Hackers Sell Access to Argentine Government Communications & ID Card Data of Millions

Updated: 13 October 2021
Updated: 13 October 2021

Fact-checked by

An unknown hacker or hacker group claims to sell access to an Argentine government network linked to internal communications and technology.

The same hackers claim to posses sensitive ID card data on millions of Argentine citizens.

Seller is the same entity who a few weeks ago released the confirmed IOSFA leak that allegedly affected over 1 million Argentine military personnel.

Highlights:

  • Hackers claim to sell access to an Argentine government network linked to communications
  • Claim to have access to thousands of office computers and servers of various Argentine government agencies
  • Claim to posses ID card data of millions of Argentinians
  • Card data includes: photo, name, address, processing number, type of ID, code located on the back of the card
  • Seller is the same person or group who released the confirmed IOSFA leak

Today on a popular hacker forum an unknown hacker or hacker group claims to possess means to access a sensitive and restricted Argentine government network linked to communications and technology.

The hackers claim that they have access to thousands of office computers and servers, including virtual machines belonging to various Argentine government agencies.

Allegedly, interested buyers are able to buy access – which will be carried out through a VPN – and domain administrator network credentials with direct access to the domain controller, that will allow them to access the communications network of the Argentine government.

Argentina Government Hack

Same Seller Who Leaked IOSFA Data

The seller is the same individual or group who a few weeks ago released sensitive data on more than one million members of various Argentine military branches and police agencies.

Privacy Affairs broke the previous story on September 29. Next day, the IOSFA (Institute of Social Work of the Armed Forces) confirmed that the database leak did indeed take place, however added that the data was outdated.

In both of these instances the alleged seller was the exact same forum poster, raising the strong possibility that this new breach may also be legitimate.

Also Sells Sensitive ID Card Data

The same seller involved in the above mentioned two leaks currently also has a third forum thread claiming to posses and sell personal data on nearly all Argentine citizens.

The forum post claims that buyers will be able to get ID card data on nearly every Argentine citizen on request. The seller intends to sell these on an individual basis.

The hacker claims that they have data on several million Argentine citizens.

The data allegedly includes information such as photo, names, surnames, addresses, processing number, type of ID, code located on the back of the card (three lines barcode) calculated by an algorithm.

Argentina ID Card Data Hack

The hackers claim that the processing number and the code located on the back of the card will allow criminals to create authentic looking fake ID cards.

It is unclear if this data leak is real – but we again want to point out that this is the same seller as the one who earlier leaked the officially confirmed IOSFA leak.

If real, the hackers may appear to be a sophisticated threat actor who managed to somehow penetrate the IT infrastructure of the Argentine government.

We will update this story as more details emerge.

Argentina Government Hack

Written by: Miklos Zoltan

Connect with the author:

Founder & CEO Privacy Affairs

Miklos Zoltan is the founder and CEO of Privacy Affairs. Miklos has long-time experience in cybersecurity and data privacy having worked with international teams for more than 10 years in projects involving penetration testing, network security and cryptography.

Miklos founded Privacy Affairs in 2018 to provide cybersecurity and data privacy education to regular audiences by translating tech-heavy and "geeky" topics into easy-to-understand guides and tutorials.

Leave a Reply

Your email address will not be published.