{
	"id": "41c56f50-43cb-4ae2-a134-06c988530c86",
	"created_at": "2026-04-06T00:08:41.82945Z",
	"updated_at": "2026-04-10T13:12:58.206631Z",
	"deleted_at": null,
	"sha1_hash": "b0e15a81341f31b65b824c48fd9430f804aee7dc",
	"title": "Canadian fighter jet training company investigating ransomware attack",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 141188,
	"plain_text": "Canadian fighter jet training company investigating ransomware\r\nattack\r\nBy Jonathan Greig\r\nPublished: 2023-01-12 · Archived: 2026-04-05 13:45:32 UTC\r\nA Canadian company that supplies fighter jets for airborne training exercises has been hit with a ransomware\r\nattack. \r\nIn a brief statement to The Record on Wednesday, Top Aces confirmed that it is in the process of investigating the\r\nincident. \r\nThe Montreal-based firm — which said it is the “exclusive adversary air provider to the Canadian and German\r\narmed forces” — showed up on the leak site for the LockBit ransomware group. \r\nA screenshot of the LockBit victim page. (Brett Callow)\r\nTop Aces was founded in 2000 by a group of former fighter pilots and now says it has the “the largest worldwide\r\nfootprint of privately-held operational fighter aircraft.” \r\nIn addition to its work with Canada, Germany, Israel and other countries, the company signed a lucrative contract\r\nwith the U.S. Air Force in 2019. It explicitly mentions providing tools for training to defend against Russian\r\nweaponry. \r\nhttps://therecord.media/top-aces-ransomware-attack-lockbit/\r\nPage 1 of 3\n\nEmsisoft threat analyst Brett Callow noted that attacks on companies in the defense sector are concerning because\r\n\"there is no way of knowing where stolen data may end up.\"\r\n\"Even if the individuals behind the attack are simply for-profit cybercriminals, they may sell the data or make it\r\notherwise available to third parties which could potential include hostile governments,\" Callow said.\r\n\"There have been multiple attacks on companies in the defense industrial base sector in recent years, and\r\ngovernment really needs to find a way to enhance security its supply chain.\"\r\nCallow pointed to previous attacks on Visser Precision, a parts supplier for Lockheed Martin, and Westech\r\nInternational, a US military contractor that provides support for the Minuteman III nuclear deterrent.\r\nThe LockBit ransomware group gave Top Aces a deadline of May 15 before it leaks the 44GB of data it allegedly\r\nstole. \r\nLockBit continues to be one of the most prolific ransomware groups working, with hundreds of attacks over the\r\nlast year. They have attacked at least 650 organizations so far this year, according to data collected by Recorded\r\nFuture. \r\nThe group recently made waves with an attack on a popular German library service and another on systems\r\nconnected to the Secretary of State for Finance of Rio de Janeiro.\r\nThe Australian Cyber Security Centre (ACSC) issued a security advisory last August warning of a sudden spike in\r\nLockBit ransomware attacks. \r\nThe group has been operating since September 2019 and was a marginal player before developing a new version\r\nof their Ransomware-as-a-Service platform, called LockBit 2.0.\r\nhttps://therecord.media/top-aces-ransomware-attack-lockbit/\r\nPage 2 of 3\n\nNo previous article\r\nNo new articles\r\nJonathan Greig\r\nis a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since\r\n2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia.\r\nHe previously covered cybersecurity at ZDNet and TechRepublic.\r\nSource: https://therecord.media/top-aces-ransomware-attack-lockbit/\r\nhttps://therecord.media/top-aces-ransomware-attack-lockbit/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://therecord.media/top-aces-ransomware-attack-lockbit/"
	],
	"report_names": [
		"top-aces-ransomware-attack-lockbit"
	],
	"threat_actors": [],
	"ts_created_at": 1775434121,
	"ts_updated_at": 1775826778,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/b0e15a81341f31b65b824c48fd9430f804aee7dc.pdf",
		"text": "https://archive.orkl.eu/b0e15a81341f31b65b824c48fd9430f804aee7dc.txt",
		"img": "https://archive.orkl.eu/b0e15a81341f31b65b824c48fd9430f804aee7dc.jpg"
	}
}