After a hacktivist group leaked 2.3TB of data online, the information of over a quarter (28%) of Mexico's population may be at risk This article explores mexico cybersecurity agency. . However, the country's cybersecurity and digital technology agency, the Agencia de Transformación Digital y Telecomunicaciones (ATDT), downplayed the significance of any potential compromise.

Names, phone numbers, addresses, dates of birth, and evidence of enrollment in Mexico's public universal healthcare system, Instituto Mexicano del Seguro Social (IMSS) Bienestar, were among the documents and data that a hacking collective known as the Chronus Group allegedly posted on January 30 from at least 25 different Mexican government institutions.

However, the ATDT disputed the description of the data, emphasizing that their analysis showed that the information is a collection of data from earlier breaches rather than a new breach. "No publication of sensitive data has been identified," the agency replied (translated). Mexican citizens might have been significantly impacted by the initial breach claims if the data had been sensitive and up-to-date, but according to ATDT, no information deemed critical has been confirmed to have been published thus far.

Related: Japanese Companies Experience Prolonged Ransomware Damage ## Overpromised, Underdelivered According to the Recorded Future analyst, such strategies are typical of hacktivist groups banding together for an Op.

He claims that "threat actors and hacktivist groups will kind of bundle [breaches] all together [and are] very quick to move and announce that they've done something." "They clearly want to improve their brand and capabilities, but as time goes on, you start to wonder if it's really that sensitive." According to Gutiérrez, the ATDT, Mexico's top cybersecurity agency for defending government agencies, seems to have revoked compromised access credentials and offered incident response and remediation to the potentially compromised government agencies.

He claims that while these actions are in line with an initial stage of incident management, they might not be sufficient to address the government's more serious cybersecurity issues.