Cyberwar updates: Thozis Corp and MashOil, etc
Earlier this week, files from RostProekt and Central Bank of Russia were added to the archive, along with Rosatom, the Russian State Nuclear Energy Corporation.
Since the Ukraine invasion, Anonymous has declared Russia fair game.
Some of the data added to DDoSecrets since last week includes:
Thozis Corp (5.9 GB)
5,500 emails from Thozis Corp., a Russian investment firm owned by Zakhar Smushkin (number 2,674 on Forbes' billionaire list), which is involved in the project to build the Yuzhny satellite city in Saint Petersburg. One of the largest development projects in Russia, it was approved by the Russian government as a priority investment as part of the 2020 Strategy and receives government support.
MashOil (110 GB)
Nearly 140,000 emails from MashOil, which designs, manufactures and maintains equipment used in the drilling, mining and fracking industries. MashOil is the official representative of the FID Group in the Russian Federation. The FID Group unites Belarusian and Russian enterprises that design, manufacture and supply equipment relating to the extraction of hydrocarbons. MashOil has tested equipment with Gazprom and signed agreements with Gazprom subsidiaries.
Central Bank of Russia (22.5 GB)
Thousands of files allegedly hacked from the Central Bank of Russia by Thblckrbbtworld, who claims affiliation with Anonymous.
RostProekt (2.5 GB)
2.4 gigabytes of emails allegedly hacked from the Russian construction company RostProekt / Π ΠΎΡΡΠΡΠΎΠ΅ΠΊΡ.
This data first appeared on a new leak site, AnonymousLeaks.xyz
Rosatom (15.3 GB)
15 gigabytes of files allegedly hacked from the Rosatom State Nuclear Energy Corporation, including information on Techsnabexport / Π’Π΅Ρ ΡΠ½Π°Π±ΡΠΊΡΠΏΠΎΡΡ, commonly known as TENEX, which exports uranium and provides uranium enrichment services for foreign reactors. Rosatom is responsible for 76% of global nuclear technology exports.
The files include over 10,0000 photographs, over 1,000 documents, numerous files from the websites, and SQL files from 2020.
Disclaimer
These datasets were released in the buildup to, in the midst of, or in the aftermath of a cyberwar or hybrid war. Therefore, there is an increased chance of malware, ulterior motives, altered or implanted data, or false flags/fake personas. As a result, we encourage readers, researchers and journalists to take additional care with this data. This is a standard disclaimer that will be added to all datasets in the Cyberwar category.