Friday 6 March, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Russia-Linked Hackers Claim Ransomware Attack on MoD contractor, Allege 4TB Data Theft

The hackers claim to have stolen terabytes of sensitive data from eight military sites in what could be one of Britain’s most serious defence cyber breaches to date

Carly PagebyCarly Page
October 20, 2025
in Interview, News
Photo by Philipp Katzenberger on Unsplash

Photo by Philipp Katzenberger on Unsplash

Share on Linkedin

Russian-linked hackers claim to have stolen and dumped data from eight UK Ministry of Defence sites in what appears to be one of the most serious cyber breaches to hit Britain’s military network in years.

You Might Also Like

Ukrainian autonomy company The Fourth Law unveils an anti-Shahed drone

Ukraine’s autonomous weapons makers push for industrial scale

MSC got the urgency right. The hard part comes next

The breach, first reported by the Mail on Sunday, has been claimed by the “Lynx” ransomware gang, a relatively new cybercriminal outfit believed to operate out of Russia that emerged in 2024 as a likely successor to the notorious “INC” ransomware operation.

In a post on its dark web leak site, seen by Resilience Media, the group claims to have quietly exfiltrated “roughly 4TB of data” from eight RAF and Royal Navy bases in September, including RAF Lakenheath in Suffolk, where the US Air Force’s F-35 jets are based.

“Time is running out – you have the opportunity to resolve this matter before inevitable consequences unfold,” Lynx wrote. The allegedly stolen files, which the group has begun to publish, include the personal details of MoD staff such as names, mobile numbers, vehicle registrations, visitor logs from multiple RAF and Royal Navy facilities, and documents marked “Official Sensitive.”

The breach stemmed not from a direct intrusion into the MoD, but through one of its contractors – Shropshire-based Dodd Group, which handles maintenance and construction at a number of defence sites.

Dodd Group didn’t respond to Resilience Media’s questions, but confirmed to the Mail on Sunday that it “recently experienced a ransomware incident whereby an unauthorised third-party gained temporary access to part of our internal systems.”

“We took immediate steps to contain the incident, swiftly secure our systems and engaged a specialist IT forensic firm to investigate what happened. While our forensic investigation is ongoing, we are aware of claims that data taken from our systems have been published online. We are taking these claims extremely seriously and are working hard to validate this.”

Dodd Group didn’t say how it was compromised, how many individuals are affected by the data breach, or whether it has received any communication from the hacker group responsible.

The MoD has confirmed it is “actively investigating the claims that information relating to the MoD has been published on the dark web”.

“To safeguard sensitive operational information, we will not comment any further on the details,” it said in a statement.

Lynx has been linked to a string of high-profile extortion campaigns since mid-2024. Operating on a ransomware-as-a-service model, it typically exfiltrates data before encrypting systems, then threatens to publish or sell the information if victims refuse to pay. Its decision to target an MoD contractor marks a departure from its public pledge not to attack government institutions.

The incident is the latest in a string of damaging cybersecurity setbacks involving the Ministry of Defence. In August, officials confirmed that thousands of Afghans evacuated to the UK under the government’s resettlement scheme had their personal data exposed after an MoD subcontractor was compromised. The year before, another major breach saw the personal details of serving UK military personnel accessed by hackers, prompting a review of the department’s data-handling and supplier oversight.

Together, the incidents underscore the growing risks posed by third-party access within the MoD’s sprawling contractor ecosystem – and the challenge of securing sensitive information across an increasingly digitised defence supply chain.

James Broomhall, senior associate at Grosvenor Law, who regularly handles high-profile matters involving cybercrime and ransomware attacks, told Resilience Media that the incident involving Dodd Group adds to a “concerning trend” of cyberattacks targeting defence contractors.

“Just months ago, Inflite The Jet Centre Ltd suffered a breach that exposed the personal data of nearly 3,700 individuals, including Afghans resettled under the UK’s Afghan Relocations and Assistance Policy. These repeated failures suggest systemic weaknesses in how sensitive data is protected across the MoD’s supply chain,” he said.

“From a legal standpoint, these breaches raise questions about compliance with UK GDPR, particularly around the duty to implement appropriate security measures and report breaches promptly,” Broomhall continued. “Contractors handling personal data on behalf of the government are considered data processors, and both they and the MoD, as the data controller, could face scrutiny from the Information Commissioner’s Office if safeguards were inadequate.”

Alice Christie, a spokesperson for the UK’s Information Commissioner’s Office, told Resilience Media: “We have received a report from Dodd Group in connection to this and are assessing the information provided.” We’ve asked follow up questions and will update this post as we learn more.

The breach comes amid mounting warnings from the National Cyber Security Centre about escalating cyber threats to the UK’s public sector.

Just days before the MoD attack was revealed, the NCSC disclosed that more than 200 cyber incidents had targeted government agencies in 2025 alone – a sharp rise on 89 incidents in 2024. Officials say state-aligned and financially motivated groups are increasingly blurring the line between espionage and extortion, with defence and critical infrastructure now prime targets.

The timing of the Lynx breach will likely reinforce calls for tighter cyber hygiene across government networks and their private-sector partners.

Tags: Alice ChristieDodd GroupJames BroomhallMinistry of DefenceRussiaUK
Previous Post

Weekend Read: An Exclusive Interview with Mykhailo Fedorov on Ukraine’s AI War Room

Next Post

Inside Tiberius Aerospace With CSO Andy Baynes

Carly Page

Carly Page

Carly Page is a freelance journalist and copywriter with 10+ years of experience covering the technology industry, and was formerly a senior cybersecurity reporter at TechCrunch. Bylines include Forbes, IT Pro, LeadDev, The Register, TechCrunch, TechFinitive, TechRadar, TES, The Telegraph, TIME, Uswitch, WIRED, & more.

Related News

Ukrainian autonomy company The Fourth Law unveils an anti-Shahed drone

Ukrainian autonomy company The Fourth Law unveils an anti-Shahed drone

byJohn Biggs
March 6, 2026

Ukraine-based autonomy company The Fourth Law has unveiled Zerov, an autonomous interceptor drone built to engage long-range strike UAVs in...

Ukraine’s autonomous weapons makers push for industrial scale

Ukraine’s autonomous weapons makers push for industrial scale

byLuke Smith
March 6, 2026

In the past five months in Ukraine, Major Maksym Gromov's unit launched 608 autonomous Lupynis drones against Russian adversaries. Four...

asphalt road between trees

MSC got the urgency right. The hard part comes next

byRobin Dechant
March 6, 2026

A few weeks on from the Munich Security Conference, something many of the Resilience Media community no doubt attended, I...

NATO Innovation Fund appoints a president, Ari Kristinn Jónsson

NATO Innovation Fund appoints a president, Ari Kristinn Jónsson

byIngrid Lunden
March 5, 2026

The NATO Innovation Fund, the VC formed out of the strategic alliance of NATO countries that counts most (but not...

SkySafe Wants to Be the Air Traffic Control for Drones

SkySafe partners with major energy sector player to build out drone defence

byJohn Biggs
March 5, 2026

Southern States LLC and SkySafe announced a partnership to integrate real time drone detection and airspace intelligence into Southern States’...

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

byIngrid Lunden
March 5, 2026

The United Kingdom and Ukraine look like they may have minted their first defence tech ‘unicorn’. Uforce (stylised ‘UFORCE’) —...

Anthropic, OpenAI, and the new rules of Defence AI

Anthropic, OpenAI, and the new rules of Defence AI

byCarly Pageand1 others
March 3, 2026

Anthropic is facing the prospect of being frozen out of US government work after refusing to relax safeguards on how...

Periphery CEO Toby Wilmington

Periphery and Midgard partner to secure robots against capture and reverse engineering

byPaul Sawers
March 2, 2026

Modern conflict has pushed autonomous machines into some of the most hostile operating environments. Drones are intercepted mid-flight, ground robots...

Load More
Next Post
Welcome to Resilience Media

Inside Tiberius Aerospace With CSO Andy Baynes

Nabbing a new NAD

Nabbing a new NAD

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Senai exits stealth to help governments harness online video intelligence

Harmattan AI raises $200M at a $1.4B valuation from Dassault

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.