Ransomware victim disclosure
← All victimsMeteksan Defence Industry
Claimed by Moneymessage · listed 3 years ago
Status timeline
- Listed
Jul 15, 2023
- Data leaked
At a glance
- Group
- Moneymessage
- Status
- Data leaked
- Country
- Turkey
- Sector
- Defense & Aerospace
- Listed on leak site
- Jul 15, 2023
About the victim
AI dossier — public-source company profileMeteksan Defence Industry is a subsidiary of Bilkent Holding and Bilkent University, based in Ankara, Turkey. The company employs approximately 150 personnel, with over 100 holding advanced engineering degrees, forming a high-technology defence R&D and manufacturing workforce. It operates within Turkey's defence-industrial sector, developing advanced defence electronics and systems.
- Industry
- Defence Electronics & Systems
- Address
- Ankara, Turkey
- Employees
- 150
Attack summary
Severity: critical — The victim is a defence-sector subsidiary operating in sensitive military/aerospace R&D; data has already been published (not merely threatened), raising the likelihood that classified or sensitive defence intellectual property, engineering specifications, and personnel records are exposed — constituting a critical national-security and regulated-data breach.The Moneymessage ransomware group claims to have attacked Meteksan Defence Industry and has published data (disclosed status: data_published), indicating exfiltration of company data with full disclosure already made.
Data the group says was taken
AI dossier — extracted from the leak post- Company internal documents
- Engineering and R&D files
- Personnel records
- Defence project data
What the group claims
Meteksan Defence Industries, Inc. is a subsidiary of Bilkent Holding and Bilkent University of Ankara, Turkey. The Company employs 150 personnel, where more than 100 high degree engineers comprise the direct technological workforce.
Sources
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
