Today : Oct 20, 2025
World News
20 October 2025

Russian Hackers Target UK Military Bases In Major Breach

Sensitive files on eight RAF and Royal Navy bases, including US F-35 jet locations, reportedly published on the dark web after a ransomware attack on defence contractor Dodd Group.

The Ministry of Defence (MoD) is facing one of its most significant security challenges in recent years, as it investigates claims that Russian hackers have stolen and published hundreds of sensitive military documents on the dark web. The breach, which surfaced publicly on October 19, 2025, has sent shockwaves through the British defence community and raised urgent questions about the security of outsourced defence operations.

According to reports by The Mail on Sunday and corroborated by several major outlets including BBC, The Independent, and Portsmouth News, the stolen files reportedly contain detailed information about eight Royal Air Force (RAF) and Royal Navy bases, as well as personal data such as Ministry of Defence staff names and email addresses. The dark web, known for its clandestine nature and accessibility only through specialized software, became the platform where these sensitive documents surfaced, prompting immediate concern from government officials and security experts alike.

The breach was not a direct attack on the MoD itself, but rather on one of its key contractors, the Dodd Group—a maintenance and construction company with access to critical infrastructure information. The Dodd Group confirmed it had suffered a ransomware incident, during which an unauthorized third party gained temporary access to part of its internal systems. In a statement provided to The Independent, a spokesperson for the company said, "We can confirm that the Dodd Group recently experienced a ransomware incident whereby an unauthorised third-party gained temporary access to part of our internal systems. We took immediate steps to contain the incident, swiftly secure our systems and engaged a specialist IT forensic firm to investigate what happened. While our forensic investigation is ongoing, we are aware of claims that data taken from our systems have been published online. We are taking these claims extremely seriously and are working hard to validate this. We are in contact with our customers and colleagues and have also notified the relevant regulatory authorities and law enforcement."

The files reportedly include information about several high-profile military installations. Among them is RAF Lakenheath in Suffolk, home to the United States Air Force’s F-35 fighter jets, which, according to Portsmouth News, are equipped with nuclear weapons. Other bases named in the breach include RAF Portreath, RAF Predannack, RAF Mildenhall, HMS Raleigh, HMS Drake, RAF St Mawgan, and RNAS Culdrose. The documents are said to contain not only base details but also personnel and visitor records, heightening concerns about the potential risks posed to both military operations and individual safety.

In response to the reports, the MoD issued a statement emphasizing its commitment to national security: "We take a robust and proactive approach to cyber threats that could pose risks to national interests. We are actively investigating claims that information relating to the MoD has been published on the Dark Web. To safeguard sensitive operational information, we will not comment any further on the details." This statement, echoed across multiple news outlets including BBC and Mirror, underscores the gravity with which the government is treating the incident.

The timing and nature of the attack have drawn comparisons to previous high-profile data breaches at the MoD. In August 2025, it was revealed that thousands of Afghans who had been brought to safety in the UK had their personal data exposed after a sub-contractor’s security lapse. Last year, a significant breach saw the personal information—including names, bank details, and some addresses—of up to 272,000 service personnel and veterans accessed via the military payroll system. The government had also covertly set up the Afghanistan Response Route in 2022 after details of Afghan evacuees were leaked "in error" by a defence official. These incidents have collectively raised concerns about the security protocols surrounding sensitive defence data, especially when third-party contractors are involved.

The hackers reportedly targeted the Dodd Group in September 2025, gaining access via a ransomware attack. According to Mirror, the cybercriminals issued a chilling warning to the contractor: "Time is running out – you have the opportunity to resolve this matter before inevitable consequences unfold." Such messages are characteristic of ransomware attacks, where perpetrators demand payment or concessions in exchange for not releasing stolen data. However, in this case, the files appear to have been published regardless, escalating the situation from a private extortion attempt to a public security crisis.

Security and defence experts have not minced words about the seriousness of the breach. Professor Anthony Glees, a security and defence expert from the University of Buckingham, told The Mail, "This is a massive national security breach, and it's a double-headed breach, because it not only is about data of great importance to Britain's enemies and potential enemies, but it is also an embarrassment to Britain's allies, in particular the US." The presence of US military assets at RAF Lakenheath, including nuclear-capable aircraft, has heightened the diplomatic stakes, with the breach potentially undermining trust between the UK and its closest allies.

The Dodd Group, for its part, has been swift to act. Beyond engaging a specialist IT forensic firm, the company has also notified regulatory authorities and law enforcement, and maintains ongoing communication with both customers and colleagues. "We are taking these claims extremely seriously and are working hard to validate this," a spokesperson reiterated in statements to multiple news outlets.

For the Ministry of Defence, the incident is yet another reminder of the evolving nature of cyber threats in the 21st century. The increasing reliance on private contractors for essential services—ranging from maintenance to IT support—has expanded the potential attack surface for hostile actors. While the MoD insists it takes a "robust and proactive approach" to cyber threats, the recurrence of such breaches suggests that more comprehensive safeguards may be required, particularly when it comes to third-party access to sensitive data.

The broader context of international cyber warfare also looms large. Russian hackers have been implicated in numerous cyberattacks against Western institutions in recent years, targeting everything from critical infrastructure to political organizations. The latest breach fits a pattern of aggressive cyber operations designed to sow discord, gather intelligence, and undermine public confidence in government institutions.

As the investigation continues, the MoD has remained tight-lipped about the specifics of the compromised data, citing the need to protect ongoing operations. However, the incident has already reignited debate within the UK about the security of defence data, the oversight of contractors, and the country's preparedness for future cyber threats. For now, the government’s focus remains on containing the fallout, assessing the full extent of the breach, and shoring up defences against what many see as an increasingly sophisticated and persistent threat landscape.

The coming weeks will likely bring further revelations as forensic experts delve deeper into the breach. For the MoD, the Dodd Group, and the British public, the incident is a stark reminder that in today's interconnected world, the front lines of national security are as likely to be digital as they are physical.