Friday 1 May, 2026
[email protected]
Resilience Media
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
  • About
  • News
  • Resilience Conference
    • Resilience Conference Warsaw 2026
    • Resilience Conference Copenhagen 2026
    • Resilience Conference London 2026
  • Guest Posts
    • Author a Post
  • Subscribe
No Result
View All Result
Resilience Media
No Result
View All Result

Russia-Linked Hackers Claim Ransomware Attack on MoD contractor, Allege 4TB Data Theft

The hackers claim to have stolen terabytes of sensitive data from eight military sites in what could be one of Britain’s most serious defence cyber breaches to date

Carly PagebyCarly Page
October 20, 2025
in Interview, News
Photo by Philipp Katzenberger on Unsplash

Photo by Philipp Katzenberger on Unsplash

Share on Linkedin

Russian-linked hackers claim to have stolen and dumped data from eight UK Ministry of Defence sites in what appears to be one of the most serious cyber breaches to hit Britain’s military network in years.

You Might Also Like

Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

Report maps Russia’s hybrid war on Poland

Report: Europe’s reliance on imported energy and technology presents both risk and opportunity

The breach, first reported by the Mail on Sunday, has been claimed by the “Lynx” ransomware gang, a relatively new cybercriminal outfit believed to operate out of Russia that emerged in 2024 as a likely successor to the notorious “INC” ransomware operation.

In a post on its dark web leak site, seen by Resilience Media, the group claims to have quietly exfiltrated “roughly 4TB of data” from eight RAF and Royal Navy bases in September, including RAF Lakenheath in Suffolk, where the US Air Force’s F-35 jets are based.

“Time is running out – you have the opportunity to resolve this matter before inevitable consequences unfold,” Lynx wrote. The allegedly stolen files, which the group has begun to publish, include the personal details of MoD staff such as names, mobile numbers, vehicle registrations, visitor logs from multiple RAF and Royal Navy facilities, and documents marked “Official Sensitive.”

The breach stemmed not from a direct intrusion into the MoD, but through one of its contractors – Shropshire-based Dodd Group, which handles maintenance and construction at a number of defence sites.

Dodd Group didn’t respond to Resilience Media’s questions, but confirmed to the Mail on Sunday that it “recently experienced a ransomware incident whereby an unauthorised third-party gained temporary access to part of our internal systems.”

“We took immediate steps to contain the incident, swiftly secure our systems and engaged a specialist IT forensic firm to investigate what happened. While our forensic investigation is ongoing, we are aware of claims that data taken from our systems have been published online. We are taking these claims extremely seriously and are working hard to validate this.”

Dodd Group didn’t say how it was compromised, how many individuals are affected by the data breach, or whether it has received any communication from the hacker group responsible.

The MoD has confirmed it is “actively investigating the claims that information relating to the MoD has been published on the dark web”.

“To safeguard sensitive operational information, we will not comment any further on the details,” it said in a statement.

Lynx has been linked to a string of high-profile extortion campaigns since mid-2024. Operating on a ransomware-as-a-service model, it typically exfiltrates data before encrypting systems, then threatens to publish or sell the information if victims refuse to pay. Its decision to target an MoD contractor marks a departure from its public pledge not to attack government institutions.

The incident is the latest in a string of damaging cybersecurity setbacks involving the Ministry of Defence. In August, officials confirmed that thousands of Afghans evacuated to the UK under the government’s resettlement scheme had their personal data exposed after an MoD subcontractor was compromised. The year before, another major breach saw the personal details of serving UK military personnel accessed by hackers, prompting a review of the department’s data-handling and supplier oversight.

Together, the incidents underscore the growing risks posed by third-party access within the MoD’s sprawling contractor ecosystem – and the challenge of securing sensitive information across an increasingly digitised defence supply chain.

James Broomhall, senior associate at Grosvenor Law, who regularly handles high-profile matters involving cybercrime and ransomware attacks, told Resilience Media that the incident involving Dodd Group adds to a “concerning trend” of cyberattacks targeting defence contractors.

“Just months ago, Inflite The Jet Centre Ltd suffered a breach that exposed the personal data of nearly 3,700 individuals, including Afghans resettled under the UK’s Afghan Relocations and Assistance Policy. These repeated failures suggest systemic weaknesses in how sensitive data is protected across the MoD’s supply chain,” he said.

“From a legal standpoint, these breaches raise questions about compliance with UK GDPR, particularly around the duty to implement appropriate security measures and report breaches promptly,” Broomhall continued. “Contractors handling personal data on behalf of the government are considered data processors, and both they and the MoD, as the data controller, could face scrutiny from the Information Commissioner’s Office if safeguards were inadequate.”

Alice Christie, a spokesperson for the UK’s Information Commissioner’s Office, told Resilience Media: “We have received a report from Dodd Group in connection to this and are assessing the information provided.” We’ve asked follow up questions and will update this post as we learn more.

The breach comes amid mounting warnings from the National Cyber Security Centre about escalating cyber threats to the UK’s public sector.

Just days before the MoD attack was revealed, the NCSC disclosed that more than 200 cyber incidents had targeted government agencies in 2025 alone – a sharp rise on 89 incidents in 2024. Officials say state-aligned and financially motivated groups are increasingly blurring the line between espionage and extortion, with defence and critical infrastructure now prime targets.

The timing of the Lynx breach will likely reinforce calls for tighter cyber hygiene across government networks and their private-sector partners.

Tags: Alice ChristieDodd GroupJames BroomhallMinistry of DefenceRussiaUK
Previous Post

Weekend Read: An Exclusive Interview with Mykhailo Fedorov on Ukraine’s AI War Room

Next Post

Inside Tiberius Aerospace With CSO Andy Baynes

Carly Page

Carly Page

Carly Page is a freelance journalist and copywriter with 10+ years of experience covering the technology industry, and was formerly a senior cybersecurity reporter at TechCrunch. Bylines include Forbes, IT Pro, LeadDev, The Register, TechCrunch, TechFinitive, TechRadar, TES, The Telegraph, TIME, Uswitch, WIRED, & more.

Related News

Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

Spiral Hydrogen raises €2.7M to pilot its new hydrogen tech at the Port of Rotterdam

byFiona Alston
April 30, 2026

Estonian-Dutch dual-use startup Spiral Hydrogen will be taking its centrifugal bubble-free electrolysis technology from the lab to the Port of...

Report maps Russia’s hybrid war on Poland

Report maps Russia’s hybrid war on Poland

byJohn Biggs
April 30, 2026

A new report from Defence24 has outlined the role of Russia in a number of cyberattacks and acts of sabotage....

Line illustration showing trucks, cars and a cyclist, alongside a wind turbine, solar panel, power lines, buildings and a data centre, depicting energy infrastructure

Report: Europe’s reliance on imported energy and technology presents both risk and opportunity

byPaul Sawers
April 29, 2026

Europe’s reliance on external technology and infrastructure faces growing scrutiny, as policymakers and industry leaders confront the risks of depending...

Weekly Digest: The mystery of the British unicorn – the story of our dealings with Roark Aerospace

Inside the case of Roark Aerospace: The British defence unicorn no one can verify

byIngrid Lunden
April 28, 2026

On Boxing Day 2025, we received a press release from Roark Aerospace. The UK startup, which makes anti-drone systems, reported...

German military uniform (Touko Aikioniemi from Unsplash)

Europe’s armed forces are too reliant on US cloud providers, report finds

byPaul Sawers
April 28, 2026

Europe’s defence systems depend heavily on US cloud infrastructure, leaving key military functions exposed to potential service disruptions during geopolitical...

UNIVITY raises €27 million to build a 5G satellite constellation that can expand European communication networks

UNIVITY raises €27 million to build a 5G satellite constellation that can expand European communication networks

byJohn Biggs
April 24, 2026

UNIVITY has raised €27 million to transition its space-based telecom infrastructure from a demonstration phase to an early industrial stage....

Jacek Siewiera: a future NATO conflict will be fought against civilian targets

Jacek Siewiera: a future NATO conflict will be fought against civilian targets

byResilience Media
April 24, 2026

The wars in Iran and Ukraine have underscored how civilian infrastructure will become a feature of future conflicts. And Poland’s...

Sten Tamkivi: Poland’s defence start-ups should be seen as future GDP drivers

Sten Tamkivi: Poland’s defence start-ups should be seen as future GDP drivers

byResilience Media
April 24, 2026

Sten Tamkivi, a partner at Plural and an early Skype executive, joined Resilience Media publisher Leslie Hitchcock on stage during...

Load More
Next Post
Welcome to Resilience Media

Inside Tiberius Aerospace With CSO Andy Baynes

Nabbing a new NAD

Nabbing a new NAD

Most viewed

InVeris announces fats Drone, an integrated, multi-party drone flight simulator

Uforce raises $50M at a $1B+ valuation to build defence tech for Ukraine

Auterion, the drone software startup, eyes raising $200M at a $1.2B+ valuation

Senai exits stealth to help governments harness online video intelligence

Palantir and Ukraine’s Brave1 have built a new AI “Dataroom”

Twentyfour Industries emerges from stealth with $11.8M for mass-produced drones

Resilience Media is an independent publication covering the future of defence, security, and resilience. Our reporting focuses on emerging technologies, strategic threats, and the growing role of startups and investors in the defence of democracy.

  • About
  • News
  • Resilence Conference
    • Resilience Conference Copenhagen 2026
    • Resilience Conference Warsaw 2026
    • Resilience Conference 2026
  • Guest Posts
  • Subscribe
  • Privacy Policy
  • Terms & Conditions

© 2026 Resilience Media

No Result
View All Result
  • Home
  • Subscribe
  • About
  • Events
  • Guest Posts
  • Interview
  • News
  • Resilience Conference London 2026
  • Resilience Conference Copenhagen 2026
  • Resilience Conference Warsaw 2026
  • Startups
  • Venture
  • Weekly Digest

© 2026 Resilience Media

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.