March 21, 2022 at 9:01 PM
Operation Ruble
Hello all, ATW here again. Today, we're re-releasing some data that was lost forever on Almaz-Antey, a major Russian defence contractor.
This breach had been met with critic previously on RaidForums, however, it was confirmed by the company themselves.
Detailed Leak Information
Today, we are releasing a large collection of internal files from the following companies / state-owned firms:
- NPO Splav - https://en.wikipedia.org/wiki/NPO_Splav
- Novolipetsk Steel - https://en.wikipedia.org/wiki/Novolipetsk_Steel
- NPO Mashinostroyeniya - https://en.wikipedia.org/wiki/NPO_Mashinostroyeniya
- Oceanpribor - https://loexpo.crplo.ru/en/machinery/oceanpribor
- Murom Plant of Radio Metering Equipment
- KB Mashinostroyeniya - https://en.wikipedia.org/wiki/KB_Mashinostroyeniya
- HYDROPRIBOR - https://www.altusintel.com/public-yy4xg5/
- Bugulma Mechanical Plant - https://bmz.tatneft.ru/?lang=e
- GULFSTREAM - https://gulfstream-mrp.ru/
The information involved with this data is as follows:
- Logins - I.E RDP logins to the some of the aforementioned companies above
- PII-based documents (.xlsx, .csv files)
- Presentation files (.pptx)
- File collections, & other assortment of private or classified documents within archives (.zip)
- All PDF pages
- SQL files - Files containing sql-based information
- Images - Code, system information, login details, source code, in-person photos
- Config files - .bak, .config
- Videos - .mp4
Information regarding this data spans back from 2012 all the way to 2022.
The original folder was 80GB, however, we removed a lot of repeated stuff.
Screenshots
Blueprints and Schematics
Download & Shout out
We originally infiltrated this defence contractor in January, releasing the data on RaidForums. However, with RaidForums, the download links and us resetting our network, the data was lost forever.
Thankfully, @34585 had the data on hand and forwarded it to us. We went on to further gather more up-to-date data from the same instance, which had attempted to sure it's vulnerable information, but was still subjected to the same Bitnami exploit we used originally.
While we sift through more of the data, part 2 will be available soon.
Uncompressed Size: 9.5GB
Compressed Size: 9.1GB
Download link: https://anonfiles.com/L6DajeC1x1/Part_1_rar
~ AgainstTheWest / BlueHornet












