A British based defence company by the name of Britam Defence (britamdefence.com) got its website hacked and a massive amount of confidential documents leaked as a result of server breach.
The CWN reports that the hacker who attacked the defence site goes by the handle of JAsIrX announced the hack on Pastebin and uploaded the data on several file sharing websites. The hacker explained the reasons for attacking the site and why the documents were made public.
According to the message:
Hello,
I’m JAsIrX and I will share with you some documents downloaded after hacking Britam Defence server.
Its website is located on the Malaysian server. I found bugs in the website with same ip and uploaded web-shell through this site.
Then I hacked plesk parallels control panel and gained access to Britam Defence mail accounts and website directory.The documents come in 6 parts and total over 423MB compress zip files and inside the compress files appears to be a common layout of three main folders named !!Syria, Iran and Iraq.
Inside these appear to be documents like passports, incident reports about drunk employees which are labelled private and confidential as well.
The hacker claims to have Contracts copies with signatures, Private email correspondence and other highly confidential & Personal data.
CWN further explains that The documents come in 6 parts and total over 423MB compress zip files and inside the compress files appears to be a common layout of three main folders named !!Syria, Iran and Iraq.
Inside these appear to be documents like passports, incident reports about drunk employees which are labelled private and confidential as well.
A quick look into the files shows shocking plans for chemical warfare attacks where they have planned to lure victims to kill zones. The file can be found in the Iran folder under OPLAN (Ruhayyat) 1433H-
Move from their garrisons to occupy AA at Grid (1556) (IAW Movement Order).
On order defend in the designated sector from Grid (378477) to Grid (275408).
Facilitate the passage of the Screening Force through PP (1, 2).
Fix Enemy forces and lure them to the Killing Zones.
On order conduct Counter Attack.
Support Reserves when they conduct deep operations.
The leaked data also contains usernames, emails and plain text passwords which is surely going to be a headache for the defence contractors having offices in London, Dubai, Singapore, Iraq and Libya, and associated companies in Abu Dhabi and China.
At the time of publishing this article, the site was restored and working online.
Special Thanks to Cyber War News for updating me on this one, an insight analysis of the leaked data is available on their site which can be found here.