Tuesday 16 December, 2025
Resilience Media
  • About
  • News
  • Resilience Conference
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Russia-Linked Hackers Claim Ransomware Attack on MoD contractor, Allege 4TB Data Theft

The hackers claim to have stolen terabytes of sensitive data from eight military sites in what could be one of Britain’s most serious defence cyber breaches to date

Carly PagebyCarly Page
October 20, 2025
in Interview, News
Photo by Philipp Katzenberger on Unsplash

Photo by Philipp Katzenberger on Unsplash

Share on Linkedin

Russian-linked hackers claim to have stolen and dumped data from eight UK Ministry of Defence sites in what appears to be one of the most serious cyber breaches to hit Britain’s military network in years.

You Might Also Like

CHAOS Industries joins U.S. Army G‑TEAD Marketplace

Quantum Systems teams up with Frontline to mass-produce Ukrainian combat drones in Germany

Skana wants to shore up coastal defence with amphibious vessel for shallow waters

The breach, first reported by the Mail on Sunday, has been claimed by the “Lynx” ransomware gang, a relatively new cybercriminal outfit believed to operate out of Russia that emerged in 2024 as a likely successor to the notorious “INC” ransomware operation.

In a post on its dark web leak site, seen by Resilience Media, the group claims to have quietly exfiltrated “roughly 4TB of data” from eight RAF and Royal Navy bases in September, including RAF Lakenheath in Suffolk, where the US Air Force’s F-35 jets are based.

“Time is running out – you have the opportunity to resolve this matter before inevitable consequences unfold,” Lynx wrote. The allegedly stolen files, which the group has begun to publish, include the personal details of MoD staff such as names, mobile numbers, vehicle registrations, visitor logs from multiple RAF and Royal Navy facilities, and documents marked “Official Sensitive.”

The breach stemmed not from a direct intrusion into the MoD, but through one of its contractors – Shropshire-based Dodd Group, which handles maintenance and construction at a number of defence sites.

Dodd Group didn’t respond to Resilience Media’s questions, but confirmed to the Mail on Sunday that it “recently experienced a ransomware incident whereby an unauthorised third-party gained temporary access to part of our internal systems.”

“We took immediate steps to contain the incident, swiftly secure our systems and engaged a specialist IT forensic firm to investigate what happened. While our forensic investigation is ongoing, we are aware of claims that data taken from our systems have been published online. We are taking these claims extremely seriously and are working hard to validate this.”

Dodd Group didn’t say how it was compromised, how many individuals are affected by the data breach, or whether it has received any communication from the hacker group responsible.

The MoD has confirmed it is “actively investigating the claims that information relating to the MoD has been published on the dark web”.

“To safeguard sensitive operational information, we will not comment any further on the details,” it said in a statement.

Lynx has been linked to a string of high-profile extortion campaigns since mid-2024. Operating on a ransomware-as-a-service model, it typically exfiltrates data before encrypting systems, then threatens to publish or sell the information if victims refuse to pay. Its decision to target an MoD contractor marks a departure from its public pledge not to attack government institutions.

The incident is the latest in a string of damaging cybersecurity setbacks involving the Ministry of Defence. In August, officials confirmed that thousands of Afghans evacuated to the UK under the government’s resettlement scheme had their personal data exposed after an MoD subcontractor was compromised. The year before, another major breach saw the personal details of serving UK military personnel accessed by hackers, prompting a review of the department’s data-handling and supplier oversight.

Together, the incidents underscore the growing risks posed by third-party access within the MoD’s sprawling contractor ecosystem – and the challenge of securing sensitive information across an increasingly digitised defence supply chain.

James Broomhall, senior associate at Grosvenor Law, who regularly handles high-profile matters involving cybercrime and ransomware attacks, told Resilience Media that the incident involving Dodd Group adds to a “concerning trend” of cyberattacks targeting defence contractors.

“Just months ago, Inflite The Jet Centre Ltd suffered a breach that exposed the personal data of nearly 3,700 individuals, including Afghans resettled under the UK’s Afghan Relocations and Assistance Policy. These repeated failures suggest systemic weaknesses in how sensitive data is protected across the MoD’s supply chain,” he said.

“From a legal standpoint, these breaches raise questions about compliance with UK GDPR, particularly around the duty to implement appropriate security measures and report breaches promptly,” Broomhall continued. “Contractors handling personal data on behalf of the government are considered data processors, and both they and the MoD, as the data controller, could face scrutiny from the Information Commissioner’s Office if safeguards were inadequate.”

Alice Christie, a spokesperson for the UK’s Information Commissioner’s Office, told Resilience Media: “We have received a report from Dodd Group in connection to this and are assessing the information provided.” We’ve asked follow up questions and will update this post as we learn more.

The breach comes amid mounting warnings from the National Cyber Security Centre about escalating cyber threats to the UK’s public sector.

Just days before the MoD attack was revealed, the NCSC disclosed that more than 200 cyber incidents had targeted government agencies in 2025 alone – a sharp rise on 89 incidents in 2024. Officials say state-aligned and financially motivated groups are increasingly blurring the line between espionage and extortion, with defence and critical infrastructure now prime targets.

The timing of the Lynx breach will likely reinforce calls for tighter cyber hygiene across government networks and their private-sector partners.

Tags: Alice ChristieDodd GroupJames BroomhallMinistry of DefenceRussiaUK
Previous Post

Weekend Read: An Exclusive Interview with Mykhailo Fedorov on Ukraine’s AI War Room

Next Post

Inside Tiberius Aerospace With CSO Andy Baynes

Carly Page

Carly Page

Carly Page is a freelance journalist and copywriter with 10+ years of experience covering the technology industry, and was formerly a senior cybersecurity reporter at TechCrunch. Bylines include Forbes, IT Pro, LeadDev, The Register, TechCrunch, TechFinitive, TechRadar, TES, The Telegraph, TIME, Uswitch, WIRED, & more.

Related News

CHAOS Industries joins U.S. Army G‑TEAD Marketplace

byJohn Biggs
December 16, 2025

CHAOS Industries says it has been added to the U.S. Army’s Global Tactical Edge Acquisition Directorate, or G-TEAD, Marketplace after...

Quantum Systems teams up with Frontline to mass-produce Ukrainian combat drones in Germany

byCarly Page
December 15, 2025

On the heels of raising €180 million earlier in December, German drone maker Quantum Systems has kicked off a new manufacturing operation...

The Alligator

Skana wants to shore up coastal defence with amphibious vessel for shallow waters

byPaul Sawers
December 15, 2025

In a year when the Baltic has turned into a geopolitical house of mirrors, with Russian “shadow fleet” tankers slipping through...

Tobias Billström, left, with NAD CEO Karl Rosander (credit: NAD)

After leading Sweden into NATO, Tobias Billström eyes defence-tech opportunities at Nordic Air Defence

byThomas Macauley
December 12, 2025

Just shy of two years after steering Sweden’s accession into NATO, Tobias Billström has taken a turn into the private...

Photo by Žilvinas Ka on Unsplash

‘This is a revolution’: Inside Ukraine’s plans to seed 7,000+ techies across its military

byThomas Macauley
December 11, 2025

Mykhailo Fedorov, Ukraine’s First Deputy Prime Minister and Minister of Digital Transformation, announced on Monday a significant step forward in how the...

Arondite and Babcock partner to move the British Royal Navy closer to a autonomous fleet

byJohn Biggs
December 11, 2025

Arondite and Babcock have partnered to bring autonomy into the Royal Navy’s day to day operations. The two UK companies have agreed a...

Auterion demonstrates a multi-manufacturer drone strike under real conditions

byJohn Biggs
December 11, 2025

Munich-based Auterion ran what it calls the world’s first multi-manufacturer swarm strike with both FPV munitions and fixed-wing drones working as a...

Helsing teams up with Kongsberg to boost its space strategy

byIngrid Lunden
December 10, 2025

Defence startups that want to increase their chances of winning major government tenders are teaming up with primes. Today, Helsing...

Load More
Next Post

Inside Tiberius Aerospace With CSO Andy Baynes

The British Army firing a laser weapon from an armoured vehicle for the first time, successfully destroying flying drones. Credit: Charlie Perham, MoD

Nabbing a new NAD

Most viewed

UK launches undersea surveillance programme to counter growing Russian threat

Helsing teams up with Kongsberg to boost its space strategy

Quantum Systems closes a €180 million Series C extension, hits a €3 billion valuation

We Are Already Living in a World at War—It’s Time to Act Like It

Can the UK counter Russian laser threats?

Inside the drone revolution: How war has changed and what that means for modern armies

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2025 Resilience Media

No Result
View All Result
  • About
  • News
  • Resilence Conference
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2025 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.