Hackers reportedly breach developer involved with Russia’s military draft database

An anonymous hacker group has reportedly breached the servers of a little-known Russian tech firm alleged to be involved in building the country’s unified military registration database.

According to Grigory Sverdlov, head of the Russian anti-war human rights group Idite Lesom (“Get Lost”), the hackers contacted him and handed over a trove of internal Mikord documents, including source code, technical and financial records, and internal correspondence. Sverdlov said the group claimed it had maintained access to Mikord’s systems for several months and had destroyed parts of the company’s infrastructure.

Idite Lesom, which helps Russians evade conscription and mobilization, has been labeled a “foreign agent” by Moscow. Sverdlov himself faces criminal charges for allegedly spreading “fake news” about the Russian military.

Mikord’s website has been offline for days, showing only a maintenance message. Earlier this month, the company’s homepage was defaced by hackers who said they intended to give the stolen materials to journalists and later publish them publicly.

The company, which provides software development and automation services for government agencies and major corporations, has never publicly acknowledged any role in developing Russia’s new military registry. But Latvia-based investigative outlet Important Stories (iStories) said it verified the leaked materials and confirmed Mikord’s participation in the project.

Mikord’s director, Ramil Gabdrakhmanov, admitted to iStories that the firm had been hacked. “It happens to everyone. Lots of people are being attacked these days,” he told the outlet. He declined to comment on whether the company worked on the military database.

Russia’s Ministry of Defense dismissed the reports on Thursday, calling claims of a breach “untrue.” The registry, it said, “is operating normally,” and no personal data leaks have occurred. The ministry added that the system is frequently targeted but that all attacks have been “successfully stopped.”

The unified military registration database stores detailed personal data on all military-eligible citizens. It is designed to streamline mobilization and replace the Soviet-era paper registration system used by local draft offices.

The identity and origin of the hacker group are unknown. Recorded Future News cannot independently verify the authenticity of the documents the hackers provided to Russian media and the human rights group.

Earlier in December, suspected Russian hackers targeted multiple Ukrainian state registries — systems holding biometric data, property records, court rulings, business information, and tax documents — and briefly disrupted Reserve+, Ukraine’s digital military service app.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

UK fines LastPass £1.2 million for data breach affecting 1.6 million people

Next Post

Federal agencies now only have one more day to patch React2Shell bug

Related Posts

A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do

A design firm is editing a new campaign video on a MacBook Pro. The creative director opens a collaboration app that quietly requests microphone and camera permissions. MacOS is supposed to flag that, but in this case, the checks are loose. The app gets access anyway. On another Mac in the same office, file sharing is enabled through an old protocol called SMB version one. It’s fast and
Read More

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. "The malicious activity – carried out by a state-sponsored threat actor - was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call," the company said in a
Read More

CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication portals and impersonation pages. The campaign, internally dubbed HackOnChat, abuses WhatsApp’s familiar web interface, using social engineering tactics to trick users into compromising their accounts. Investigators identified thousands of malicious URLs
Read More