DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

britam defence hacked, confidential documents leaked, site offline

Posted on January 24, 2013 by Lee J

britamdefence_logoUpdate: Full report here A British defence company has been breached and as a result a heap of documents have been published online and now the site has gone offline. The attack is on britam defence (https://www.britamdefence.com/) and  has been claimed by a hacker using the handle JAsIrX who uploaded the leaked information to various file sharing websites and released it via a single pastebin post with the a message about the release (see bottom). The documents come in 6 parts and total over 423MB compress zip files and inside the compress files appears to be a common layout of three main folders named !!Syria, Iran and Iraq. Inside these appear to be documents like passports, incident reports about drunk employees which are labelled private and confidential as well. A quick look into the files shows shocking plans for chemical warfare attacks where they have planned to lure victims to kill zones. The file can be found in the Iran folder under OPLAN (Ruhayyat) 1433H-1.doc.

Move from their garrisons to occupy AA at Grid (1556) (IAW Movement Order). On order defend in the designated sector from Grid (378477) to Grid (275408). Facilitate the passage of the Screening Force through PP (1, 2). Fix Enemy forces and lure them to the Killing Zones. On order conduct Counter Attack. Support Reserves when they conduct deep operations.

Full Gallery of documents in leak below: At time of publishing the website appears to be offline with the plesk help page showing giving links to php and other test pages which leak information about the server which could lead to further attacks. www-britamdefence-com_ The leaked data also contains usernames and administration login credentials which appear to be stored in clear text which is a real big worry for a defence company. Also as noted below the British defence company was using a Singapore based host for its server, its any wonder why such companys do this when its national security they handle. Message from the release:

Hello, I’m JAsIrX and I will share with you some documents downloaded after hacking Britam Defence server. Its website is located on the Malaysian server. I found bugs in the website with same ip and uploaded web-shell through this site. Then I hacked plesk parallels control panel and gained access to Britam Defence mail accounts and website directory. Leaked documents: – Contracts copies with signatures – Private email correspondence – Personnel data, etc. Britam Defence is British private military company, operates mainly in the Middle East. It killed Arabs in Iraq and plans to invade in Iran and Syria. Look through leaked documents carefully. CW means chemical weapon, g-shell is short for a gas shell I guess. Help to distribute this info and let other people know about the threats. Thank all

Source: Pastebin.com If i get more time i will release a report into the contents of this leak. Update: Full report here

Category: Breach Incidents

Post navigation

← E-number spreadsheet with Eastern Illinois University student data leaked
Rex Mundi attempts to get Buy Way to pay EUR 20,000 to prevent data leak →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.