{"id":4677,"date":"2023-05-15T22:21:11","date_gmt":"2023-05-15T22:21:11","guid":{"rendered":"https:\/\/osintme.com\/?p=4677"},"modified":"2023-05-15T22:24:48","modified_gmt":"2023-05-15T22:24:48","slug":"osint-and-countering-the-russian-propaganda-molfar","status":"publish","type":"post","link":"https:\/\/osintme.com\/index.php\/2023\/05\/15\/osint-and-countering-the-russian-propaganda-molfar\/","title":{"rendered":"OSINT and countering the russian propaganda &#8211; Molfar"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4677\" class=\"elementor elementor-4677\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c683632 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c683632\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-584cbc9\" data-id=\"584cbc9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2351d28 elementor-widget elementor-widget-text-editor\" data-id=\"2351d28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This week we have a great interview with Artem Starosiek, CEO of <a href=\"https:\/\/www.molfar.global\/en\/home\">Molfar<\/a>.<\/p><p>Molfar is a Ukrainian up and coming OSINT company that was propelled into the limelight after February 2022, because of their work of documenting, debunking and counteracting various forms of russian propaganda online.<\/p><p>Read on to find out what it&#8217;s like to operate a growing company in the wartime conditions; also, check out some suggested resources that Artem is sharing towards the end.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1793054 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1793054\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8f3c5b0\" data-id=\"8f3c5b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c445ed8 elementor-widget elementor-widget-testimonial\" data-id=\"c445ed8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-content\">One big change I saw during the war was the shift in cooperation between state bodies and private bodies in Ukraine. Examples of government employees, the military, and regular civilians, all cooperating to counter the russian threat. And this is in every sphere, not just in OSINT.<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta elementor-has-image elementor-testimonial-image-position-aside\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-image\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"218\" height=\"264\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2023\/05\/molfar-CEO.png?fit=218%2C264&amp;ssl=1\" class=\"attachment-full size-full wp-image-4679\" alt=\"\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Artem Starosiek<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">www.molfar.global<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d751604 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d751604\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f3b3525\" data-id=\"f3b3525\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e21ef01 elementor-widget elementor-widget-text-editor\" data-id=\"e21ef01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span id=\"gmail-docs-internal-guid-6a3542f8-7fff-29f4-c7d3-52a0f228c767\">What exactly is Molfar and what is its origin story?<\/span><\/strong><\/p><p dir=\"ltr\">Molfar is a Ukrainian OSINT agency that was formally started in 2019 as it evolved from a group of people doing background checks on individuals and businesses from the perspective of financial investments. Prior to the russian invasion of 2022, we were not particularly active in the public domain, we were mainly focused on private work for clients from the business and legal spheres.<\/p><p dir=\"ltr\">We built our reputation on the word of mouth recommendations. Then in 2022 a shift happened, and we started doing work that we decided to put out for public view. Mostly anything on the open Internet linked to the russian invasion. I would describe us as self-financed, small but growing fast, and last but not the least \u2013 driven by patriotism.<\/p><p dir=\"ltr\" role=\"presentation\"><strong>What can you share about your background and your decision to get into OSINT?<\/strong><\/p><p dir=\"ltr\">I don\u2019t have any formal education or background in OSINT and never had. I come from Dnipro in Ukraine and during my university education, I studied metallurgical production. My OSINT adventure started as a result of temporary summer work. A friend asked me if I was interested in an analyst position at a tech company that at the time was doing online research. It kind of went on from there, but I see it as a random occurrence rather than a deliberate choice at the time.<\/p><p dir=\"ltr\" role=\"presentation\"><strong>What are your main areas of focus and why?<\/strong><\/p><p dir=\"ltr\">Apart from investigative work for private clients and institutions, we work for and with the Ukrainian military, and government bodies. We also do have clients from within the EU and also the US. Also, we volunteer in terms of military intelligence a lot.<\/p><p dir=\"ltr\"><img decoding=\"async\" data-recalc-dims=\"1\" src=\"https:\/\/i0.wp.com\/global-uploads.webflow.com\/62707c377344f34d87d67a7f\/641dcef800a33b46e3a81a45_20.jpg?w=1200&#038;ssl=1\" alt=\"\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d134604 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d134604\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cde9a98\" data-id=\"cde9a98\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a089283 elementor-widget elementor-widget-text-editor\" data-id=\"a089283\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" role=\"presentation\"><strong>What has changed for you from a professional perspective since February 2022?<\/strong><\/p><p dir=\"ltr\">The first big change right after the full-scale war broke out was a switch to remote work. We did this for the safety of our employees, as we did not want to take the risk of working in the office in light of the Russian army advancing on Kyiv. Besides that, we tried to continue doing our work as normal as it was possible under the circumstances.<\/p><p dir=\"ltr\">The biggest changes were the mental ones \u2013 there was a lot of uncertainty, and it was all very scary. After the initial 3 days, when russian troops got close to Kyiv but failed to capture it, we understood that russia would lose the war and that in fact, they had already lost it then. There was so much work to do after that, we often worked 12\u201314 hours per day.<\/p><p dir=\"ltr\" role=\"presentation\"><strong>What are the current challenges and difficulties that Molfar is facing?<\/strong><\/p><p dir=\"ltr\">The war has ways to disrupt everything, but that was not our main challenge. We began to grow and scale, from 25\u201330 employees to about 60 that work for Molfar right now. Processes were hard to change, scaling was challenging too. We have been using russian software and tools for our research on the russian Internet \u2013 those tools have become harder to use as well.<\/p><p dir=\"ltr\">Access to some information got harder. Another big thing was the fact that russian government officials and intelligence services became interested in us. About 2 months ago, we were blacklisted by Roskomnadzor, which means they are blocking access to our site from the russian IP space. That actually was a happy moment for us because it means that our work has had some real impact and success.<\/p><p dir=\"ltr\" role=\"presentation\"><strong>What kind of sources of information do you typically rely on and could recommend to the wider OSINT community?<\/strong><\/p><p dir=\"ltr\">Mainly Telegram and various Telegram bots and services. HUMINT is important too. Knowing the language of your adversary is key because obtaining information often means talking to people. Sources of this information can differ \u2013 a lot of the time it can be hacked russian databases and released out in the open. We use an engine called <a href=\"https:\/\/x-ray.contact\/\" target=\"_blank\" rel=\"noreferrer nofollow noopener\">X-ray Contact<\/a> to go through those databases.<\/p><p dir=\"ltr\"><img decoding=\"async\" data-recalc-dims=\"1\" src=\"https:\/\/i0.wp.com\/global-uploads.webflow.com\/62707c377344f34d87d67a7f\/644695df4a52d1573a864c23_8.jpg?w=1200&#038;ssl=1\" alt=\"\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c63acd0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c63acd0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ee8be4a\" data-id=\"ee8be4a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6cce6a elementor-widget elementor-widget-text-editor\" data-id=\"a6cce6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" role=\"presentation\"><strong>Do you have any tips for navigating the so-called \u201crunet\u201d?<\/strong><\/p><p dir=\"ltr\">There is no point in conducting any analysis of the russian mainstream media content because the organizations behind it are all state puppets and propaganda tools. There is no real information on there, so skip all that and head to other platforms like Telegram.<\/p><p dir=\"ltr\">Telegram is where you can find leaked military correspondence. Telegram is where you can find data dumps and other information that is not being fed by the government. Having said that, not all government sources are useless. For example, checking a website for government tenders allowed us to estimate the true scale of the russian losses in Ukraine: by tracking the growing number of body bags purchased by state departments from private businesses.<\/p><p dir=\"ltr\">You can do the same for factory equipment, even if not strictly military. Again, you need to be able to read the russian language for all this.<\/p><p dir=\"ltr\" role=\"presentation\"><strong>Any tips for RU threat actor research, from bottom-feeder cyber criminals, cybercrime groups to advanced persistent threats or state operatives?<\/strong><\/p><p dir=\"ltr\">Bottom-feeder regular cyber criminals are not that interesting, and the FSB manages all the big players in cybercrime. So, I would say start from the government and entities working for it, like the Wagner mercenary group.<\/p><p dir=\"ltr\">For example, previously we<a href=\"https:\/\/www.molfar.global\/en-blog\/wagnercentr-hackathon\" target=\"_blank\" rel=\"noreferrer nofollow noopener\"> looked into a Wagner hackathon<\/a> organized by Prigozhin \u2013 mainly to search for the digital footprints of its participants online. Turned out that EvilCorp was involved in it. Killnet is another group worth keeping tabs on, as well as other less known hacking groups and collectives.<\/p><p dir=\"ltr\">Mostly, however, Killnet does psyops and what I call \u201cmedia projects\u201d. Which means they aim for maximum impact on regular media or social media, but not as much real life impact. It\u2019s hard to verify claims of hacking, DDoS attacks or anything else they publicly claim they have done. Military work, on the other hand, is kept secret and harder to uncover by civilian online researchers.<\/p><p dir=\"ltr\" role=\"presentation\"><strong>What changes have you been noticing or expect to see in the future within the OSINT landscape?<\/strong><\/p><p dir=\"ltr\">I basically see the field growing and continuing to grow. More people will be getting involved, more OSINT tools and techniques. This stuff is effective. 10 years ago or so, mainly military organizations and intelligence agencies did OSINT work. Now, everybody is at it, some of the best practitioners are regular people. The whole field will continue to expand.<\/p><p dir=\"ltr\">I would like to see some public education elements on fact-checking and researching online sources. Stuff like this should be taught in schools. Initially, we were recruiting students for OSINT work. Now you can find experienced specialists on the job market. One big change I saw during the war was the shift in cooperation between state bodies and private bodies in Ukraine. Examples of government employees, the military, and regular civilians, all cooperating to counter the russian threat. And this is in every sphere, not just in OSINT.<\/p><p dir=\"ltr\">Finally, the developments in AI technologies, further automation of tasks and processes, those things will have a big impact. In a few years, it will all change how open-source intelligence research works and even how we fact-check the fact-checkers.<\/p><p dir=\"ltr\"><img decoding=\"async\" data-recalc-dims=\"1\" src=\"https:\/\/i0.wp.com\/global-uploads.webflow.com\/62707c377344f34d87d67a7f\/6422d02443e4e9d9c34db778_4.png?w=1200&#038;ssl=1\" alt=\"\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cdef0c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cdef0c1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5d96ada\" data-id=\"5d96ada\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0f821d elementor-widget elementor-widget-text-editor\" data-id=\"c0f821d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" role=\"presentation\"><strong>What opsec tips could you share for somebody conducting RU state actor research?<\/strong><\/p><p dir=\"ltr\">You need to start with basic cybersecurity awareness. Stay away from the public cloud and avoid storing sensitive information there. Don\u2019t use public free proxies and free VPN services. It\u2019s essential to separate your investigative environment from your private setup.<\/p><p dir=\"ltr\">Also, when working with other people, always do thorough background checks on everybody, even those who work directly for you. This is unfortunately a necessity. We have had problems with questionable individuals, had to manage risks of infiltration, phishing attempts, people contacting us under false pretenses.<\/p><p dir=\"ltr\">Once I was communicating with a person who claimed he had interesting information \u2013 in one email he sent me an attachment, it was meant to be a document file, but was 25MB in size. This was an attempt to infect my computer with a trojan, I verified the file using a file scanning service. You just have to be overall careful and aware. It might help to purchase some DDoS protection for your website if you are planning to publish some big story.<\/p><p dir=\"ltr\">Sometimes russian intelligence agencies would contact us and pretend to be the Ukrainian Secret Service. Once we even had an insider access attempt, a person who was a russian supporter tried to get employed at Molfar and infiltrate the company from within. We prevented that from happening.<\/p><p dir=\"ltr\" role=\"presentation\"><strong>If you were to get a crystal ball and look ahead 5- 10 years from now \u2013 where do you see Molfar and Ukraine in general?<\/strong><\/p><p dir=\"ltr\">Hopefully, the threat from the east will not be as prominent as we won\u2019t need so many people to work on it! I can see AI coming into the field and changing the way we all work. There will be better software, capable of more thorough analysis.<\/p><p dir=\"ltr\">As for Ukraine overall, I think we showed the world our strength and that our country does not want to be and does not belong in the russian orbit of influence. Maybe we will adopt the Israeli model \u2013 they are a small country surrounded by enemies but have strong links to the EU and US. I also hope that there will not be a russia as we know it in 10 years.<\/p><p dir=\"ltr\" role=\"presentation\"><strong>Anything else to add?<\/strong><\/p><p dir=\"ltr\">Not really, other than sharing some resources that we recommended.<\/p><p dir=\"ltr\"><img decoding=\"async\" class=\"rg_i Q4LuWd aligncenter\" src=\"https:\/\/encrypted-tbn0.gstatic.com\/images?q=tbn:ANd9GcRRxTvkryGgB7Kidvlh4Z6wZx_483OuBG5vQQC-h9MbmMgOQxJhdLkcS4H5lrt3MEx0aXc&amp;usqp=CAU\" alt=\"OSINT Community Molfar\" width=\"248\" height=\"127\" data-noaft=\"1\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-258b237 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"258b237\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f1cf81d\" data-id=\"f1cf81d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9062db2 elementor-widget elementor-widget-text-editor\" data-id=\"9062db2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\"><em><strong>A list of Telegram bots used by Molfar&#8217;s researchers:<\/strong><\/em><\/p><p dir=\"ltr\"><em>1.<a href=\"https:\/\/eyeofgodbot.com\/\" target=\"_blank\" rel=\"noreferrer nofollow noopener\"> The Eye of God<\/a>. It&#8217;s paid, but there seems to be a free period for the first 10 requests. Focused on russia, Ukraine, the Post-Soviet states and a little bit on the world. Often deleted by Telegram. You can get a new bot on their website.<\/em><\/p><p dir=\"ltr\"><em>2.<a href=\"https:\/\/t.me\/UniversalSearchRobot\" target=\"_blank\" rel=\"noreferrer nofollow noopener\"> UniversalSearchRobot<\/a> \u2013 a free Telegram bot focused on russia, Ukraine, the Post-Soviet states and a little bit on the wider world.<\/em><\/p><p dir=\"ltr\"><em>3.<a href=\"https:\/\/t.me\/QuickOSINT_bot\" target=\"_blank\" rel=\"noreferrer nofollow noopener\"> QuickOSINT_bot<\/a> \u2013 another paid Telegram tool, similar to the Eye of God, but sometimes provides new unique information.<\/em><\/p><p dir=\"ltr\"><em><strong>Molfar&#8217;s researchers\u2019 basic toolkit:<\/strong><\/em><\/p><ol><li dir=\"ltr\"><p dir=\"ltr\" role=\"presentation\"><em><a href=\"https:\/\/x-ray.contact\/\" target=\"_blank\" rel=\"noreferrer nofollow noopener\">https:\/\/x-ray.contact\/<\/a> \u2013 person search by name, contacts, image (perfect for US).<\/em><\/p><\/li><li dir=\"ltr\"><p dir=\"ltr\" role=\"presentation\"><em><a href=\"https:\/\/www.getcontact.com\/en\/\" target=\"_blank\" rel=\"noreferrer nofollow noopener\">https:\/\/www.getcontact.com\/en\/<\/a> \u2013 caller ID app for reverse searching numbers<\/em><\/p><\/li><li dir=\"ltr\"><p dir=\"ltr\" role=\"presentation\"><em><a href=\"http:\/\/web.archive.org\/\" target=\"_blank\" rel=\"noreferrer nofollow noopener\">http:\/\/web.archive.org\/<\/a> \u2013 website history.<\/em><\/p><\/li><li dir=\"ltr\"><p dir=\"ltr\" role=\"presentation\"><em><a href=\"https:\/\/search4faces.com\/\" target=\"_blank\" rel=\"noreferrer nofollow noopener\">https:\/\/search4faces.com\/<\/a> \u2013 search by face,<a href=\"http:\/\/odnoklassniki.ru\/\" target=\"_blank\" rel=\"noreferrer nofollow noopener\"> odnoklassniki.ru<\/a>, <a href=\"https:\/\/vk.com\/\">VKontakte<\/a>.<\/em><\/p><\/li><li dir=\"ltr\"><p dir=\"ltr\" role=\"presentation\"><em><a href=\"https:\/\/opencorporates.com\/\" target=\"_blank\" rel=\"noreferrer nofollow noopener\">https:\/\/opencorporates.com\/<\/a> \u2013 aggregator of legal entities.<\/em><\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Molfar is a Ukrainian up and coming OSINT company that was propelled into the limelight after February 2022, because of their work of documenting, debunking and counteracting various forms of russian propaganda online.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[90],"tags":[142,39,71,146,154],"class_list":["post-4677","post","type-post","status-publish","format-standard","hentry","category-conversations-debriefs","tag-blog","tag-interview","tag-russia","tag-tools","tag-ukraine"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/4677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/comments?post=4677"}],"version-history":[{"count":5,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/4677\/revisions"}],"predecessor-version":[{"id":4683,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/4677\/revisions\/4683"}],"wp:attachment":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/media?parent=4677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/categories?post=4677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/tags?post=4677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}