Anonymous ID: 182006 March 12, 2022, 8:07 p.m. No.15852042   🗄️.is 🔗kun   >>2088

PB

>>15850840 hastily airlifted to the United States from Borispol Airport east of Kiev”. - commoditytrademantra.com 2014 article.

 

reminded me of this from 2018

 

Plane loses its $368 million cargo of gold, platinum and diamonds on takeoff

 

The plane with ten tons of gold, platinum and diamonds lost part of its cargo after taking off from Yakutsk airport today.

 

More rained down as the aircraft gained height.

 

The Nimbus Airlines AN-12 cargo plane hit problems during takeoff; the treasures fell out of the hold all over the runway.

 

The plane then dropped some bars of gold as far as 26 kilometres from the airport.

 

The crew decided to land at the nearby airport of Magan, some 26 kilometres north-west of Yakutsk.

 

Police sealed off the runway and a vast search is underway.

 

Plane loses its $368 million cargo of gold, platinum and diamonds on takeoff

 

The plane was en route to Krasnoyarsk and further to Kupol (Dome) mine.

 

The cargo was reported to be owned by Chukota Mining and Geological company; 75 per cent of the private company is owner by Canadian Kinross Gold.

Technical engineers at the Yakutsk airport who prepared the plane for takeoff have been detained.

 

The value of the load was put at 21 billion roubles.

 

Yakutsk is capital of Yakutia or the Sasha Republic, Russia’s diamond producing region.

Anonymous ID: 182006 March 12, 2022, 8:10 p.m. No.15852062   🗄️.is 🔗kun   >>2177

>>15852043

The US Federal Bureau of Investigation (FBI) says the Ragnar Locker ransomware gang has breached the networks of at least 52 organizations from multiple US critical infrastructure sectors.

 

This was revealed in a joint TLP:WHITE flash alert published on Monday in coordination with the Cybersecurity and Infrastructure Security Agency.

 

"As of January 2022, the FBI has identified at least 52 entities across 10 critical infrastructure sectors affected by RagnarLocker ransomware, including entities in the critical manufacturing, energy, financial services, government, and information technology sectors," the federal law enforcement agency said [PDF].

 

"RagnarLocker ransomware actors work as part of a ransomware family, frequently changing obfuscation techniques to avoid detection and prevention."

 

The flash alert focuses on providing indicators of compromise (IOCs) organizations can use to detect and block Ragnar Locker ransomware attacks.

 

IOCs associated with Ragnar Locker activity include info on attack infrastructure, Bitcoin addresses used to collect ransom demands, and email addresses used by the gang's operators.

 

more:

 

https://www.bleepingcomputer.com/news/security/fbi-ransomware-gang-breached-52-us-critical-infrastructure-orgs/

 

also…same symbol used for Ragnar relay race series Podesta was in.

https://www.runragnar.com/challenge/home