Hackers reportedly breach developer involved with Russia’s military draft database

An anonymous hacker group has reportedly breached the servers of a little-known Russian tech firm alleged to be involved in building the country’s unified military registration database.

According to Grigory Sverdlov, head of the Russian anti-war human rights group Idite Lesom (“Get Lost”), the hackers contacted him and handed over a trove of internal Mikord documents, including source code, technical and financial records, and internal correspondence. Sverdlov said the group claimed it had maintained access to Mikord’s systems for several months and had destroyed parts of the company’s infrastructure.

Idite Lesom, which helps Russians evade conscription and mobilization, has been labeled a “foreign agent” by Moscow. Sverdlov himself faces criminal charges for allegedly spreading “fake news” about the Russian military.

Mikord’s website has been offline for days, showing only a maintenance message. Earlier this month, the company’s homepage was defaced by hackers who said they intended to give the stolen materials to journalists and later publish them publicly.

The company, which provides software development and automation services for government agencies and major corporations, has never publicly acknowledged any role in developing Russia’s new military registry. But Latvia-based investigative outlet Important Stories (iStories) said it verified the leaked materials and confirmed Mikord’s participation in the project.

Mikord’s director, Ramil Gabdrakhmanov, admitted to iStories that the firm had been hacked. “It happens to everyone. Lots of people are being attacked these days,” he told the outlet. He declined to comment on whether the company worked on the military database.

Russia’s Ministry of Defense dismissed the reports on Thursday, calling claims of a breach “untrue.” The registry, it said, “is operating normally,” and no personal data leaks have occurred. The ministry added that the system is frequently targeted but that all attacks have been “successfully stopped.”

The unified military registration database stores detailed personal data on all military-eligible citizens. It is designed to streamline mobilization and replace the Soviet-era paper registration system used by local draft offices.

The identity and origin of the hacker group are unknown. Recorded Future News cannot independently verify the authenticity of the documents the hackers provided to Russian media and the human rights group.

Earlier in December, suspected Russian hackers targeted multiple Ukrainian state registries — systems holding biometric data, property records, court rulings, business information, and tax documents — and briefly disrupted Reserve+, Ukraine’s digital military service app.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

UK fines LastPass £1.2 million for data breach affecting 1.6 million people

Next Post

Federal agencies now only have one more day to patch React2Shell bug

Related Posts

Password Reuse in Disguise: An Often-Missed Risky Workaround

When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These attack methods continue to evolve and rightly command attention. However, one of the most persistent and underestimated risks to organizational security remains far more ordinary. Near-identical password reuse continues to slip past security controls, often
Read More

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian Executive Branch (FCEB) agencies to strengthen asset lifecycle management for edge network devices and remove those that no longer receive security updates from original equipment manufacturers (OEMs) over the next 12 to 18 months. The agency said the move is to drive down technical debt and minimize
Read More