A minimum of 3 stated hacktivist groups running in support of Russian interests are probably doing so in cooperation with state-sponsored cyber danger stars, according to Mandiant.
The Google-owned danger intelligence and incident action business mentioned with moderate confidence that “arbitrators of the expected hacktivist Telegram channels ‘XakNet Group,’ ‘Infoccentr,’ and ‘CyberArmyofRussia_Reborn’ are collaborating their operations with Russian Main Intelligence Directorate (GRU)- sponsored cyber danger stars.”.
Mandiant’s examination is based upon evidence that the leakage of details drawn from Ukrainian business took place within 24 hr of hazardous wiper incidents performed by the Russian nation-state group tracked as APT28 (aka Fancy Bear, Sofacy, or Strontium).
To that end, 4 of the 16 details leaks from these groups accompanied disk cleansing malware attacks by APT28 that consisted of utilizing a pressure called CaddyWiper.
APT28, active due to the fact that a minimum of 2009, is gotten in touch with the Russian military intelligence company, the General Worker Main Intelligence Directorate (GRU), and drew spotlight in 2016 for the breaches of the Democratic National Committee (DNC) in the run-up to the U.S. governmental election.

While the so-called hacktivist groups have really carried out dispersed denial-of-service (DDoS) attacks and website defacements to target Ukraine, indications are that these bogus characters are a front for information operations and ravaging cyber activities.
Read the full article here