Russia linked hackers targeted the Ministry of Defense and leaked thousands

“Russia-linked hackers” targeted the Ministry of Defense and leaked thousands of documents online relating to some of the UK’s most sensitive websites, in a “potentially very damaging” security breach

Russia-linked hackers have targeted Britain’s Ministry of Defense and published thousands of documents online, according to a report.

The cybercriminals released data that could help criminals break into some of the UK’s most secret sites, including the HMNB Clyde nuclear submarine base, the Porton Down chemical weapons laboratory and a GCHQ listening post.

Secret information about military sites and maximum security prisons was also stolen by the LockBit group – one of the most dangerous hacker gangs in the world.

The group – whose main suspect includes Russian Mikhail Matveyev – is said to have shared the data on the dark web, which can be accessed via special software, reports The Mirror.

This was followed by serious security breaches at the Met Police – where 47,000 officers’ data was compromised – and the Police Service of Northern Ireland, which accidentally shared the personal details of 10,000 staff.

Labor MP Kevan Jones, who sits on the House of Commons defense committee, told the newspaper: “This is potentially very damaging to the security of some of our most sensitive sites.”

The SNP has warned the British government that it will reject any attempt to keep Britain's nuclear submarines north of the border in the event of an independence vote.  The Royal Navy's HMNB Clyde base at Faslane in the west of Scotland

The hackers have published thousands of pages of data that could help criminals break into the HMNB Clyde nuclear submarine base (pictured).

Secret information about military sites and maximum security prisons was also stolen by the LockBit group - one of the most dangerous hacker gangs in the world.  One of the group's main suspects is Russian Mikhail Matveyev (pictured).

Secret information about military sites and maximum security prisons was also stolen by the LockBit group – one of the most dangerous hacker gangs in the world. One of the group’s main suspects is Russian Mikhail Matveyev (pictured).

“The government must explain why this company’s computer systems were so vulnerable.” “Any information that provides security protections to potential enemies is of great importance.”

The hackers are said to be targeting the databases of Zaun, a company responsible for protecting high-security locations.

It is understood the hackers stole the documents last month in a shocking attack on Zaun – a West Midlands-based company that makes fencing and security measures for vulnerable sites. The company provided security barriers at the 2012 London Olympics.

LockBit, which is said to have financial ties to Russian criminals, has been on the FBI’s radar since 2020 and is said to have paid £80 million in ransoms worldwide.

There are a number of Russians arrested for cyberattacks in the US and Canada. Russian citizen Ruslan Magomedovich Astamirov has been charged in the US “for involvement in the deployment of numerous LockBit ransomware and other attacks in the US, Asia, Europe and Africa.”

And last year, Mikhail Vasilyev, a Russian and Canadian citizen, was also indicted by the US. He is being held in Canada and is awaiting extradition to the United States.

Mikhail Matveev, who has been linked to numerous ransomware variants including LockBit, is also wanted for “allegedly conducting significant attacks against companies both in the United States and globally.”

Information that could help criminals break into the Porton Down chemical weapons laboratory (pictured) has also been released by hackers

Information that could help criminals break into the Porton Down chemical weapons laboratory (pictured) has also been released by hackers

He is on the FBI’s wanted list following suspected attacks on 1,400 global targets, including a £66 million blackmail against the Royal Mail, which refused to pay.

A leaked document is understood to relate to equipment used to protect Porton Down – one of the most secret military research facilities in the UK. Zaun describes his work at the Wiltshire campus as “very mysterious”.

A sales order was also leaked detailing the goods purchased for the HMNB Clyde, home of the Trident nuclear submarines. A sales order report for goods was also reportedly uncovered at the GCHQ communications site in Bude, Cornwall.

According to GCHQ, Bude plays a “critical role” in Britain’s security.

The leak is also said to have included details of security equipment at RAF Waddington, from which Reaper drone missions have been conducted for a decade, and Cawdor Barracks, the base of the 14th Signal Regiment, which deals with electronic warfare.

Detailed drawings of the fencing at Cawdor in Pembrokeshire were also included in the company’s emails and leaked onto the dark web. Information was also leaked on a number of prisons including Category A Long Lartin, Worcs and Whitemoor.

A spokesperson for Zaun told The Mirror: “LockBit may have gained access to some historical emails, orders, drawings and project files.” We do not believe that any classified documents were stored in the system or were compromised.

“The National Cyber ​​Security Center has been contacted and we are taking advice.” “Zaun is the victim of a sophisticated cyberattack and has taken all appropriate measures to contain any attack on our systems.”

A government spokesman told Web this evening: “We do not comment on security issues.”