Cyber Toufan, a group believed to be linked to the Iranian state, claimed responsibility for the breach and released 3D renderings and technical blueprints of the Redback vehicles on Telegram.
The hackers said the data was obtained during a broader campaign that targeted 17 Israeli defense contractors after infiltrating supply-chain firm MAYA Technologies last year.
Among the affected companies was Israel’s Elbit Systems, which supplies weapons turrets for the Redback fleet under a separate $920 million contract.
The leaked material includes internal Australian Defense Force discussions about potential purchases of Israel’s Spike NLOS anti-tank missiles.
It remains unclear how much information was stolen or whether the data could be used to compromise the Redback’s systems.
The Redback project, developed with South Korea’s Hanwha Defense, will deliver 129 next-generation combat vehicles to the Australian Army, with construction taking place in Geelong, southwest of Melbourne.
Defense Industry Minister Pat Conroy, who announced the project last week, defended Elbit’s role despite criticism over Israel’s war in Gaza. “We make no apology for getting the best possible equipment for the Australian Defense Force,” he said.
The breach highlights an escalating pattern of cyberattacks on global defense networks.
The Australian Signals Directorate warned in its 2025 Cyber Threat Report that government and military data remain key targets for state-sponsored actors.