Ransomware at UK military contractor leads to dark-web dump


This recording was made using enhanced software.

Summary

Breach path

Reports say hackers accessed MoD-related data via contractor Dodd Group; the firm confirms a ransomware incident and forensic review.

Leaked scope

Files allegedly reference eight bases, including RAF Lakenheath; hackers claim about 4TB stolen with staged dumps since Sept. 23.

Official response

MoD says it is actively investigating and won’t share details to safeguard operations; experts warn of phishing risks from routine docs.


Full story

Britain’s Ministry of Defence is investigating claims that Russian hackers stole hundreds of sensitive documents about eight Royal Air Force and Royal Navy bases — plus Ministry of Defence staff names and emails — and posted them on the dark web, first reported by the Daily Mail on Sunday. According to reports, the cache includes references to RAF Lakenheath in Suffolk, where U.S. Air Force F-35 jets are based.

QR code for SAN app download

Download the SAN app today to stay up-to-date with Unbiased. Straight Facts™.

Point phone camera here

According to the Mail on Sunday, attackers breached property contractor Dodd Group, providing an entry point into MoD-related data. Dodd Group confirmed it “experienced a ransomware incident whereby an unauthorised third-party gained temporary access to part of our internal systems” and said it took “immediate steps” to contain the breach and hired a specialist forensic firm, according to BBC News.

Overview of what’s in the leak

SAN’s review of the posted dumps shows the group calling itself “Lynx Ransomware” claiming a financially driven model that prefers “dialogue and resolution” and says it avoids targets like governments, hospitals and nonprofits, according to a statement packaged with the files.

Lynx Ransomware

What’s been posted so far

Three of four planned releases appear online, labeled as customer data, contracts and confidential materials.

Key items identified

– Monthly and quarterly customer reports dating back to 2024 (e.g., Birmingham, Cambridge, Norwich, Plymouth, Solihull Community Housing, Warwickshire).

– Fleet and fuel data, including vehicle details, fuel-card numbers and other sensitive driver information.

– “Abusive Behaviour Reports” tied to Dodd projects.

– Internal blueprint directory sets such as CAD_Projects, CAD Standards, and accounts.

– Subcontractor orders and regional project folders.

– A file titled “Status of RAF Base Pass Applications.”

– Restricted RAF Lakenheath area maps.

– Technical schematics and site drawings, including base lighting and energy grid layouts.

Verification note

This SAN coverage reflects visible file names, directory labels and accompanying statements in the posted materials. SAN is not republishing personal identifiers or fuel-card data and cannot independently verify completeness beyond the items reviewed.

What officials and experts are saying

The ministry said that it is “actively investigating claims that information relating to the MoD has been published on the dark web” and would not comment further “to safeguard sensitive operational information,” according to statements reported by The Times

The Mail on Sunday quoted former Intelligence Corps officer Col. Phil Ingram calling the episode a “catastrophic security failure,” while University of Buckingham professor Anthony Glees called it a “massive national security breach.”

David Shrier of the Imperial College Business School told Newsweek the “fact pattern” points to possible human error, such as opening a malicious email or connecting an insecure device.

What the leaked files reportedly contain

The trove includes visitor forms and records for RAF Portreath and RNAS Culdrose, internal email guidance and security instructions that could enable phishing and material tied to RAF Predannack, HMS Raleigh, HMS Drake and RAF St Mawgan.

The paper said the hackers claimed to have extracted roughly 4 terabytes of data and were releasing it in stages after an initial breach on Sept. 23 and a warning that “time is running out.”

Why it matters and what’s next

BBC News and The Times said the probe comes after other high-profile ministry breaches affecting serving personnel and Afghans brought to safety in the U.K. Newsweek noted the report has fueled speculation about aggressive Russian hybrid activity toward NATO members.

Dodd Group said it is “taking these claims extremely seriously,” is in contact with customers and authorities, and is working to validate what was published. The ministry also said it is continuing to investigate.

Mathew Grisham (Digital Producer) contributed to this report.
Tags: , , , , , ,

SAN provides
Unbiased. Straight Facts.

Don’t just take our word for it.


Certified balanced reporting

According to media bias experts at AllSides

AllSides Certified Balanced May 2025

Transparent and credible

Awarded a perfect reliability rating from NewsGuard

100/100

Welcome back to trustworthy journalism.

Find out more

Why this story matters

A reported data breach involving sensitive U.K. Ministry of Defence documents highlights cybersecurity vulnerabilities that can impact military operations and personnel security, while raising concerns about broader state-linked information warfare activities targeting NATO members.

Cybersecurity breach

The breach demonstrates potential weaknesses in third-party contractor systems and underscores the challenges of protecting sensitive defense data from increasingly sophisticated cyber threats.

National security risks

Exposing base maps, security protocols and personnel information introduces operational risks to military facilities and could endanger individuals if exploited by malicious actors.

Get the big picture

Synthesized coverage insights across 31 media outlets

Behind the numbers

Reports indicate hundreds of sensitive documents were compromised, affecting eight military bases and up to 272,000 service personnel and veterans. These documents included personal data such as names, email addresses and bank details.

Context corner

Cyberattacks on government and defense institutions have increased in recent years, with the U.K. experiencing several major breaches involving both internal and contractor systems. Similar incidents have led to renewed scrutiny of cybersecurity in public sector supply chains.

Global impact

With RAF Lakenheath hosting U.S. F-35 jets and possibly nuclear weapons, the breach raises concerns for transatlantic security and could impact NATO allies, especially given tensions with Russia.

SAN provides
Unbiased. Straight Facts.

Don’t just take our word for it.


Certified balanced reporting

According to media bias experts at AllSides

AllSides Certified Balanced May 2025

Transparent and credible

Awarded a perfect reliability rating from NewsGuard

100/100

Welcome back to trustworthy journalism.

Find out more

Media landscape

Click on bars to see headlines

31 total sources

Key points from the Left

  • Russian hackers are suspected of stealing sensitive files related to eight U.K. military bases and posting them on the dark web, including Ministry of Defence staff names and emails.
  • The hackers accessed the files by infiltrating Dodd Group, a maintenance contractor for the Ministry of Defence, which was breached on Sep. 23, 2025, through unauthorized access via ransomware.
  • Around 272,000 service personnel may be affected following the breach, which involved compromised personal data such as names and bank details.
  • The Ministry of Defence has stated they are actively investigating the claims and taking a robust, proactive approach to mitigate cyber threats.

Report an issue with this summary

Key points from the Center

  • On Sept. 23, Russian hackers stole hundreds of military documents from eight RAF bases, including RAF Lakenheath and RAF Mildenhall.
  • The hackers targeted the Dodd Group, a contractor used by the Ministry of Defence, accessing files including Kier details and U.S. Air Force’s F-35 jets at RAF Lakenheath.
  • Lots of the stolen information, including contractors' names, car registrations, mobile numbers and personnel names and email addresses, has been uploaded to the dark web, and last month about half of stolen information was published online.
  • A Dodd Group spokesman confirmed the incident and said "limited data" had been stolen and systems secured, while a Ministry of Defence spokesperson said "We take a robust and proactive approach to cyber threats…" and is actively investigating.

Report an issue with this summary

Key points from the Right

  • Russian Hackers have breached eight U.K. military bases, stealing hundreds of military documents that are now on the dark web, as reported by The Mail on Sunday.
  • The Ministry of Defence confirmed the breach and stated they are "actively investigating" the claims.
  • Top secret documents were revealed, including personal details of Ministry of Defence staff and security instructions.
  • A former military intelligence officer described the incident as a "catastrophic security failure" and a significant breach for national security.

Report an issue with this summary

Powered by Ground News™

Daily Newsletter

Start your day with fact-based news

Start your day with fact-based news

Learn more about our emails. Unsubscribe anytime.

By entering your email, you agree to the Terms and Conditions and acknowledge the Privacy Policy.