DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

britam defence hacked, confidential documents leaked, site offline

Posted on January 24, 2013 by Lee J

britamdefence_logoUpdate: Full report here A British defence company has been breached and as a result a heap of documents have been published online and now the site has gone offline. The attack is on britam defence (https://www.britamdefence.com/) and  has been claimed by a hacker using the handle JAsIrX who uploaded the leaked information to various file sharing websites and released it via a single pastebin post with the a message about the release (see bottom). The documents come in 6 parts and total over 423MB compress zip files and inside the compress files appears to be a common layout of three main folders named !!Syria, Iran and Iraq. Inside these appear to be documents like passports, incident reports about drunk employees which are labelled private and confidential as well. A quick look into the files shows shocking plans for chemical warfare attacks where they have planned to lure victims to kill zones. The file can be found in the Iran folder under OPLAN (Ruhayyat) 1433H-1.doc.

Move from their garrisons to occupy AA at Grid (1556) (IAW Movement Order). On order defend in the designated sector from Grid (378477) to Grid (275408). Facilitate the passage of the Screening Force through PP (1, 2). Fix Enemy forces and lure them to the Killing Zones. On order conduct Counter Attack. Support Reserves when they conduct deep operations.

Full Gallery of documents in leak below: At time of publishing the website appears to be offline with the plesk help page showing giving links to php and other test pages which leak information about the server which could lead to further attacks. www-britamdefence-com_ The leaked data also contains usernames and administration login credentials which appear to be stored in clear text which is a real big worry for a defence company. Also as noted below the British defence company was using a Singapore based host for its server, its any wonder why such companys do this when its national security they handle. Message from the release:

Hello, I’m JAsIrX and I will share with you some documents downloaded after hacking Britam Defence server. Its website is located on the Malaysian server. I found bugs in the website with same ip and uploaded web-shell through this site. Then I hacked plesk parallels control panel and gained access to Britam Defence mail accounts and website directory. Leaked documents: – Contracts copies with signatures – Private email correspondence – Personnel data, etc. Britam Defence is British private military company, operates mainly in the Middle East. It killed Arabs in Iraq and plans to invade in Iran and Syria. Look through leaked documents carefully. CW means chemical weapon, g-shell is short for a gas shell I guess. Help to distribute this info and let other people know about the threats. Thank all

Source: Pastebin.com If i get more time i will release a report into the contents of this leak. Update: Full report here

Related posts:

  • A Look into the Britam Defence Data Leak Files
  • A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks
  • Operation Anti Security Breakdown and targets, the full time line
  • Iran’s ban on Telegram that was intended to facilitate domestic spying backfired
Category: Breach Incidents

Post navigation

← E-number spreadsheet with Eastern Illinois University student data leaked
Rex Mundi attempts to get Buy Way to pay EUR 20,000 to prevent data leak →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Breaches have consequences (sometimes)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit
  • British national “IntelBroker” charged with causing $25 million in damages; U.S. seeks his extradition from France
  • France issues press statement about arrest of ShinyHunters members
  • Patients Allege Home Delivery Pharmacy Failed to Timely Notify Them of Data Breach
  • Hackers breach Norwegian dam, open valve at full capacity
  • Patient death at London hospital linked to cyber attack on NHS
  • ShinyHunters and team members arrested in France (2)
  • Texas Enacts Liability Shield From Punitive Damages for Certain Small Businesses That Adopt Cybersecurity Programs
  • Dublin ETB fined €125,000 for data protection breaches

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How Internet of Things devices affect your privacy – even when they’re not yours
  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule
  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.