‘Russia-linked hackers’ target Ministry of Defense and leak thousands of documents online relating to some of Britain’s most sensitive sites in ‘potentially highly damaging’ security breach
Hackers linked to Russia have attacked Britain’s Ministry of Defense and leaked thousands of documents online, a report said.
The cybercriminals have released data that could help criminals break into some of Britain’s most secret locations, including HMNB Clyde nuclear submarine base, Porton Down chemical weapons laboratory and a GCHQ listening post.
Secret information about military sites and high-security prisons was also stolen by the LockBit group, one of the world’s most dangerous hacking gangs.
The group – whose main suspects are Russian Mikhail Matveev – is said to have shared the data on the dark web, which is accessible through special software. The mirror reports.
Labor MP Kevan Jones, a member of the Commons Defense Select Committee, told the paper: ‘This is potentially very damaging to the security of some of our most sensitive sites.
“The government needs to explain why this company’s computer systems were so vulnerable. Any information that provides potential enemies with security features is of great importance.’
The hackers are said to have targeted the databases of Zaun, a company responsible for protecting highly secure sites.
It follows serious security breaches involving the Met Police – with the data of 47,000 officers at risk – and the Police Service of Northern Ireland, which accidentally shared the personal details of 10,000 employees.
The hackers released thousands of pages of data that could help criminals penetrate the nuclear submarine base HMNB Clyde (pictured)
Secret information about military sites and high-security prisons was also stolen by the LockBit group, one of the world’s most dangerous hacking gangs. Among the group’s main suspects is Russian Mikhail Matveev (pictured)
The Mirror found that the hackers stole the documents last month in a shocking attack on Zaun – a company based in the West Midlands that makes fencing and security measures for vulnerable locations. The company provided safety barriers during the 2012 London Olympics.
LockBit, which allegedly has financial ties to Russian criminals, is seen as incredibly dangerous.
Mikhail Matveev, who has been linked to numerous ransomware variants, including LockBit, is on the FBI’s most wanted list after alleged attacks on 1,400 global targets, including a £66 million blackmail to the Royal Mail that refused to pay.
A number of Russians have been arrested for cyber attacks in the US and Canada.
It is understood that a leaked document relates to equipment used to protect Porton Down – one of Britain’s most secretive military research facilities. Zaun describes his work on the Wiltshire campus as “very secretive.”
A sales order also leaked detailing the goods purchased for HMNB Clyde – home of the Trident nuclear submarines. A sales order report for goods at GCHQ’s communications site in Bude, Cornwall was also reportedly made public. According to GCHQ, Bude plays a ‘critical role’ in British security.
Hackers also released information that could help criminals get into the Porton Down chemical weapons lab (pictured)
The leak would also include security equipment from RAF Waddington, from where Reaper drone missions have been conducted for the past decade.
A spokesperson for Zaun told The Mirror: ‘LockBit may have gained access to some historical emails, orders, drawings and project files. We do not believe that secret documents are stored on the system or have been compromised.
“The National Cyber Security Center has been contacted and we are taking advice. Zaun has been the victim of a sophisticated cyber-attack and has taken all reasonable steps to mitigate any potential attack on our systems.”
A government spokesman told MailOnline tonight: “We do not comment on security issues.”