DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Russian Defence Export Hacked, 500+MB Data Leaked By @Rucyborg (UPDATED)

Posted on March 6, 2014 by Lee J

logo_header_eng Updated below with basic analysis of the data. Today Russian hacktivist @Rucyborg has announced a big leak of files from Russian Defence Export ROSOBORONEXPORT (https://www.roe.ru/). The leak was announced just a short time ago from twitter and has been posted to cyberguerrilla. The leaked files are just the first part of a few to come from the Russian government. The attacks have been carried out due to the recent drama Putin is causing and the Russian hackers have stated they do not want any war all they want to do is expose Putin and his government for what they are. they have also stated that leaks from Sukhoi, Oboronprom, Gazflot, Rusal and others. The leaked data has been uploaded to bayfiles as a 488MB rar file and a preview of the leaked documents has also been provided. **UPDATES: ** Upon checking this leak i did a scan with AVG and came up with the below detection. files_warning The detection has been anaylised and detected in the past on 2013-12-19 09:23:10 as on virus total with a 44/50 detection ratio. The data leaked is related to parts ordered and quotations from the Russian air-force, division of military technical, Hindustan Aeronautics Limted (HAL), documents from cosmoo travels ltd about flight costs in and out of Russia, Russian delegates information with full passport details as well as copies of those passports in image format. Full files list has been added to the gallery.   Org Post:

Russian Cyber Command Transmission 001HINDSUKHOI02 Dobry Vecher Comrads! Taken into consideration recent Russian Government dillusional attempts to start WWIII, WE – Free from Putin – people of Russian Federation – Free computer renegades and outlaws from IT Security – have decided to initiate a true domestic CyberWAr on Russian Military Enterprises and Eventually we shall deliver critical infrastructure companies on which Russian Putin’s Empire (foked in da head) stands on. To cut the crap short – today we deliver ROSOBORONEXPORT and it’s department dealing with sales to INDIA. Followin BRICS countries. We’ve managed to hack into Indian Embassy in Moscow and eventually sent an infected letter to Mr.Saprykin (his Passport is attached) CEO of ROSOBORONEXPORT. ”’greetz to Zhenya Kaspersky – his soft didnt work”’ lulz Same way we have infected SUKHOI, OBORONPROM, GAZFLOT, RUSAL and VELES CAPITAL and many others but we shall deliver them right after this very first leak. Including large Russian Telecom providers and FSB electronic spy companies spread across Russia and registered in offshore zones. This is real, no bullcrap, no playing dumbass games with this lunatic REGIME. RUSSIA has to be free from Lunatics! We support our brothers from Anonymous and LulzSec. HI 5 to TPB! IMAGE PREVIEW of the inside: https://imgur.com/a/DyZpK Link to archive containing ~1000 pdf and docs from ROE: https://bayfiles.net/file/18nWT/NHiWky/rusarms.rar Please torrent or mirror since the FSB will try to shutdown all the links. And watch this great one while downloading – We dedicate it to Mr.Putin!

Category: Breach Incidents

Post navigation

← ComiXology Announces A Security Breach, What You Need To Do
Follow-up: Former Tampa VA Medical Center Employee Sentenced →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Dutch Government: More forms of espionage to be a criminal offence from 15 May onwards
  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.