Doxxing these Ukrainian agents and naval personnel was done in response to the attack on the Crimean Bridge earlier this week, the hacker group told Sputnik.
The hackers also leaked info on the members of the UA Cats Division volunteer organization, which collects donations for sea drones for the Ukrainian regime.
Additionally, to retaliate for the recent deadly raid, RaHDit unveiled the routes of civilian ships, from which most likely naval drones with explosives were launched at the Crimean Bridge.
According to the hacker group, two tankers — Beks Loyal and Khudayar Yusifzade — could have participated in the operation to unleash unmanned boats to attack the bridge.
Just a few days prior to the attack, one of them drifted opposite the Russian coast in the Black Sea, while the second drifted south, the group noted.
Later, shipowner companies BEKS SHIPMANAGEMENT & TRADING S.A.and Palmali Shipping & Agency (which own Beks Loyal and Khudayar Yusifzade respectively) denied the participation of the two vessels in the attack, in response to Sputink's questions. According to the firms, the ships were not present in the area of the attack when it happened.