{
	"id": "a7f43eab-1517-49b8-aa28-6ad777a87177",
	"created_at": "2026-04-06T01:31:13.004698Z",
	"updated_at": "2026-04-10T03:21:15.013587Z",
	"deleted_at": null,
	"sha1_hash": "e5720436817625d584d2881c1882b26a32d0f3c6",
	"title": "Ransomware scumbags leak Boeing, Lockheed Martin, SpaceX documents after contractor refuses to pay",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 42574,
	"plain_text": "Ransomware scumbags leak Boeing, Lockheed Martin, SpaceX\r\ndocuments after contractor refuses to pay\r\nBy Shaun Nichols and Gareth Corfield\r\nPublished: 2020-04-10 · Archived: 2026-04-06 00:24:54 UTC\r\nInternal confidential documents belonging to some of the largest aerospace companies in the world have been\r\nstolen from an industrial contractor and leaked online.\r\nThe data was pilfered and dumped on the internet by the criminals behind the DoppelPaymer Windows\r\nransomware, in retaliation for an unpaid extortion demand. The sensitive documents include details of Lockheed-Martin-designed military equipment – such as the specifications for an antenna in an anti-mortar defense system –\r\naccording to a Register source who alerted us to the blueprints.\r\nOther documents in the cache include billing and payment forms, supplier information, data analysis reports, and\r\nlegal paperwork. There are also documents outlining SpaceX's manufacturing partner program.\r\nThe files were siphoned from Visser Precision by the DoppelPaymer crew, which infected the contractor's PCs and\r\nscrambled its files. When the company failed to pay the ransom by their March deadline, the gang – which tends\r\nto demand hundreds of thousands to millions of dollars to restore encrypted files – uploaded a selection of the\r\ndocuments to a website that remains online and publicly accessible.\r\nVisser is a manufacturing and design contractor in the US whose clients are said to include aerospace, automotive,\r\nand industrial manufacturing outfits – think Lockheed Martin, SpaceX, Tesla, Boeing, Honeywell, Blue Origin,\r\nSikorsky, Joe Gibbs Racing, the University of Colorado, the Cardiff School of Engineering, and others. The leaked\r\nfiles relate to these customers, in particular Tesla, Lockheed Martin, Boeing, and SpaceX.\r\nWhen asked about the dump, a Lockheed Martin spokesperson told us: \"We are aware of the situation with Visser\r\nPrecision and are following our standard response process for potential cyber incidents related to our supply chain.\r\n\"Lockheed Martin has made and continues to make significant investments in cybersecurity, and uses industry-leading information security practices to protect sensitive information. This includes providing guidance to our\r\nsuppliers, when appropriate, to assist them in enhancing their cybersecurity posture.\"\r\nVisser Precision did not respond to a request for comment on the leak. Tesla, SpaceX, and Boeing did not respond\r\neither.\r\nThis is not the first time the DoppelPaymer crew has publicly shared stolen confidential data after a victim failed\r\nto pay the ransom demands. In fact, the crooks have a regularly updated website full of internal documents\r\nbelonging to organizations that didn't cough up, though admittedly most are significantly less interesting than the\r\nVisser Precision cache.\r\nhttps://www.theregister.co.uk/2020/04/10/lockheed_martin_spacex_ransomware_leak/\r\nPage 1 of 2\n\nThe dumps are intended to scare others who are infected with the ransomware into paying the group's demands.\r\nThe Register will not be linking to the site.\r\nFor what it's worth, the DoppelPaymer gang vowed to lay off attacking hospitals during the coronavirus\r\npandemic. Whether or not this promise was honored is another question.\r\nWhile law enforcement agencies and security experts uniformly agree that paying a ransom demand is a bad idea\r\nand poor substitute for keeping offline backups and properly securing data, some experts have conceded that,\r\nwhen it's your corporate data on the line, caving in and paying up can be an option. ®\r\nSource: https://www.theregister.co.uk/2020/04/10/lockheed_martin_spacex_ransomware_leak/\r\nhttps://www.theregister.co.uk/2020/04/10/lockheed_martin_spacex_ransomware_leak/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.theregister.co.uk/2020/04/10/lockheed_martin_spacex_ransomware_leak/"
	],
	"report_names": [
		"lockheed_martin_spacex_ransomware_leak"
	],
	"threat_actors": [],
	"ts_created_at": 1775439073,
	"ts_updated_at": 1775791275,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e5720436817625d584d2881c1882b26a32d0f3c6.pdf",
		"text": "https://archive.orkl.eu/e5720436817625d584d2881c1882b26a32d0f3c6.txt",
		"img": "https://archive.orkl.eu/e5720436817625d584d2881c1882b26a32d0f3c6.jpg"
	}
}