800+ATTACK ATTEMPTS
45+ATTACKER IPs
0DATA COMPROMISED
48hAFTER FIRST ARTICLE

What Happened

SERVER LOGS CONFIRMED

On March 29, 2026, OWL published its first wave of investigative articles exposing corruption networks across Armenia's political establishment. By March 30 -- exactly one day later -- our servers began recording a surge of automated cyberattack attempts.

Every single attempt was logged. Every single attempt failed. This is what they tried.

What They Searched For

ATTACK PATTERN ANALYSIS

WHAT THEY SEARCHED FORATTEMPTSWHAT THEY FOUND
WordPress admin panels
wp-admin, wp-login, wp-content
428Nothing. We don't use WordPress.
Environment files
.env, .env.bak, .env.production, .env.local
150+Nothing. We have no backend.
Source code repositories
.git/config, .git/HEAD
17Nothing. No code to steal.
Payment credentials
stripe.json, stripe_secret, stripe_config
40+Nothing. We use cryptocurrency only.
Cloud credentials
aws.config, docker-compose.yml, serverless.yml
30+Nothing. No cloud services.
Database access
database.yml, credentials.json, phpmyadmin
20+Nothing. We have no database.
Admin dashboards
admin/, dashboard/, cpanel/, manager/
15+Nothing. No admin panel exists.
Shell uploads / backdoors
wp-content/uploads, upload paths
4Nothing. No upload functionality.
They came looking for a web application with databases, admin panels, and payment systems. They found a wall.

The Attack Timeline

HOUR BY HOUR

TIME (UTC)ATTACKSNOTES
00:00-05:00103Initial probing begins
06:00-07:00343Massive spike -- 10:00 AM Yerevan time
08:00-12:0074Continued scanning
13:00-17:00109Afternoon wave
18:00-23:00158Evening attacks escalate again

The peak at 06:00 UTC (10:00 AM Yerevan time) is notable. Someone in Armenia's timezone started their workday by trying to hack us.

The Tools They Used

IDENTIFIED

TOOLTYPEREQUESTS
curl (automated)Command-line scanning236
CensysInspectInternet-wide vulnerability scanner13
zgrabSecurity research scanner8
python-requestsCustom attack scripts2
Various browsers (spoofed)Disguised automated tools400+

Why Every Attack Failed

BY DESIGN

OWL was built to be attacked. We expected it. Here is why nothing works:

We are pure static HTML. There is nothing to exploit. There is no back door because there is no door at all.

You cannot hack a newspaper printed on stone. You can only read it.

What This Tells Us

ANALYSIS

The attack pattern tells a story:

OBSERVATIONWHAT IT MEANS
Attacks started within 48 hours of first publicationSomeone with resources read our investigations and responded immediately
Peak at 10:00 AM Yerevan timeAttackers are operating on Armenian business hours
WordPress-focused scanningThey assumed we use standard web tools -- they were wrong
Payment credential searchesThey wanted to find our funding sources
Source code repository probesThey wanted to find who we are
Multiple professional scanner toolsThese are not random bots -- someone deployed dedicated tools

Our Promise

To whoever ordered these attacks:

To our readers:

We publish about corruption. They respond with attacks. We respond by publishing about their attacks. The cycle only ends when the corruption does.

Technical Note

OWL publishes periodic transparency reports on attacks against our infrastructure. We will never reveal details that could compromise our security architecture, our sources, or our team. What we will reveal is that every attempt to silence us has failed, and every attempt has been documented.

Previous: Coordinated Cash -- Fake Donors Transparency Report