The MAYA data breach has led to one of the most significant leaks of Israeli defense data in recent years, exposing technical blueprints, missile schematics, and internal documents related to national security projects. Hacktivist group Cyber Toufan claimed responsibility for the attack, stating that it successfully infiltrated MAYA Technologies, a key Israeli defense contractor that collaborates with major defense and aerospace firms such as Rafael Advanced Defense Systems, Elbit Systems, and Israel Aerospace Industries (IAI).
Background on MAYA Technologies
MAYA Technologies is an Israeli engineering firm specializing in advanced mechanical and electronic design for the defense and aerospace sectors. The company works closely with national and international partners to develop systems for land, air, and naval platforms. Public information about MAYA is limited due to the confidential nature of its clients, but internal documentation shows involvement in several major programs, including Iron Beam laser defense, Hermes 900 drones, and Spike NLOS guided missiles.
The breach reportedly began several weeks before it was announced. Sources monitoring underground hacking forums noticed discussions referencing stolen “Israeli defense project archives” attributed to a group aligned with pro-Iranian interests. On November 3, 2025, Cyber Toufan publicly posted a large collection of internal MAYA documents, marking the latest escalation in cyber operations targeting the Israeli defense industry.
Cyber Toufan Takes Credit
The group released a statement through its affiliated media channel, Cyber Isnaad Front, asserting that it had “infiltrated the heart of Israel’s defense engineering operations.” The data dump included detailed images, CAD blueprints, and photographs of missile guidance components, armored vehicles, and laser systems. Each image was stamped with a watermark reading “Breaking Out from Monopoly of Zionist Regimes,” a recurring slogan used by Cyber Toufan to frame its political messaging.
Among the materials were documents marked with the MAYA logo and Elbit Systems project codes. Many included specifications for internal weapons platforms, system calibration data, and proprietary measurements that would normally be restricted to defense contractors under classified agreements. Researchers say the leak demonstrates both deep network access and an awareness of how to package the data for maximum public and intelligence impact.
Scope and Details of the Leak
The attackers published a list of 36 different military projects allegedly obtained from MAYA’s servers. The leaked content ranges from optical guidance components and laser calibration devices to drone assembly instructions and heavy vehicle upgrades. Notable items listed in the catalog titled “Information Obtained from the Infiltration of MAYA Technologies” include:
- Boresight 105mm – calibration device for tank fire control systems used by the IDF and U.S. Army
- Common Helmet Mounted Display (CHMD) – advanced pilot visualization and targeting system
- Hermes 900 drone manuals – internal instructions for assembly, maintenance, and initialization
- Crossbow Turreted Mortar System – autonomous mortar platform capable of rapid targeting and firing
- Iron Beam 450 – directed energy system developed for missile interception
- Upgrade of the Z-MAG Military Vehicle – modernization plan for armored transports used in reconnaissance missions
- Optical Contrast EO Seekers – missile guidance optics employing electro-optical tracking
- Derby and Python missiles – beyond-visual-range air-to-air missile designs from Rafael
- IMU and NM Imaging Systems – high-precision sensors and imaging tools used for navigation and targeting
Some of the leaked files also include labeled photographs taken inside workshops, revealing hardware prototypes and testing setups. Metadata extracted from the images references specific file paths and CAD versioning used by MAYA engineers, adding weight to claims that the information originated from inside the company’s secured systems.
Technical and Geopolitical Implications
Experts believe the MAYA data breach could have long-term consequences for Israeli national security and allied defense programs. Several of the affected systems, including Iron Beam and Stunner missile components, are part of joint initiatives between Israel and the United States. Others, such as the Land 400 and AS21 Redback projects, are tied to international contracts involving Australia and NATO partners.
The exposure of precise engineering blueprints raises concerns about reverse engineering and potential exploitation by adversarial states. In the hands of a capable foreign intelligence service, such data could enable the development of countermeasures against Israeli and allied systems or facilitate the cloning of proprietary technologies for commercial and military use.
Cyber Toufan’s messaging also appears intended to amplify psychological and political pressure. The group’s releases are often timed to coincide with major geopolitical events or escalations in regional tensions, suggesting coordination with broader influence operations designed to weaken Israeli defense credibility.
Response and Verification Efforts
At the time of writing, neither MAYA Technologies nor Israel’s Ministry of Defense has issued an official statement acknowledging the incident. However, independent verification from cybersecurity researchers supports the authenticity of the documents. Analysts from several threat intelligence firms confirmed that serial numbers, component labels, and engineering details match publicly known features of Israeli military systems.
Images of workspaces and equipment also appear consistent with legitimate manufacturing environments. These details suggest the hackers gained direct access to internal networks, potentially through a compromised employee account or an unpatched remote access service. Some experts have speculated that the breach may have been achieved through a supply chain compromise, as MAYA collaborates with multiple defense partners and subcontractors.
About Cyber Toufan
Cyber Toufan emerged in 2023 and quickly became known for targeting Israeli infrastructure, financial institutions, and defense-linked firms. The group claims to act on behalf of what it calls “the resistance axis,” a loose coalition of pro-Iranian cyber groups that conduct information operations and retaliatory attacks. Previous campaigns have focused on leaking data from Israeli municipal systems, energy companies, and intelligence-related databases.
The group’s tactics blend traditional data theft with psychological warfare. By releasing materials tied to defense production, Cyber Toufan aims to damage Israel’s reputation as a global leader in cybersecurity and military innovation. Analysts note that the level of access demonstrated in the MAYA Technologies data breach far exceeds most hacktivist-level operations, suggesting technical assistance from a nation-state actor or advanced persistent threat (APT) partner.
Potential National Security Consequences
The breach could have several downstream effects. First, it may force Israel to reevaluate its supply chain security policies, particularly among second-tier contractors. Second, the exposure of sensitive engineering data could lead to the redesign of multiple systems to prevent vulnerabilities being exploited in the field. Third, the leak may disrupt export relationships if clients fear compromised technologies.
Defense experts also warn that leaked blueprints can facilitate targeted attacks. Knowing the internal configuration of missile guidance systems, for example, may allow adversaries to develop jamming or spoofing techniques that degrade their performance. The MAYA data breach could therefore become both an intelligence asset and a tactical threat multiplier for Israel’s opponents.
Ongoing Investigations and Broader Lessons
Israeli cybersecurity agencies, including the Israel National Cyber Directorate, are expected to coordinate a multi-agency response to determine the scope of the breach. International partners may also become involved, as several of the compromised projects intersect with U.S. and NATO defense supply chains. Early reports indicate that forensic investigators are focusing on remote access systems and data transfer logs from the summer of 2025, when abnormal activity was first detected on defense contractor networks.
For the global defense sector, this attack underscores the growing risks of third-party compromise. Even small engineering firms can serve as entry points into classified ecosystems. Enhanced segmentation, zero-trust policies, and real-time monitoring of contractor access are increasingly being recognized as essential safeguards against similar events.
The MAYA data breach represents a severe blow to Israel’s defense manufacturing ecosystem and a stark reminder of the risks facing modern defense contractors. With more than thirty critical projects exposed, including missile, drone, and laser systems, the leak not only compromises proprietary technology but may alter the balance of technological advantage in ongoing regional conflicts. As the investigation continues, it highlights how cyber warfare has become an integral part of global military competition, blurring the line between espionage, sabotage, and information warfare.
For continued updates on related incidents, visit our sections on data breaches and cybersecurity news.

















