Hackers Hit British Defence Ministry

The British Ministry of Defence (MoD) has been hit by hackers who have links to Russia and security secrets have been leaked and the data has been posted online. The National Cyber Security Centre (NCSC) has issued an "official threat notice" to companies operating critical national infrastructure over fears of "increased" instances of cyber attacks from mercenaries sympathetic to Russia.

The MOD has said that top secret security information and data on British military and intelligence sites has been leaked online by hackers linked to Russia. 

The hackers hit the database of Zaun, a firm which handles the security for some of Britain's most secretive sites, including a nuclear submarine base and a chemical weapon lab. They released large amounts of data which could help criminals get into the HMNB Clyde nuclear submarine base, the Porton Down chemical weapon lab and one of GCHQ’s listening posts.

The hackers targeted the databases and then the information was then placed on to the Dark Web, which can only be accessed using special browser software. Information about high-security prisons and a military site key to cyber defences was stolen using a technique similar to that used by the notorious  LockBit hacking group.

The leaked documents also include a sales order report for equipment at GCHQ’s communications complex in Bude, Cornwall. GCHQ describes Bude as playing “a critical part” in our security. The leak includes security equipment at RAF Waddington, Lincs, where the Reaper attack drones squadron is based, and Cawdor Barracks, whose 14th Signal Regiment deals in electronic warfare. 

This attack follows London's Met Police, who were hit and where 47,000 officers' details were put at risk, and the Police Service of Northern Ireland, who accidentally shared the personal information of 10,000 employees. 

NCSC:   Mirror:      Daily Mail:    Express:     Reddit:    The Sun:      Ground

You Might Also Read: 

Royal Mail Refuses To Pay LockBit Ransom Demand:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Hackers Target Satellites 
How To Check If A Link Is Safe »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Australian Cyber Collaboration Centre (Aus3C)

Australian Cyber Collaboration Centre (Aus3C)

The Australian Cyber Collaboration Centre (Aus3C) is committed to building cyber capacity and securing Australia's digital landscape.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.

Assure IT

Assure IT

Assure IT is a Singapore company specialising in technology governance, risk and compliance.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

AFRY

AFRY

AFRY is a world leading engineering company, trusted as a supplier of services and solutions within the industry, energy, and infrastructure sectors as well as for authorities.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

Codenotary

Codenotary

Codenotary provide a comprehensive suite of verification and enforcement services to guarantee the integrity of your software throughout its entire lifecycle.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.