Yesterday @jc_stubbs published an article about a Russian backed fake news site and @VickerySec found that the Wordpress back end was wide open. This means the underlying folders that hold the raw photos displayed on the site were viewable showing when the photos were uploaded https://twitter.com/VickerySec/status/1311682344051380226
Many photo formats contain what is known as metadata, information included in the file that is extra data about the file. For photos this is known as EXIF, Exchangeable Image File Format, which can include time, location, focal length, lens type, creation date, modification date
I've archived that file here https://web.archive.org/web/20201002145531/https://naebc.com/wp-content/uploads/2020/08/ava_fbgab_400x400.jpg

The file didn't have the normal metadata from a photo but a subset that shows up on files generated with an Adobe program, in this case illustrator
From the metadata we can tell it was created on a Windows Computer on 7/31/2020 that used Russian as the default operating language

The actual file path name isn't exciting from Google Translate and verified by 2 Russian speakers
Metadata can be faked but most images uploaded didn't have any. A few of the images from filename can be identified as having come from someone's facebook, which uses a unique file naming scheme.
You can follow @z3dster.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: