Security Experts:

Connect with us

Hi, what are you looking for?



European Missile Maker MBDA Denies Hackers Breached Systems

European missile maker MBDA has denied that its systems have been breached after cybercriminals offered to sell data allegedly stolen from the company’s systems.

European missile maker MBDA has denied that its systems have been breached after cybercriminals offered to sell data allegedly stolen from the company’s systems.

A joint venture between aerospace and defense giants Airbus, BAE Systems and Leonardo, MBDA is a European group that designs and produces missiles and missile systems. The company provides its products to air, sea and land forces in Spain, Italy, France, the UK, the US, and Germany.

In late July, a threat actor calling itself ‘Adrastea’ and describing itself as ‘a group of independent specialists and researchers in the field of cybersecurity’ claimed on several cybercrime forums that it had exploited critical vulnerabilities in MBDA systems and gained access to the company’s files.

The cybercriminals claimed to have obtained roughly 60 Gb of data, including files describing military projects, as well as information related to commercial activities, such as design documentation, multimedia materials, contracts, and messages exchanged with other companies. The files have been up for sale. 

On August 1, MBDA issued a statement in several languages, confirming that files have been stolen, but denying that its systems have been breached by hackers.

“MBDA is the subject of a blackmail attempt by a criminal group that falsely claims to have hacked the company’s information networks. Following the company’s refusal to yield to this blackmail threat and pay a ransom demand, the criminal group has spread information on the internet, making it accessible for a payment,” the missile maker said in its statement.

The company has contacted Italian authorities and says it plans on taking ‘all possible legal action’ against the perpetrators.

MBDA claims that its secure networks have not been hacked. Instead, the attackers allegedly obtained the data from an external hard drive. The company’s investigation is ongoing, but it currently claims that the data made available by the hackers does not appear to be classified or sensitive.

It’s unclear how the data from an external drive became compromised. It’s possible the attackers gained access to an employee’s personal device, to which the drive was connected at some point, or they may have acquired the actual drive somehow. Studies have shown that secondhand storage drives often contain the previous owner’s data.

SecurityWeek has reached out to MBDA for clarifications, but the company said it cannot share any information while the official investigation is underway. 

Related: Defense Contractors Must do More to Conceal Their Attack Surface

Related: German Auto and Defense Firm Rheinmetall Says Malware Hit Several Plants

Related: Sophisticated Threat Actor Targets Governments, Defense Industry in Western Asia

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...


Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.


Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.


A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.