Russia’s Hacker Group, RaHDit, Doxxes 1,700 Ukrainian Intel Agents

Advertisements
Advertisements

Russia’s RaHDit hacker group has doxxed 1,700 employees of the Security Service of Ukraine, as well as 2,000 Ukrainian naval personnel.

Unmasking the Ukrainian Security Service agents was done in retaliation for the recent raid on the Crimean Bridge earlier this week, the hacker group told Sputnik.

Advertisements

The hackers also leaked info on the members of the UA Cats Division volunteer organization that collects donations for sea drones for Ukraine.

Additionally, to retaliate for the recent drone attack, RaHDit unveiled the routes of civilian ships, from which most likely naval drones with explosives were launched at the Crimean Bridge.

According to the hacker group, two tankers — Beks Loyal and Khudayar Yusifzade — could have participated in the operation to release unmanned boats to attack the bridge. A few days before the deadly raid, one of them drifted opposite the Russian coast in the Black Sea, while the other one drifted south.

Sputnik

Pix above: A boat with Russian, Ukrainian, Turkish and U.N. officials heads to the Sierra Leone-flagged cargo ship Razoni, to check if the grain shipment is in accordance with a crucial agreement signed last month by Moscow and Kiev, at an inspection area in the Black Sea off the coast of Istanbul, Turkiye, Wednesday, Aug. 3, 2022.

Leave a Reply

Your email address will not be published. Required fields are marked *