DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Russian Defence Export Hacked, 500+MB Data Leaked By @Rucyborg (UPDATED)

Posted on March 6, 2014 by Lee J

logo_header_eng Updated below with basic analysis of the data. Today Russian hacktivist @Rucyborg has announced a big leak of files from Russian Defence Export ROSOBORONEXPORT (https://www.roe.ru/). The leak was announced just a short time ago from twitter and has been posted to cyberguerrilla. The leaked files are just the first part of a few to come from the Russian government. The attacks have been carried out due to the recent drama Putin is causing and the Russian hackers have stated they do not want any war all they want to do is expose Putin and his government for what they are. they have also stated that leaks from Sukhoi, Oboronprom, Gazflot, Rusal and others. The leaked data has been uploaded to bayfiles as a 488MB rar file and a preview of the leaked documents has also been provided. **UPDATES: ** Upon checking this leak i did a scan with AVG and came up with the below detection. files_warning The detection has been anaylised and detected in the past on 2013-12-19 09:23:10 as on virus total with a 44/50 detection ratio. The data leaked is related to parts ordered and quotations from the Russian air-force, division of military technical, Hindustan Aeronautics Limted (HAL), documents from cosmoo travels ltd about flight costs in and out of Russia, Russian delegates information with full passport details as well as copies of those passports in image format. Full files list has been added to the gallery.   Org Post:

Russian Cyber Command Transmission 001HINDSUKHOI02 Dobry Vecher Comrads! Taken into consideration recent Russian Government dillusional attempts to start WWIII, WE – Free from Putin – people of Russian Federation – Free computer renegades and outlaws from IT Security – have decided to initiate a true domestic CyberWAr on Russian Military Enterprises and Eventually we shall deliver critical infrastructure companies on which Russian Putin’s Empire (foked in da head) stands on. To cut the crap short – today we deliver ROSOBORONEXPORT and it’s department dealing with sales to INDIA. Followin BRICS countries. We’ve managed to hack into Indian Embassy in Moscow and eventually sent an infected letter to Mr.Saprykin (his Passport is attached) CEO of ROSOBORONEXPORT. ”’greetz to Zhenya Kaspersky – his soft didnt work”’ lulz Same way we have infected SUKHOI, OBORONPROM, GAZFLOT, RUSAL and VELES CAPITAL and many others but we shall deliver them right after this very first leak. Including large Russian Telecom providers and FSB electronic spy companies spread across Russia and registered in offshore zones. This is real, no bullcrap, no playing dumbass games with this lunatic REGIME. RUSSIA has to be free from Lunatics! We support our brothers from Anonymous and LulzSec. HI 5 to TPB! IMAGE PREVIEW of the inside: https://imgur.com/a/DyZpK Link to archive containing ~1000 pdf and docs from ROE: https://bayfiles.net/file/18nWT/NHiWky/rusarms.rar Please torrent or mirror since the FSB will try to shutdown all the links. And watch this great one while downloading – We dedicate it to Mr.Putin!

No related posts.

Category: Breach Incidents

Post navigation

← ComiXology Announces A Security Breach, What You Need To Do
Follow-up: Former Tampa VA Medical Center Employee Sentenced →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.