top of page

Search Results

65 results found with an empty search

Blog Posts (57)

  • P-Telegram Without Passcode Lock

    When security services or law enforcement officers see a passcode prompt on the Telegram login screen, they often suspect that the app is P-Telegram. To reduce suspicion, we introduced a passwordless mode. How it works 1️⃣ Enable the feature: Passcode Lock Menu → Choose the Fake Passcode → Passwordless Mode. 2️⃣ Enter your Fake Passcode when opening Telegram. 3️⃣ The app applies all Fake Passcode settings and will NO longer display the passcode screen on startup. 4️⃣ To restore the original setup, type your Real Passcode into the search bar and tap the back arrow. Who may find this useful Anyone who hides channels, chats, or accounts and wants to avoid drawing attention during an inspection. You can keep P-Telegram in decoy mode at all times and enter your real passcode only when you want to access political chats or channels. 🎥 Watch the video attached to the post for detailed instructions. Please share this post so more people learn about the new feature. Stay safe 🙏

  • Accidental Tap Protection in Partisan Telegram

    Worried about accidentally subscribing to a channel or reacting to a comment? Turn on the Accidental Tap Protection  feature. Once enabled, the app will ask you to confirm actions such as: Opening links outside Telegram Joining chats or channels Reacting to messages (excluding channel posts) Posting comments in chats and channels ⚙️ How to enable Settings → Privacy and Security → Passcode Lock → Partisan Settings → Protection against accidental clicks (Enable)

  • Partisan Telegram — Voice Changer Feature

    Starting with version 4.3.0, Partisan Telegram includes a voice-changing option for calls and audio/video recordings. The feature is turned off by default. Here’s how to enable and use it. 📕 You can find answers to most common questions in the user guide . ⚠️ Please note: modifying your voice does not  guarantee anonymity. Technical methods may still allow voice identification. Use this feature thoughtfully and with caution. Download Partisan Telegram disguised as the web version. Download Partisan Telegram disguised as the Google Play version. 🐞 To report bugs, contact the support bot @partisan_telegram_bot ✊ Support the project (BTC) - bc1qw4yqlzgjxnl9dtzchxj7nkjdlw6uz2gdkp0679

View All

Other Pages (8)

  • Our Security Apps | Belarusian Cyber Partisans

    Partisan Telegram (P-TG) and Partisan SMS (P-SMS) — applications for secure communication and news exchange in conditions of dictatorship. Download on Android, iOS, MacOS, Windows, Linux. Our Security Apps Partisan Telegram Messenger for secure communication An application that looks like regular Telegram application, but having additional features to let you securely access independent media news and communicate even under conditions of political repression and military dictatorship. Available for Android and PC . Learn more >>> Partisan SMS Application for exchanging encrypted SMS messages Partisan SMS is used for emergency exchange of encrypted SMS messages, for example, in case of Internet outage. The content of messages can only be viewed with an encryption key. Available for Android and iOS . Learn more >>> Cybersecurity P-Telegram Without Passcode Lock When security services or law enforcement officers see a passcode prompt on the Telegram login screen, they often suspect that the app is P-Telegram. To reduce suspicion, we introduced a passwordless mode. How it works 1️⃣ Enable the feature: Passcode Lock Menu → Choose the Fake Passcode → Passwordless Mode. 2️⃣ Enter your Fake Passcode when opening Telegram. 3️⃣ The app applies all Fake Passcode settings and will NO longer display the passcode screen on startup. 4️⃣ To resto Accidental Tap Protection in Partisan Telegram Worried about accidentally subscribing to a channel or reacting to a comment? Turn on the Accidental Tap Protection feature. Once enabled, the app will ask you to confirm actions such as: Opening links outside Telegram Joining chats or channels Reacting to messages (excluding channel posts) Posting comments in chats and channels ⚙️ How to enable Settings → Privacy and Security → Passcode Lock → Partisan Settings → Protection against accidental clicks (Enable) Partisan Telegram — Voice Changer Feature Starting with version 4.3.0, Partisan Telegram includes a voice-changing option for calls and audio/video recordings. The feature is turned off by default. Here’s how to enable and use it. 📕 You can find answers to most common questions in the user guide . ⚠️ Please note: modifying your voice does not guarantee anonymity. Technical methods may still allow voice identification. Use this feature thoughtfully and with caution. Download Partisan Telegram disguised as the web ve 1 2 3 4 5

  • Home | Belarusian Cyber Partisans

    Official website of the Belarusian Cyber Partisans. Latest news about hacks, cyber attacks, data leaks, and investigations. New All N ews > P-Telegram Without Passcode Lock When security services or law enforcement officers see a passcode prompt on the Telegram login screen, they often suspect that the app is P-Telegram. To reduce suspicion, we introduced a passwordless mode. How it works 1️⃣ Enable the feature: Passcode Lock Menu → Choose the Fake Passcode → Passwordless Mode. 2️⃣ Enter your Fake Passcode when opening Telegram. 3️⃣ The app applies all Fake Passcode settings and will NO longer display the passcode screen on startup. 4️⃣ To resto Cybersecurity Accidental Tap Protection in Partisan Telegram Worried about accidentally subscribing to a channel or reacting to a comment? Turn on the Accidental Tap Protection feature. Once enabled, the app will ask you to confirm actions such as: Opening links outside Telegram Joining chats or channels Reacting to messages (excluding channel posts) Posting comments in chats and channels ⚙️ How to enable Settings → Privacy and Security → Passcode Lock → Partisan Settings → Protection against accidental clicks (Enable) Cybersecurity Partisan Telegram — Voice Changer Feature Starting with version 4.3.0, Partisan Telegram includes a voice-changing option for calls and audio/video recordings. The feature is turned off by default. Here’s how to enable and use it. 📕 You can find answers to most common questions in the user guide . ⚠️ Please note: modifying your voice does not guarantee anonymity. Technical methods may still allow voice identification. Use this feature thoughtfully and with caution. Download Partisan Telegram disguised as the web ve Cybersecurity One-Tap Deletion of All Your Messages in P-Telegram In P-Telegram (Partisan Telegram) , you don’t have to scroll through chats and delete messages one by one. You can remove all of your messages from a private or group chat with a single tap. Reminder: Clear your messages before leaving a group chat. Otherwise, they may remain available to other participants and could appear in exported account history. How to delete your messages with one tap in P-Telegram 1️⃣ Open the chat and tap the three dots in the corner of the screen. Cybersecurity How to Hide Channels and Chats in Telegram from Prying Eyes If you use Partisan Telegram by Cyber Partisans, you can rename any channel or chat however you like and disable its avatar. This helps protect your privacy in everyday situations — for example, on public transport. If someone glances at your screen, they’ll only see the custom name you chose, which reveals nothing about the channel’s real content. Just follow the steps below to hide channels and chats in Telegram (more precisely, in Partisan Telegram). ⚙️ How to Rename Chann Cybersecurity Self-Destructing Messages in PTelegram These can come in handy when you need to share sensitive information and want to reduce the risk of data leaks. How to send Self-Destructing Messages in PTelegram Type the message you want to send → press and hold the send button → select Delete After Reading. Cybersecurity Belarusian Cyber Partisans The Belarusian Cyber Partisans is a highly organized hacktivist collective that is fighting for the liberation of Belarus from dictatorial rule, the establishment of democratic rights, and the rule of law in the country. The group emerged in the wake of the 2020 protests in Belarus against the dictator Lukashenko, who had illegally seized power in the country. There are no professional hackers among us. Most of the participants are regular IT specialists who do not agree with the lawless regime and decided to use their technical expertise to confront the dictatorship within the confines of their abilities. Our operations Over 50 public known cyber operations against dictatorship regimes. However, dozens of the most successful ones have not been disclosed to maintain access to sensitive systems. Hundreds of investigations by independent journalists have been made possible due to the operations conducted by the Cyber Partisans. > 10,000 downloads of Partisan Telegram, a messenger for safe communication between activists. More than 100 Telegram chatbots for independent media and protest organizations in Belarus FAQ What are the goals of the Cyber Partisans? 1. To overthow the dictatorship regime of Lukashenko. 2. To preserve the independence and territorial integrity of Belarus. 3. To stabilize Belarus during the transition period, returning to democratic principles of governance and rule of law. How do the Cyber Partisans choose targets for attacks? 1. Attacks are intended to minimize harm to ordinary citizens and maximize to regime's people. 2. Targets are selected in a manner that genuinely damages dictaroship regimes or acquires important information that aids in causing such damage. We do not operate on systems unrelated to dictatorship regimes. 3. We work within our means. Not all networks can be accessed. However, the more people and resources we have, the broader the range of targets available to us. 4. Within the group, we define a common strategy. Periodically, we gather and prioritize goals based on the current political climate. Our hacktivists then work in line with the approved strategy. Can one order a cyberattack, hack, or information search from you? We do not accept commercial orders. All targets for attacks are chosen in a way that brings us closer to achieving the organization's main goals. How do you assist journalists? Thanks to hacks on structures supporting the dictators Lukashenko and Putin, the Cyber Partisans have obtained a vast amount of databases and documents. This information sheds light on the crimes of dictatorship regimes in Belarus and Russia. All data, which do not compromise the confidentiality and safety of ordinary citizens, are handed over upon request for journalistic investigations. Is it safe to install Partisan Telegram for communication? Partisan Telegram has undergone an independent security audit.(https://www.opentech.fund/news/an-application-and-operational-security-assessment-of-partisan-telegram/) Moreover, the application offers the maximum possible settings to disguise itself as the original Telegram. For activists' safety, we have also implemented a passwordless mode feature.(https://t.me/cpartisans_security/260) If this option is activated, the application does not prompt for the code-password, which could raise suspicion among law enforcement and intelligence personnel. However, Partisan Telegram can be identified through a detailed forensic analysis of the device. We recommend considering this before installing the application. Do the Cyber Partisans provide paid services? All organizations, activists, and individuals adhering to democratic principles can expect our free assistance that aligns with our principles. However, due to our limited resources, immediate and/or long-term information-providing services are only available on a paid basis. For the details and contacts, please refer to the 'Contacts and Donations'(https://www.by.cpartisans.org/en/contact) section. What financial resources does the group have? The primary source of funds is financial assistance from private donors who care about the fate of Belarus. Any assistance is valuable and propels us toward achieving our main goals. What assistance will be most effective for Cyber Partisans? As a non-commercial volunteer organization, the best assistance for us would be donations of any amount acceptable to you. Funds are needed to support servers with databases, feedback bots, equipment, and the work of specialists. See the details in the 'Contacts and Donations'(https://www.by.cpartisans.org/en/contact) section. You can also make a significant contribution by joining our volunteer team. To do this, write to our bot @cpartisans_join_bot.(https://t.me/cpartisans_join_bot) Let's free Belarus from dictatorship! Help financially ➤ To become a cyber partisan ➤

  • About Us | Belarusian Cyber Partisans

    The Cyber Partisans is a group of hacktivists fighting against dictatorship and lawlessness in Belarus. Belarusian Cyber Partisans The Belarusian Cyber Partisans is a highly organized hacktivist collective that is fighting for the liberation of Belarus from dictatorial rule, the establishment of democratic rights and the rule of law in the country. The group emerged in the aftermath of the 2020 protests in Belarus against the tyrant Lukashenko, who had unlawfully taken control of the country. There are no professional hackers among us; most participants are ordinary IT specialists who are unwilling to tolerate lawlessness and are committed to combating dictatorship in any feasible way. All members of the group remain anonymous since otherwise they and their families will be subject to persecution by Lukashenko’s regime. The only non-anonymous participant and official representative of the group is Yuliana Shemetovets. Yuliana graduated from the Belarusian State University in 2016 with a degree in World Economics from the Faculty of International Relations. She also holds a Master's degree in Political Science from Rutgers University, New Jersey, and a Data Analytics from the University of Harrisburg, Pennsylvania, USA. Yuliana joined the Cyber Partisan group in August 2021 after a successful attack on the Ministry of Internal Affairs of Belarus. Since December 2022, the Cyber Partisans have joined forces with the Kastus Kalinouski Regiment , which is fighting in Ukraine as one of the units of the Ukrainian Armed Forces. We engage in cyber offensives targeting adversary infrastructure, performing cyber intelligence, and ensuring cybersecurity. Our Code Cyberpartisans is a group of activists who, in the face of harsh political repression in Belarus, have chosen the only possible form of civil protest and resistance: fighting the structures of Lukashenko's regime online. We are a hacktivist organisation, not a hacker organisation. We bring together specialists from different professions and do not specialise in commercial orders. We work to overthrow the dictatorship in Belarus, not for personal gain. We recognise that there are no ethical criteria for hacktivism, as it is a new method of resistence against dictatorial regimes and warfare. Therefore, we constantly analyse our work and are open to communication with independent experts. We have also developed our own Code of Conduct as a moral guideline that we adhere to. We conduct cyber operations with the minimum possible harm to ordinary Belarusians. Protecting the safety of Belarusian citizens who do not support the Lukashenko regime is our priority. Our work is conducted with equal respect for the rights of all participants, regardless of their nationality, religion, gender or any other affiliation. We do not use the obtained information for personal gain. Only for solving crimes and countering dictatorial regimes in Belarus and Russia. We take care of the personal data of Belarusian citizens, and we make every effort to protect their personal data. We only reveal information that is related to the regime and people who committed crimes against Belarusian citizens. Download the full version of the Code in PDF Our operations As our fight persists, we are unable to discuss the majority of our hacks, access to sensitive systems, and data that we have. Among the publicized operations, the most remarkable ones include: September 26, 2020 Hacking of state-run news websites The group hacked the transmissions of Belarus' state channels (ONT and Belarus-1), which regularly disseminated content in favor of the Lukashenko regime. They broadcasted videos featuring scenes of torture inflicted on individuals detained by Interior Ministry officers during peaceful protests in August 2020. July 26-30, 2021 The beginning of Operation Heat Hacking of numerous state databases of Belarus, including the traffic police database, the AIS Passport system, the database recording citizens' appeals to the Ministry of Internal Affairs, and the operational drone video recordings service of the Ministry of Internal Affairs, among others. August 9, 2021 Hacking of the servers of the Department of Operational and Investigative Activity Provision of the Ministry of Internal Affairs of the Republic of Belarus The group successfully infiltrated the database of the Department of Operational and Investigative Activity Provision under the Ministry of Internal Affairs of Belarus. Consequently, we obtained terabytes of phone conversation records of Belarusian citizens, unveiling extensive surveillance orchestrated by entities controlled by the dictator Lukashenko. August 29, 2021 Hacking of phone databases of all operators in Belarus The group hacked databases containing details of all mobile numbers in Belarus September 2, 2021 Hacking of Unified State Register of Real Estat databases The Unified State Register of Real Estate was hacked. The group gained access to information about all real estate in Belarus. November 1, 2021 Hacking of the Social Security Fund database The National Social Security Fund was hacked. The group obtained access to records concerning official employment in Belarus and the corresponding salary information. November 8, 2021 Hacking of the Passenger Trafic Database November 17, 2021 The beginning of Operation Heat. The group obtained access to information about all individuals who crossed the border of Belarus through official checkpoints. Hacking of the internal network of the Academy of Public Administration of Belarus (so-called Lukashenko’s personal school). November 29, 2021 Cyberattack on the computer network of Belaruskali, one of the largest state-owned companies of Belarus. It used to be one of the largest producers of potash fertilizers in the world. We encrypted the computers and servers of the academy. We set wallpapers on the computers in honor of Roman Bondarenko - a Belarusian who was killed by employees of the Ministry of Internal Affairs after a peaceful protest in the yard of his own home. November 30, 2021 Hacking of the wiretapped conversations within prison cells in Belarus Obtained recordings of conversations from prisoners in Belarus, which were illegally created by prison staff. December 10, 2021 Cyberattack on the computer network of "MogilevTransMash", the largest car company in Belarus The internal network of the enterprise was encrypted, all databases were downloaded. Wallpapers in honor of Andrey Zeltser, a protester killed by KGB employees, were installed on the computers of the staff. January 24, 2022 Cyberattack on the computer network of the Belarusian Railway The primary part of servers, databases, and workstations was encrypted to slow down and disrupt the operations of the Belarusian Railway, through which Russian occupation forces were permitted. Backups were destroyed. Automation and security systems were intentionally NOT affected by the cyberattack to prevent emergency situations. February 27, 2022 Attack on communication nodes and gateways of the Belarusian Railway Restriction on the movement of Russian military equipment through the territory of Belarus towards the borders of Ukraine. November 18, 2022 Cyberattack on the General Radio Frequency Centre, a subdivision of Roskomnadzor We encrypted workstations and extracted over 2 TB of data, which was then passed on to journalists from independent media. This exposure led to the revelation of extensive surveillance by Roskomnadzor of individuals who don't support the Kremlin's policies. May 22, 2023 Cyberattack on "WAGON-SERVICE", Russian logistic company "WAGON-SERVICE" logistics company maintains trains for Russian Railways, which in turn supplies military equipment and ammunition to the front. Workstations were encrypted. All document flow, emails, and data from servers (over 2 TB) were extracted. July 4, 2023 Cyberattack on the Belarusian State University The university's administration is involved in the political suppression of both students and faculty members. Workstations have been encrypted, and more than 3 terabytes of data have been downloaded. All websites were inaccessible. December 31, 2023 Attack on the Belarusian Telegraphic Agency The computer network of the main state propagandists of Lukashenko's criminal regime was attacked. Internal network and main sites hacked. (web archive available here ). Domain controllers affected. Downloaded 90GB of data. Cleared workstations, archives, backups, website servers. April 17, 2024 Cyber Attack on "Grodno Azot" "Grodno Azot" is one of the largest enterprises in Belarus. It's an open joint-stock company, state-run producer of nitrogen compounds and fertilizers. The management of "Grodno Azot" is engaged in political repression against workers and circumvents economic sanctions imposed by Western countries for supporting the Lukashenko regime. Internal emails, document circulation, and hundreds of workstations have been encrypted. Backups of databases, servers, emails, and document circulation have been destroyed. Security systems and surveillance cameras have been breached. The operation of the boiler room has been disrupted. The official website has been targeted (web archive accessible via link ). April 26, 2024 Breach of Belarusian KGB Website We announced that the Belarusian State Security Committee (KGB) website was hacked in the fall of 2023. The database of the website has been made public, which includes approximately 40 thousand inquiries to the KGB from citizens of various countries between September 2014 and August 2023. May 5, 2024 Second Cyber-Attack on Grodno Azot The management of the Grodno Azot plant engages in political repression against workers and circumvents economic sanctions imposed by Western countries for supporting the Lukashenko regime. Our group has erased data from many hundreds of worker computers, cleared document circulation, and affected domain controllers and other servers. March 25, 2025 Hack of the CERT Website — Incident Response Team Under Control of Belarus’s Operational and Analytical Center (OAC) The group announced that the CERT website, the national incident response team controlled by the OAC of dictator Lukashenko, was breached. July 28, 2025 Cyberattack on Russian Aeroflot Aeroflot flights were paralyzed for more than a day. Over 7,000 servers and workstations in the Sheremetyevo and Melkisarovo offices, as well as related data centers, were destroyed. Databases and information systems, along with other elements of the corporate network infrastructure, were wiped. Numerous databases, employee wiretaps, emails, and much more were extracted. Media about Cyber Partisans

View All
  • Telegram-icon-on-transparent-background-PNG_edited
  • Twitter
  • Youtube

© 2026 by CyberPartisans

bottom of page