Sunday 15 March, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Russia-Linked Hackers Claim Ransomware Attack on MoD contractor, Allege 4TB Data Theft

The hackers claim to have stolen terabytes of sensitive data from eight military sites in what could be one of Britain’s most serious defence cyber breaches to date

Carly PagebyCarly Page
October 20, 2025
in Interview, News
Photo by Philipp Katzenberger on Unsplash

Photo by Philipp Katzenberger on Unsplash

Share on Linkedin

Russian-linked hackers claim to have stolen and dumped data from eight UK Ministry of Defence sites in what appears to be one of the most serious cyber breaches to hit Britain’s military network in years.

You Might Also Like

US and UK ballistic missile defence capabilities brought into focus as Iran lashes out against region

Scout Ventures raises $125 million to expand investment in defence and dual-use tech

The signal is the weapon: How mobile networks became infrastructure for modern war

The breach, first reported by the Mail on Sunday, has been claimed by the “Lynx” ransomware gang, a relatively new cybercriminal outfit believed to operate out of Russia that emerged in 2024 as a likely successor to the notorious “INC” ransomware operation.

In a post on its dark web leak site, seen by Resilience Media, the group claims to have quietly exfiltrated “roughly 4TB of data” from eight RAF and Royal Navy bases in September, including RAF Lakenheath in Suffolk, where the US Air Force’s F-35 jets are based.

“Time is running out – you have the opportunity to resolve this matter before inevitable consequences unfold,” Lynx wrote. The allegedly stolen files, which the group has begun to publish, include the personal details of MoD staff such as names, mobile numbers, vehicle registrations, visitor logs from multiple RAF and Royal Navy facilities, and documents marked “Official Sensitive.”

The breach stemmed not from a direct intrusion into the MoD, but through one of its contractors – Shropshire-based Dodd Group, which handles maintenance and construction at a number of defence sites.

Dodd Group didn’t respond to Resilience Media’s questions, but confirmed to the Mail on Sunday that it “recently experienced a ransomware incident whereby an unauthorised third-party gained temporary access to part of our internal systems.”

“We took immediate steps to contain the incident, swiftly secure our systems and engaged a specialist IT forensic firm to investigate what happened. While our forensic investigation is ongoing, we are aware of claims that data taken from our systems have been published online. We are taking these claims extremely seriously and are working hard to validate this.”

Dodd Group didn’t say how it was compromised, how many individuals are affected by the data breach, or whether it has received any communication from the hacker group responsible.

The MoD has confirmed it is “actively investigating the claims that information relating to the MoD has been published on the dark web”.

“To safeguard sensitive operational information, we will not comment any further on the details,” it said in a statement.

Lynx has been linked to a string of high-profile extortion campaigns since mid-2024. Operating on a ransomware-as-a-service model, it typically exfiltrates data before encrypting systems, then threatens to publish or sell the information if victims refuse to pay. Its decision to target an MoD contractor marks a departure from its public pledge not to attack government institutions.

The incident is the latest in a string of damaging cybersecurity setbacks involving the Ministry of Defence. In August, officials confirmed that thousands of Afghans evacuated to the UK under the government’s resettlement scheme had their personal data exposed after an MoD subcontractor was compromised. The year before, another major breach saw the personal details of serving UK military personnel accessed by hackers, prompting a review of the department’s data-handling and supplier oversight.

Together, the incidents underscore the growing risks posed by third-party access within the MoD’s sprawling contractor ecosystem – and the challenge of securing sensitive information across an increasingly digitised defence supply chain.

James Broomhall, senior associate at Grosvenor Law, who regularly handles high-profile matters involving cybercrime and ransomware attacks, told Resilience Media that the incident involving Dodd Group adds to a “concerning trend” of cyberattacks targeting defence contractors.

“Just months ago, Inflite The Jet Centre Ltd suffered a breach that exposed the personal data of nearly 3,700 individuals, including Afghans resettled under the UK’s Afghan Relocations and Assistance Policy. These repeated failures suggest systemic weaknesses in how sensitive data is protected across the MoD’s supply chain,” he said.

“From a legal standpoint, these breaches raise questions about compliance with UK GDPR, particularly around the duty to implement appropriate security measures and report breaches promptly,” Broomhall continued. “Contractors handling personal data on behalf of the government are considered data processors, and both they and the MoD, as the data controller, could face scrutiny from the Information Commissioner’s Office if safeguards were inadequate.”

Alice Christie, a spokesperson for the UK’s Information Commissioner’s Office, told Resilience Media: “We have received a report from Dodd Group in connection to this and are assessing the information provided.” We’ve asked follow up questions and will update this post as we learn more.

The breach comes amid mounting warnings from the National Cyber Security Centre about escalating cyber threats to the UK’s public sector.

Just days before the MoD attack was revealed, the NCSC disclosed that more than 200 cyber incidents had targeted government agencies in 2025 alone – a sharp rise on 89 incidents in 2024. Officials say state-aligned and financially motivated groups are increasingly blurring the line between espionage and extortion, with defence and critical infrastructure now prime targets.

The timing of the Lynx breach will likely reinforce calls for tighter cyber hygiene across government networks and their private-sector partners.

Tags: Alice ChristieDodd GroupJames BroomhallMinistry of DefenceRussiaUK
Previous Post

Weekend Read: An Exclusive Interview with Mykhailo Fedorov on Ukraine’s AI War Room

Next Post

Inside Tiberius Aerospace With CSO Andy Baynes

Carly Page

Carly Page

Carly Page is a freelance journalist and copywriter with 10+ years of experience covering the technology industry, and was formerly a senior cybersecurity reporter at TechCrunch. Bylines include Forbes, IT Pro, LeadDev, The Register, TechCrunch, TechFinitive, TechRadar, TES, The Telegraph, TIME, Uswitch, WIRED, & more.

Related News

US and UK ballistic missile defence capabilities brought into focus as Iran lashes out against region

US and UK ballistic missile defence capabilities brought into focus as Iran lashes out against region

byTom Pashby
March 12, 2026

The ballistic missile defence capabilities of the US, UK and other allies have been put to the test as the...

Scout Ventures raises $125 million to expand investment in defence and dual-use tech

Scout Ventures raises $125 million to expand investment in defence and dual-use tech

byJohn Biggs
March 11, 2026

Scout Ventures has closed its fifth fund with $125 million in commitments, according to an announcement released March 10. The...

The signal is the weapon: How mobile networks became infrastructure for modern war

The signal is the weapon: How mobile networks became infrastructure for modern war

byJohn Biggs
March 11, 2026

Mobile World Congress (MWC) has been around since 1987. The conference, part trade fair, part consumer electronics expo, and part...

Hadean, the AI battle simulation startup, closes bridge round ahead of a Big B

Hadean, the AI battle simulation startup, closes bridge round ahead of a Big B

byIngrid Lunden
March 11, 2026

London-based Hadean began life several years ago as an AI gaming startup working on VR and video simulations, but it...

Hackathon-ing our way to a new defence ecosystem

Hackathon-ing our way to a new defence ecosystem

byFiona Alston
March 11, 2026

It takes a village to raise a child, but when it comes to building the next generation of defence in...

Lux Aeterna raises $10 million to build reusable, returnable satellites

Lux Aeterna raises $10 million to build reusable, returnable satellites

byJohn Biggs
March 10, 2026

Lux Aeterna, a Denver based space infrastructure startup, just raised a $10 million seed round led by Konvoy Ventures with...

Credit: Mcmurryjulie via Pixabay

Trojan force: Hidden backdoors may lurk inside AI models, report says

byPaul Sawers
March 10, 2026

What if an AI model carried hidden instructions that only activate when triggered by a particular input? That’s the subject...

The launch of Isembard’s innovative approach to manufacturing

Isembard raises $50M, plans to open 25 ‘AI-powered factories’

byIngrid Lunden
March 9, 2026

Isembard, a London startup that’s built a platform to help hardware makers in defence, aerospace and robotics manufacture components and...

Load More
Next Post
Welcome to Resilience Media

Inside Tiberius Aerospace With CSO Andy Baynes

Nabbing a new NAD

Nabbing a new NAD

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Senai exits stealth to help governments harness online video intelligence

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.