Cause was a slag explosion according to SSAB media person.
Another example of such in this vid, pls excuse FB link.
www.facebook.com/Ottalaussa/v...
@auonsson.bsky.social
Every system is a sensor if you hold it right. Main arena, Baltics. πΈπͺ mastodon.world/@auonsson , x.com/auonsson backup πΈπͺ
Cause was a slag explosion according to SSAB media person.
Another example of such in this vid, pls excuse FB link.
www.facebook.com/Ottalaussa/v...
Cause is still not communicated. "Several fires, fought by company fire fighters" is all the new details I have seen.
22.11.2025 23:53 β π 1 π 0 π¬ 0 π 0The joke continued today.
Open outlook-tab, press 'New mail', write said mail, press 'Send'.
"Sorry you are logged out".
Open new tab to login, get logged in.
Return to tab with mail to send it.
"Lol, you are logged out and your mail is gone."
I cant even.
Steel plant SSAB OxelΓΆsund mid Sweden has suffered a 'large explosion'.
Cause unknown, no souls hurt, smaller fires reported.
The plant produces ~4k ton steel a day and is among Sweden's largest industries.
www.sverigesradio.se/artikel/expl...
There are several sabotages, some risking derailment and hence civilian mass casualty.
You are either naive, bought or both.
Β―\_(γ)_/Β―
Eg it was stated with great fanfare that the flagless vessels would be inspected/stopped a while ago.
They just keep on coming and going, as documented by @pa.nton.cx
The railway Warsaw - Lublin has been attacked with both explosives and sabotage.
"unprecedented act of sabotage targeting directly the security of the Polish state and its civilians. This route is also crucially important for delivering aid to Ukraine" says Polish PM Donald Tusk.
None. At least nothing public.
16.11.2025 21:15 β π 5 π 0 π¬ 1 π 0It bears repeating how Russian shadow fleet tankers increasingly carry military officers in official Russian navy uniforms.
The officers escort, intimidate, obfuscate documents and are generally uncooperative according to the Danish pilots who have an unique insight into these ships.
As one officer of the NATO Baltic Sentry operation stated:
like by a miracle they stopped having accidents as we started patrolling. (Paraphrasing)
Professional assessment from hip: if ships be where ship aint, it spoofs.
16.11.2025 00:11 β π 39 π 2 π¬ 1 π 0Nopes! They have since changed it, but it was like that for a good year. Designed by Microsoft.
12.11.2025 19:38 β π 4 π 0 π¬ 3 π 0"Russia connected" from the thread.
12.11.2025 18:29 β π 2 π 0 π¬ 1 π 0If the sec folks at Svenska KraftnΓ€t actually are good and made it proper, my apologies. It is not directed at you in that case. It is directed at those who run things without having a clue =)
12.11.2025 18:28 β π 33 π 0 π¬ 2 π 0Microsoft 2-factor authentication as implemented in my org:
1 Login on new device with user/password.
2 Pick 2FA-method: phone call.
3 Phone rings. If replier quit the call access is granted, if replier does nothing access is granted. Only by pressing a specific key access is denied.
100% safe
More likely: it cost ten times as much. =)
But they fired Bengt 2015 as a cost saving measure and has since then paid external companies 100 times over what Bengt costed. Bengt is at home swearing at the news, thinking of dropping his emails where he points out the gaping security holes to the news
From first hand experience with security 'professionals' and their "secure solutions" in other large Swedish public organisations/companies I am 0% surprised.
12.11.2025 18:14 β π 45 π 0 π¬ 4 π 0Put 289 GB of secret infrastructure data with Someone elseβ’
>ββββ transmission in progress βββ>
Get rekt.
Technically they are kind of sailing as they drift with the wind.... =)
12.11.2025 18:03 β π 3 π 0 π¬ 0 π 0It has also βmovedβ. Used to be located on some high-rises a km east, now next to a small house.
11.11.2025 14:22 β π 4 π 0 π¬ 0 π 0AIS-spoof-station WHISKEY 365 in Finland is offline.
It operated with a noteworthy 100% uptime for over a year. Oct 30 it started publishing anomalous data and caused a mass spoof event Nov 2.
Now offline since a few hours.
Guess: they were raided by FI authorities.
AIS-spoof-station WHISKEY 365 in Finland is offline.
It operated with a noteworthy 100% uptime for over a year. Oct 30 it started publishing anomalous data and caused a mass spoof event Nov 2.
Now offline since a few hours.
Guess: they were raided by FI authorities.
AIS-spoof-station WHISKEY 365 in Finland is offline.
It operated with a noteworthy 100% uptime for over a year, til it started publishing anomalous data Oct 30 and caused a mass spoof event Nov 2.
Guess: they were raided by FI authorities.
I cannot say if all where out of service, but there are a bunch of examples of scrapped ships. Data seem to be from around 2021 I believe.
But as far as I know no one has systematically gone through all of the suspect positions.
Likely a lot of services use the same data, besides MT and VF.
Also:
"the timestamps of the ATC-recordings do not work"
one post later
"ATC-recording clearly shows this happened at nn:nnUTC"
It is perfectly possible (and imho the most likely) that we have a small fraction real hostile drones and a large fraction resulting drone hysteria.
We will not prove or disprove that with these fourth-hand imprecise descriptions of observations matched to flight tracks.
That site does really cool analysis but I take issue with all the assumptions they make.
One cannot make conclusions from the limited data we have.
Eg for this particular thread they do not even know when the first drone observation was, but 'disprove' it with a flight they found that fits.....
Ships will not be affected in an online attack. But you can make it look like things are happening to the web users or analysts like myself.
A HackRF sending out fake but believable AIS-messages in a tight shipping channel could cause real havoc.
The AIS-receiver station responsible for the mass spoof event Nov 2 in Baltic Sea show anomalous data patterns during 8 more days but returned to normalcy Nov 9.
From a baseline of ~30 ships/h, for 8 days it reported 56-113 ships/h.
Speculation: Mass spoof might have been a mistake by attacker.