Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Top 5 Criteria for ITDR Solutions

June 16, 2025

Why Compromised Credentials Are the #1 Attack Vector in 2024

June 15, 2025

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Hackers breach Morocco’s social security database in an unprecedented cyberattack
Cybercrime

Hackers breach Morocco’s social security database in an unprecedented cyberattack

Staff WriterBy Staff WriterMay 21, 2025No Comments3 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


RABAT, Morocco (AP) — Morocco ‘s social security agency said troves of data were stolen from its systems in a cyberattack this week that resulted in personal information being leaked on the messaging app Telegram.

The North African kingdom’s social security fund administers pensions and insurance benefits to millions of private sector workers, from assembly line laborers to corporate executives. It said in a statement Wednesday that preliminary investigations suggest the leak resulted from hackers bypassing its security systems.

The agency did not say who was thought to be responsible for the leak while also claiming that many of the documents posted were “misleading, inaccurate, or incomplete.”

The hackers who posted the documents on Telegram said the attack was in response to alleged Moroccan “harassment” of Algeria on social media platforms, pledging additional cyberattacks if Algerian sites were targeted.

Moroccan media have attributed the attack to Algerian hackers, describing it as an episode in a larger cyberwar between the two countries.

Relations between Algeria and Morocco have recently deteriorated to historic lows. The countries have withdrawn their ambassadors, closed their embassies and respective airspaces. Algeria’s support for the Polisario Front, a pro-independence movement fighting Morocco over the disputed Western Sahara, is among the roots of the tensions.

Some of the leaked information touches on deeply sensitive issues in Morocco. Among the leaked documents is salary information that, if accurate, would reflect vast inequalities that continue to plague Morocco despite its strides in economic development. The trove includes unverified financial data on executives of state-owned companies, political parties, figures associated with the royal family’s holding company and charity fund, and the Israeli liaison office in Rabat.

Morocco’s National Commission for the Protection of Personal Data said on Thursday that it stood ready to investigate complaints from people targeted in the leak.

Mustapha Baitas, Morocco’s government spokesperson, linked the attack to what he said was growing support for Morocco in the conflict from the international community — something he said “disturbs the enemies of our country to the point of attempting to harm it through these hostile actions.”

U.S. Secretary of State Marco Rubio said earlier this week said he supported Morocco’s plan for the disputed territory, a statement Algeria criticized on Thursday.

During his first term in office, President Donald Trump shifted Washington’s longstanding position in 2020 to back Morocco’s sovereignty over the territory. President Joe Biden’s administration neither reversed nor openly supported the policy.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUncovering the Invisible Identities Behind AI Agents — and Securing Them
Next Article PowerSchool Hacker Admits Guilt in Student Data Extortion
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Protecting your 23andMe data against resale

June 11, 2025

Tanzania blocks access to X after it says hackers targeted government accounts

May 28, 2025

Dutch intelligence agencies say Russian hackers stole police data in cyberattack

May 28, 2025
Leave A Reply Cancel Reply

Latest Posts

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 20250 Views

WestJet Faces Cyberattack Disrupting Operations

June 14, 20250 Views

Outage Unrelated to Security: Your Data Remains Safe!

June 13, 20250 Views

Google Links Major Cloud Outage to API Management Glitch

June 13, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Top 5 Criteria for ITDR Solutions

June 16, 2025

Why Compromised Credentials Are the #1 Attack Vector in 2024

June 15, 2025

Anubis Ransomware Unleashes File-Wiping Fury

June 14, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.