https://en.sputniknews.africa/20230720/1060650170.html
Russian Hackers Dox 1,700 Ukrainian Intel Agents
Russian Hackers Dox 1,700 Ukrainian Intel Agents
Sputnik Africa
MOSCOW (Sputnik) - Russia's RaHDit hacker group has doxxed 1,700 intelligence agents working for the Security Service of Ukraine, and 2,000 Ukrainian naval... 20.07.2023, Sputnik Africa
2023-07-20T09:31+0200
2023-07-20T09:31+0200
2023-07-21T10:13+0200
russia's special operation in ukraine
russia
ukraine
crimean bridge
https://cdn1.img.sputniknews.africa/img/07e7/04/0a/1058491697_0:136:3071:1863_1920x0_80_0_0_20d3c1f7d90881fb024b00946726f105.jpg
Doxxing these Ukrainian agents and naval personnel was done in response to the attack on the Crimean Bridge earlier this week, the hacker group told Sputnik. The hackers also leaked info on the members of the UA Cats Division volunteer organization, which collects donations for sea drones for the Ukrainian regime. Additionally, to retaliate for the recent deadly raid, RaHDit unveiled the routes of civilian ships, from which most likely naval drones with explosives were launched at the Crimean Bridge. According to the hacker group, two tankers — Beks Loyal and Khudayar Yusifzade — could have participated in the operation to unleash unmanned boats to attack the bridge. Just a few days prior to the attack, one of them drifted opposite the Russian coast in the Black Sea, while the second drifted south, the group noted.Later, shipowner companies BEKS SHIPMANAGEMENT & TRADING S.A.and Palmali Shipping & Agency (which own Beks Loyal and Khudayar Yusifzade respectively) denied the participation of the two vessels in the attack, in response to Sputink's questions. According to the firms, the ships were not present in the area of the attack when it happened.
russia
ukraine
Sputnik Africa
feedback@sputniknews.com
+74956456601
MIA „Rossiya Segodnya“
2023
Sputnik Africa
feedback@sputniknews.com
+74956456601
MIA „Rossiya Segodnya“
News
en_EN
Sputnik Africa
feedback@sputniknews.com
+74956456601
MIA „Rossiya Segodnya“
https://cdn1.img.sputniknews.africa/img/07e7/04/0a/1058491697_0:0:2731:2048_1920x0_80_0_0_17475d6123428d5068b0b7414ffa2195.jpgSputnik Africa
feedback@sputniknews.com
+74956456601
MIA „Rossiya Segodnya“
russia, ukraine, crimean bridge
russia, ukraine, crimean bridge
Russian Hackers Dox 1,700 Ukrainian Intel Agents
09:31 20.07.2023 (Updated: 10:13 21.07.2023) MOSCOW (Sputnik) - Russia's RaHDit hacker group has doxxed 1,700 intelligence agents working for the Security Service of Ukraine, and 2,000 Ukrainian naval service members.
Doxxing these Ukrainian agents and naval personnel was
done in response to the attack on the Crimean Bridge earlier this week, the hacker group told
Sputnik.
The hackers also
leaked info on the members of the UA Cats Division volunteer organization, which collects donations for sea drones for the Ukrainian regime.
Additionally, to retaliate for the recent deadly raid, RaHDit unveiled the routes of civilian ships, from which most likely naval drones with explosives were launched at the Crimean Bridge.
According to the hacker group, two tankers — Beks Loyal and Khudayar Yusifzade — could have participated in the operation to unleash unmanned boats to attack the bridge.
Just a few days prior to the attack, one of them drifted opposite the Russian coast in the Black Sea, while the second drifted south, the group noted.
Later, shipowner companies BEKS SHIPMANAGEMENT & TRADING S.A.and Palmali Shipping & Agency (which own Beks Loyal and Khudayar Yusifzade respectively) denied the participation of the two vessels in the attack, in response to Sputink's questions. According to the firms, the ships were not present in the area of the attack when it happened.