DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

britam defence hacked, confidential documents leaked, site offline

Posted on January 24, 2013 by Lee J

britamdefence_logoUpdate: Full report here A British defence company has been breached and as a result a heap of documents have been published online and now the site has gone offline. The attack is on britam defence (https://www.britamdefence.com/) and  has been claimed by a hacker using the handle JAsIrX who uploaded the leaked information to various file sharing websites and released it via a single pastebin post with the a message about the release (see bottom). The documents come in 6 parts and total over 423MB compress zip files and inside the compress files appears to be a common layout of three main folders named !!Syria, Iran and Iraq. Inside these appear to be documents like passports, incident reports about drunk employees which are labelled private and confidential as well. A quick look into the files shows shocking plans for chemical warfare attacks where they have planned to lure victims to kill zones. The file can be found in the Iran folder under OPLAN (Ruhayyat) 1433H-1.doc.

Move from their garrisons to occupy AA at Grid (1556) (IAW Movement Order). On order defend in the designated sector from Grid (378477) to Grid (275408). Facilitate the passage of the Screening Force through PP (1, 2). Fix Enemy forces and lure them to the Killing Zones. On order conduct Counter Attack. Support Reserves when they conduct deep operations.

Full Gallery of documents in leak below: At time of publishing the website appears to be offline with the plesk help page showing giving links to php and other test pages which leak information about the server which could lead to further attacks. www-britamdefence-com_ The leaked data also contains usernames and administration login credentials which appear to be stored in clear text which is a real big worry for a defence company. Also as noted below the British defence company was using a Singapore based host for its server, its any wonder why such companys do this when its national security they handle. Message from the release:

Hello, I’m JAsIrX and I will share with you some documents downloaded after hacking Britam Defence server. Its website is located on the Malaysian server. I found bugs in the website with same ip and uploaded web-shell through this site. Then I hacked plesk parallels control panel and gained access to Britam Defence mail accounts and website directory. Leaked documents: – Contracts copies with signatures – Private email correspondence – Personnel data, etc. Britam Defence is British private military company, operates mainly in the Middle East. It killed Arabs in Iraq and plans to invade in Iran and Syria. Look through leaked documents carefully. CW means chemical weapon, g-shell is short for a gas shell I guess. Help to distribute this info and let other people know about the threats. Thank all

Source: Pastebin.com If i get more time i will release a report into the contents of this leak. Update: Full report here

Category: Breach Incidents

Post navigation

← E-number spreadsheet with Eastern Illinois University student data leaked
Rex Mundi attempts to get Buy Way to pay EUR 20,000 to prevent data leak →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware
  • Almost one year later, U.S. Dermatology Partners is still not being very transparent about their 2024 breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.