DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

britam defence hacked, confidential documents leaked, site offline

Posted on January 24, 2013 by Lee J

britamdefence_logoUpdate: Full report here A British defence company has been breached and as a result a heap of documents have been published online and now the site has gone offline. The attack is on britam defence (https://www.britamdefence.com/) and  has been claimed by a hacker using the handle JAsIrX who uploaded the leaked information to various file sharing websites and released it via a single pastebin post with the a message about the release (see bottom). The documents come in 6 parts and total over 423MB compress zip files and inside the compress files appears to be a common layout of three main folders named !!Syria, Iran and Iraq. Inside these appear to be documents like passports, incident reports about drunk employees which are labelled private and confidential as well. A quick look into the files shows shocking plans for chemical warfare attacks where they have planned to lure victims to kill zones. The file can be found in the Iran folder under OPLAN (Ruhayyat) 1433H-1.doc.

Move from their garrisons to occupy AA at Grid (1556) (IAW Movement Order). On order defend in the designated sector from Grid (378477) to Grid (275408). Facilitate the passage of the Screening Force through PP (1, 2). Fix Enemy forces and lure them to the Killing Zones. On order conduct Counter Attack. Support Reserves when they conduct deep operations.

Full Gallery of documents in leak below: At time of publishing the website appears to be offline with the plesk help page showing giving links to php and other test pages which leak information about the server which could lead to further attacks. www-britamdefence-com_ The leaked data also contains usernames and administration login credentials which appear to be stored in clear text which is a real big worry for a defence company. Also as noted below the British defence company was using a Singapore based host for its server, its any wonder why such companys do this when its national security they handle. Message from the release:

Hello, I’m JAsIrX and I will share with you some documents downloaded after hacking Britam Defence server. Its website is located on the Malaysian server. I found bugs in the website with same ip and uploaded web-shell through this site. Then I hacked plesk parallels control panel and gained access to Britam Defence mail accounts and website directory. Leaked documents: – Contracts copies with signatures – Private email correspondence – Personnel data, etc. Britam Defence is British private military company, operates mainly in the Middle East. It killed Arabs in Iraq and plans to invade in Iran and Syria. Look through leaked documents carefully. CW means chemical weapon, g-shell is short for a gas shell I guess. Help to distribute this info and let other people know about the threats. Thank all

Source: Pastebin.com If i get more time i will release a report into the contents of this leak. Update: Full report here

Category: Breach Incidents

Post navigation

← E-number spreadsheet with Eastern Illinois University student data leaked
Rex Mundi attempts to get Buy Way to pay EUR 20,000 to prevent data leak →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware group Gunra claims to have exfiltrated 450 million patient records from American Hospital Dubai.
  • North Shore University Sleep Disorders Center employee charged with secretly recording patients in restrooms
  • When ransomware listings create confusion as to who the victim was
  • Rajkot civic body’s GIS website hit by cyber attack, over 400 GB data feared stolen
  • Taiwan’s BitoPro hit by NT$345 million cryptocurrency hack
  • Texas gastroenterology and surgical practice victim of ransomware attack
  • Romanian Citizen Pleads Guilty to ‘Swatting’ Numerous Members of Congress, Churches, and Former U.S. President
  • North Dakota Enacts Financial Data Security and Data Breach Notification Requirements
  • Pro-Ukraine hacker group Black Owl poses ‘major threat’ to Russia, Kaspersky says
  • Vanta bug exposed customers’ data to other customers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Florida ban on kids using social media likely unconstitutional, judge rules
  • State Data Minimization Laws Spark Compliance Uncertainty
  • Supreme Court Agrees to Clarify Emergency Situations Where Police Don’t Need Warrant
  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.