OSINT investigations

This page contains all of Molfar's OSINT investigations. Articles are sorted by the date, you can filter them by hashtags or use the built-in search.
Molfar's open-source investigations are an internal product of our agency. If you want to use materials from our OSINT investigations on the media pages or thematic blogs, make sure to leave a link to the Molfar website in your text. We are ready to provide you with additional information on each material, please contact us.

We would also like to remind you that public OSINT investigations are only part of our non-profit work. You can always order our services: background check, corporate intelligence, market analysis, financial intelligence, military intelligence, HUMINT services and others open-source intelligence investigations. These materials are performed on a commercial basis. The information from private orders is never disclosed.
 

Computer game Atomic Heart: propaganda of the USSR, sanctioned investors, tops from Russia
Computer game Atomic Heart: propaganda of the USSR, sanctioned investors, tops from Russia

The Molfar OSINT community conducted an investigation into the company that developed the computer game Atomic Heart. The article provides solid evidence why this game and all further developments of the company should be completely canceled, given the danger such actions pose to Ukrainian citizens. Propaganda of the USSR, sanctioned investors, top of company’s management from Russia, ties with Russian oligarchs and media giants – all this and more in the Molfar OSINT investigation.

[UPDATED]: Big money doesn't smell: how Chernyak (didn't) leave the Russian market
[UPDATED]: Big money doesn't smell: how Chernyak (didn't) leave the Russian market

Molfar continues to investigate Ukrainian brands that, in our opinion, remain connected to Russia. This time, we examined the vodka business of the Chernyak family: we discuss the status of the Morosha, Shustov, and Khortytsia brands in Russia, study ownership structures, and calculate the taxes paid in Russia.

Molfar finds military targets on social media: destroyed railway bridge in the village of Dronivka, Donetsk region
Molfar finds military targets on social media: destroyed railway bridge in the village of Dronivka, Donetsk region

The Molfar OSINT community has developed a unique training material on the use of OSINT and GEOINT techniques to complete the tasks of military intelligence. Locations are searched by analyzing enemy propaganda resources, reports of Russian war correspondents, and social media of Russian military servicemen.

Microchips for the war against Ukraine: how Russia bypasses sanctions with the help of Kazakhstan?
Microchips for the war against Ukraine: how Russia bypasses sanctions with the help of Kazakhstan?

The Molfar team conducted an investigation that exposed schemes of parallel import of goods to the Russian Federation through Kazakhstan. Including dual-use products that can be fully or partially used for military purposes. We reveal parallel import schemes and name the legal entities involved in them.

Thousands of tanks in service with Western allies: why can't they arm Ukraine now?
Thousands of tanks in service with Western allies: why can't they arm Ukraine now?

The Molfar OSINT community has analyzed the stocks of combat and decommissioned tanks in different countries of the world. The article presents calculations of the stocks, lists the countries that own the tanks, analyzes the supplies of tanks to Ukraine, and provides an approximate average cost of tanks and their characteristics. Challenger 1, Challenger 2, Leopard 1, Leopard 2, Abrams, T-72 – analytics on each tank model in the Molfar investigation.

Identification of Russian soldier looter from Bucha by stolen AirPods
Identification of Russian soldier looter from Bucha by stolen AirPods

The Molfar OSINT community has identified a Russian serviceman who robbed a civilian's house in Bucha during the temporary occupation of the city by Russian troops in March 2022. The offender was identified by analyzing his movements using the location tracking service of a stolen Apple gadget.

Contact us