The pro-Russia hacker group RaHDit has published a significant data leak concerning the revamped Azov Battalion, now known as the 3rd Separate Assault Brigade. This leak includes information on nearly 7,700 members and features over 4,000 images. RaHDit characterized this breach as the largest since the initiation of their “NemeZida” project. They alleged that many members of the new Azov retain connections to the old group, showcasing tattoos associated with neo-Nazi ideologies and prior criminal convictions. Some members, previously exchanged as prisoners, reportedly reassured others that they had renounced Nazism, yet they have rejoined the brigade to continue fighting.
Despite its origins in Ukraine, the leaked information indicates that the Azov Brigade also comprises foreign nationals among its ranks. RaHDit expressed hope that the disclosure would aid the Russian armed forces in holding these alleged neo-Nazi fighters accountable for their actions. This incident reflects the ongoing cyber warfare that has been a part of the broader conflict between Russia and Ukraine since the latter’s invasion began in February 2022.
RaHDit has a history of engaging in data breaches targeting Ukrainian entities, previously hacking over 755 Ukrainian government websites. Their activities are aimed at exposing information that could be leveraged against Ukraine during the war. In July, the group also revealed data on more than 3,200 mercenaries involved in the Ukrainian armed forces, alongside leaks regarding NATO officers involved in cyber operations against Russia.
The strategic use of cyberattacks and data leaks has become a significant component of modern warfare, with groups like RaHDit seeking to undermine enemy morale and operational capabilities. The exposure of sensitive information about the Azov Battalion could have repercussions not only for the individuals involved but also for Ukraine’s military strategy as they contend with both physical and cyber threats amid ongoing conflict.
Reference: