainian military units within Ukraine.”

The US State Department hasn’t released an official statement for the satellite images, it is just inviting its follower to follow the ambassador Geoffrey Pyatt to receive updates on the situation, anyway actually he has just shared the images on his Twitter account without providing further information.

Ukraine Russia war Department of State Tweet

The satellite images, all dating between July 21 and July 25/26, were sent via email in a four-page document titled “Evidence of Russian Shelling into Ukraine“, they confirm Washington’s suspects that the Russian Government is building up troops close to the border and is using them “firing of Russian heavy weapons from the Russian side of the border at Ukrainian military personnel.”

The satellite images were taken after the crash of the Malaysia Airlines Flight MH17, intelligence experts consider the the evidence of the transportation of heavy artillery from Russia to areas controlled by pro-Russian separatist forces.

Ukraine Russia war0

The images were spread by the US ambassador to Ukraine, Geoffrey Pyattm via Twitter, they are considered evidence of the military operation conducted in the area near the border between the states. A slide dated July 23th is said to show self-propelled artillery “oriented in the direction of a Ukrainian military unit within Ukraine.” It said that “the pattern of crater impacts near the Ukrainian military unit indicates strikes from artillery” fired from self-propelled or towed artillery, vice multiple rocket launchers “only found in Russian military units, on the Russian side of the border.”

Ukraine Russia war   Ukraine Russia war 2

The image dated July 21this said to be illustrating a “wide area of impacts near the Ukrainian military” that “indicates fire from multiple rocket launchers.” “The bottom impact crater inset shows impacts within a local village,” DNI claimed.

Courtesy of US State Department

Russia’s Defense Ministry has recently confirmed that international inspectors, which include representatives from the US, NATO and Ukraine, who have visited the area haven’t discovered violations made by Moscow’s troops along the Ukrainian borders.

“It has come to our attention that new allegations by top US officials as to the alleged amassing of Russian troops along the Ukrainian border have been voiced,” “No instances of violations by Russia along the Ukrainian border had been registered by the inspectors,” the ministry said. “Frequent action by the Ukrainian military taking place on the Russian border has hindered our own ability to perform similar inspections and flybys along our border,” the Russia’s Defense Ministry said.

What’s new on the investigation on the MH17 flight?

According to the NYPost pro-Russian rebels are altering MH17 crash site

“British security officials say they have “credible information” that pro-Russian rebels tampered with the crash scene of Malaysian Flight 17 — planting parts from other aircraft at the site in an attempt to foil investigators and push blame for the disaster on Ukrainian forces.” states the journal.“There is evidence starting to emerge of attempts at tampering with the crash scene, moving bodies and black boxes,” one official said, according to The Times of London.“The official added that rebels interfered with the wreckage in order to strengthen the crash narrative concocted by Russian officials and press, which suggests the Boeing 777 was attacked by a Ukrainian SU-25 fighter that was later shot down by separatists.”

Stay tuned for further information.

Pierluigi Paganini

Security Affairs –  (Ukraine, Russian, MH17)


facebook linkedin twitter

Evidence of Russian Shelling into Ukraine Geoffrey Pyatt MH17 rockets Russia Satellite images Ukraine US US Office of the Director of National Intelligence warfare

you might also like

Pierluigi Paganini June 27, 2025
OneClik APT campaign targets energy sector with stealthy backdoors
Read more
Pierluigi Paganini June 27, 2025
APT42 impersonates cyber professionals to phish Israeli academics and journalists
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Taking over millions of developers exploiting an Open VSX Registry flaw

    Hacking / June 27, 2025

    OneClik APT campaign targets energy sector with stealthy backdoors

    Hacking / June 27, 2025

    APT42 impersonates cyber professionals to phish Israeli academics and journalists

    APT / June 27, 2025

    Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages

    Cyber Crime / June 26, 2025

    Cisco fixed critical ISE flaws allowing Root-level remote code execution

    Security / June 26, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT