Hungary confirms hack of defense procurement agency

Avatar

Hungarian officials confirmed to local media that the country’s defense procurement agency (VBÜ) was attacked by an “international group of hackers.”

Earlier on Thursday, the cybercrime group known as INC Ransomware or INC Ransom claimed access to the agency’s data and posted sample screenshots on its dark web portal. Previous research indicates that the group emerged last year, primarily targeting healthcare, education, and government entities. The operators behind it remain unknown.

In response to media inquiries, the Hungarian Ministry of National Defense declined to disclose potential information leaks, citing an ongoing investigation. The ministry added that VBÜ does not store sensitive military data. Hungary is a member of the NATO alliance. 

Prime Minister Viktor Orbán’s chief of staff, Gergely Gulyás, attributed the attack to a “hostile foreign, non-state hacker group” without naming the group.

Gulyás stated during a press briefing on Thursday that the most sensitive data that could be potentially accessed included “plans and data about military procurement.” 

Hungarian news outlet Magyar Hang reported that INC Ransomware breached the agency’s servers, downloading and encrypting all files. Hackers allegedly published screenshots of documents containing data on the Hungarian army’s air and land capabilities, as well as documents marked “non-public.”

Media reports indicate the leaked data is “fairly recent,” with some documents dating to October of this year. The hackers are reportedly demanding $5 million in ransom. 

Hungarian officials did not comment on whether they are negotiating with the hackers. The defense ministry has not replied to a request for comment by Recorded Future News.

NewsCybercrimeGovernment
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Chinese national faces 20 years in US prison for laundering pig-butchering proceeds

Next Post

Cybercriminals target victims in Spain, Germany, Ukraine with Strela Stealer malware

Related Posts

NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware

A federal jury on Tuesday decided that NSO Group must pay Meta-owned WhatsApp WhatsApp approximately $168 million in monetary damages, more than four months after a federal judge ruled that the Israeli company violated U.S. laws by exploiting WhatsApp servers to deploy Pegasus spyware, targeting over 1,400 individuals globally. WhatsApp originally filed the lawsuit against NSO Group in 2019,
Avatar
Read More

Initial Access Brokers Shift Tactics, Selling More for Less

What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals. This division of labor allows IABs to concentrate on their core expertise: exploiting vulnerabilities through methods like social engineering and brute-force attacks.  By selling access, they significantly mitigate the
Avatar
Read More

Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely

A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code execution on affected installations. The vulnerability, tracked as CVE-2025-34028, carries a CVSS score of 9.0 out of a maximum of 10.0. "A critical security vulnerability has been identified in the Command Center installation, allowing remote attackers to execute arbitrary code without
Avatar
Read More