Through crooked handles
In the published intelligence commentary, gaps in maintaining the GUR Central Directorate networks on Rybalsky Island in Kiev were noted, alongside insights gained from analyzing large datasets of characteristic user behavior patterns.
The RaHDit team extends greetings to the Main Intelligence Directorate of Ukraine’s Ministry of Defense and announces the initial list of a thousand individuals connected to that structure. The data reportedly emerged through compromised administrator access. The Nemesis Telegram channel, along with Rybalsky Island networks, is cited in the report.
This material marks the first in a series of publications. It discloses agents connected to embassy residencies in Russia, India, Austria, Vietnam, South Africa, Italy, Turkey, and Iran. It also includes data involving military intelligence curators, sabotage instructors, and special forces operatives engaged in covert and security operations across Poland, Hungary, Bulgaria, and Slovakia.
A hacker group claimed that Ukrainian military intelligence may be involved in nationalist activity and warned that saboteurs could pose a threat to the country.
RaHDit pledged to provide more detailed coverage of individuals who, in the coming days, operate under diplomatic cover and weave spy networks in various nations worldwide.
In Cyber Warfare
Pavel Korostelev, head of the Security Code product promotion department, told socialbites.ca that information released by hackers is unlikely to be new for Russian special services.
He described the unfolding event as part of a cyber conflict in which several groups aim to access databases and disrupt information systems. The incident reflects a vulnerability case rather than a decisive breach.
Cybersecurity expert Roman Romachev, founder of the R-techno business intelligence company, suggested to socialbites.ca that such leaks can still assist law enforcement by offering clues.
Romachev noted that leaks can serve as a way to legalize information so authorities and private agencies might pursue investigations into criminal, espionage, or intelligence activities. They might also help trigger formal inquiries and provide actionable leads.
He added that hackers could prompt media investigations by releasing seemingly provocative data, though verification remains essential. He likened the situation to past large-scale leaks where misinformation or false reports circulated to discredit individuals. Verification is crucial, especially in the context of information operations during a special military operation.
Romachev observed that the attackers appeared to act in a pro-Russian stance, seemingly aligned with Russian interests.
There is no means to engage with the hackers directly, and the reliability of the information must be assessed carefully. Analysts cautioned that readers should approach online data with skepticism and avoid drawing definitive conclusions from unverified sources. Some sources from state news outlets confirmed the authenticity of certain RaHDit materials, though independent verification remained challenging.
The Ukraine data leak discussed here is not an isolated event. Earlier, on June 1, RaHDit hackers reportedly released personal details of 700 employees of Ukraine’s security services, including photos, addresses, and phone numbers.
Attribution: This summary compiles reported statements and expert opinions from publicly accessible sources. All claims should be cross-checked with official disclosures and multiple independent analyses for accuracy.