Close Menu
National Security News
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
    • Space
    • Nuclear
    • Cyber
  • Investigations

Trending

The targeting chain: how the IRGC exploits MTN-Irancell’s Gulf telecom connections to guide its missiles

March 5, 2026

US Navy to escort oil tankers through the Gulf to prevent attack from Iran

March 4, 2026

President Trump will not rule out sending troops into Iran

March 3, 2026

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

March 3, 2026
Facebook X (Twitter) Instagram
National Security News
Subscribe
X (Twitter)
Login
IPSO Trusted Journalism in National Security
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
    • Space
    • Nuclear
    • Cyber
  • Investigations
National Security News
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
Home»Cyber
Cyber

Scientists at secret military base at centre of Novichok murder probe fear their details may have been stolen by cyber criminals

Sean RaymentBy Sean RaymentOctober 27, 20255 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Listen to the article

0:00
0:00

Key Takeaways

🌐 Translate Article

Translating...

📖 Read Along

💬 AI Assistant

🤖
Hi! I'm here to help you understand this article. Ask me anything about the content!
Sergei and Yulia Skripal

Scientists working at a military base which was at the heart of the Skripal nerve agent probe fear their personal details may have been stolen by cyber criminals.
Workers at the Defence Scientific Technical Laboratory (DSTL) at Porton Down, Salisbury, were alerted to the security breach this month by union officials.
The base had been key in determining that it was Novichok which had been used in the attempted murder of Russian double agent Sergei Skripal and his daughter Yulia in Salisbury in 2018.
Other victims of the hack include technicians and engineers at the defence company BAe Systems, the electronics firm Siemens, and Rolls Royce all of which have military contracts.
All of those affected by the cyber attack are members of the trade union Prospect – whose 160,000 members also include senior Ministry of Defence (MoD) civil servants.
Although the MoD was not targeted directly, information belonging to some of the department’s scientists may have been stolen through what experts call a gateway attack – where criminals obtain information by hacking into organisations like Prospect and contractors.
Prospect was hacked in June but most of its members only learnt this month that personal information, including bank account details, personal email addresses, employment records and even their sexual orientation, may have been stolen.
The delay by Prospect in announcing the extent of the security breach has caused huge frustration amongst the trade union’s members who have warned about the dangers of UK national security being compromised.
An email seen by National Security News and sent by one DSTL scientist to Prospect, said: “We in DSTL work in national security, some in extremely sensitive roles dealing with current operations.
“When you found our data had been compromised you should have told us all immediately as our personal security is at risk. Was our data unencrypted? In whose Cloud was it? Who accessed it. Who was the threat actor? “
Another email said “The membership of this union includes top-level civil servants, the defence sector, nuclear sector etc — it’s a national security risk. The data could well end up in the hands of a hostile state actor.”
A Prospect member also claimed that the organisation refused to identify hackers or whether a ransom had been paid to retrieve stolen data.
Lord West, a former Security Minister under Labour, said he believed Russia was behind most of the recent spate of cyber attacks.
Lord West, a former head of the Royal Navy, who produced the UK’s first cyber strategy in 2009, added: “There is still a huge lack of awareness of the threat posed by cyber attacks. “Most of these originate from Russia with some from China and a lesser extent  from Iran.
“Hackers will often target small businesses working for the MoD to gain access to bigger projects. For example rather they might target an SME producing valves for a nuclear submarine and use that as a gateway into the system.
“The key to preventing these attacks is better cyber security but also making sure your employees are aware the moment an organisation is hacked so they can take appropriate action.”
DSTL is one of the most sensitive and secure military bases in the UK and is where MoD scientists  identified that the deadly nerve agent was used by Russian agents to poison the former Russian intelligence officer Sergei Skripal, his daughter Yulia in 2018.
Much of the work carried out by scientists, especially into deadly biological agents like the Ebola virus, is top secret.
Details of the latest cyber hack have emerged after the Mail On Sunday revealed last week that Russian hackers have stolen hundreds of sensitive military documents containing details of eight RAF and Royal Navy bases as well as Ministry of Defence staff names and emails – and posted them on the dark web.
It also emerged last week that a
A cyber attack on Jaguar Land Rover (JLR)  will cost an estimated £1.9bn and has been the most economically damaging cyber event in UK history.
Experts at the Cyber Monitoring Centre (CMC) have analysed the continuing fallout from the hack, which halted the car giant’s production on 1 September for five weeks and caused widespread delays across JLR’s supply chain.
According to the CMC, 5,000 businesses have been affected in total and a full recovery will not be reached until January 2026.
An MoD spokesman said: “Ministry of Defence Spokesperson said: “We are aware of an incident affecting Prospect and are monitoring the situation closely.  
 “This was not an attack on MOD or any of its systems, and no classified information has been compromised. We continue to provide advice and support to Prospect as appropriate.”
A Prospect Spokesperson said: “We take our responsibility to our members incredibly seriously. We worked relentlessly to ensure we knew the precise scope of impact so we could notify those affected, in accordance with our legal obligations, and not cause unnecessary concern to other members who did not need to be notified.
 “This required extensive detailed work to achieve and was completed as quickly as possible. Differentiating and identifying impact did take time but this allowed us to provide tailored communications, so members we notified knew exactly how they were affected and the support we were making available to them.
“We have engaged with employers, who are reinforcing our advice to affected members, including those in sensitive roles, and this will continue. Based on our engagement to date, there is no basis to suggest any broader security risk.”

cyber attack russia united kingdom
Sean Rayment

Keep Reading

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

Who will be the next Iranian Supreme leader?

Royal Navy submarine HMS Anson arrives in Western Australia for maintenance with AUKUS partners

Russian losses in Ukraine are now higher than the numbers of troops being recruited

Russian soldiers use invisibility cloaks to avoid drone detection

UK Carrier Strike Group to deploy to North Atlantic to keep UK safe

Editor's Picks

US Navy to escort oil tankers through the Gulf to prevent attack from Iran

March 4, 2026

President Trump will not rule out sending troops into Iran

March 3, 2026

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

March 3, 2026

Who will be the next Iranian Supreme leader?

March 2, 2026

Trending

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

Iran March 3, 2026

Who will be the next Iranian Supreme leader?

Iran March 2, 2026

Both ultimate shareholders of MTN-Irancell killed in US-Israeli strikes: what it means for South Africa’s most toxic asset

Iran March 1, 2026
Facebook X (Twitter) TikTok Instagram LinkedIn
© 2026 National Security News. All Rights Reserved.
  • About us
  • Privacy Policy
  • Terms
  • Contact
Home Topics Podcast NSN Lists

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?