Hungary confirms hack of defense procurement agency

Avatar

Hungarian officials confirmed to local media that the country’s defense procurement agency (VBÜ) was attacked by an “international group of hackers.”

Earlier on Thursday, the cybercrime group known as INC Ransomware or INC Ransom claimed access to the agency’s data and posted sample screenshots on its dark web portal. Previous research indicates that the group emerged last year, primarily targeting healthcare, education, and government entities. The operators behind it remain unknown.

In response to media inquiries, the Hungarian Ministry of National Defense declined to disclose potential information leaks, citing an ongoing investigation. The ministry added that VBÜ does not store sensitive military data. Hungary is a member of the NATO alliance. 

Prime Minister Viktor Orbán’s chief of staff, Gergely Gulyás, attributed the attack to a “hostile foreign, non-state hacker group” without naming the group.

Gulyás stated during a press briefing on Thursday that the most sensitive data that could be potentially accessed included “plans and data about military procurement.” 

Hungarian news outlet Magyar Hang reported that INC Ransomware breached the agency’s servers, downloading and encrypting all files. Hackers allegedly published screenshots of documents containing data on the Hungarian army’s air and land capabilities, as well as documents marked “non-public.”

Media reports indicate the leaked data is “fairly recent,” with some documents dating to October of this year. The hackers are reportedly demanding $5 million in ransom. 

Hungarian officials did not comment on whether they are negotiating with the hackers. The defense ministry has not replied to a request for comment by Recorded Future News.

NewsCybercrimeGovernment
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Chinese national faces 20 years in US prison for laundering pig-butchering proceeds

Next Post

Cybercriminals target victims in Spain, Germany, Ukraine with Strela Stealer malware

Related Posts

Securing Agentic AI: How to Protect the Invisible Identity Access

AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can’t easily see. These “invisible” non-human identities (NHIs) now outnumber human accounts in most cloud environments, and they have
Avatar
Read More

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software has been exploited by a China-nexus threat actor to target a wide range of sectors across Europe, North America, and the Asia-Pacific region. The vulnerabilities, tracked as CVE-2025-4427 (CVSS score: 5.3) and CVE-2025-4428 (CVSS score: 7.2), could be chained to execute arbitrary code on a
Avatar
Read More