After a hacktivist group leaked 2.3TB of data online, the information of over a quarter (28%) of Mexico's population may be at risk This article explores data identified mexican. . However, the country's cybersecurity and digital technology agency, the Agencia de Transformación Digital y Telecomunicaciones (ATDT), downplayed the significance of any potential compromise.
Names, phone numbers, addresses, dates of birth, and proof of registration in Mexico's public universal healthcare system, Instituto Mexicano del Seguro Social (IMSS) Bienestar, were among the documents and data that were purportedly posted by a hacker collective known as the Chronus Group on January 30 from at least 25 different government institutions in Mexico.
However, the ATDT disputed the description of the data, emphasizing that their analysis showed that the information is a collection of data from earlier breaches rather than a new breach. The agency's response (translated) said, "No publication of sensitive data has been identified." Mexican citizens might have been significantly impacted by the initial breach claims if the data had been sensitive and up-to-date, but according to ATDT, no information deemed critical has been confirmed to have been published thus far.
Related: Long-Term Ransomware Damage Affects Japanese Businesses ## Over-Promised, Under-Delivered According to the Recorded Future analyst, such strategies are typical of hacktivist groups banding together for an Op.
He claims that "threat actors and hacktivist groups will kind of bundle [breaches] all together [and are] very quick to move and announce that they've done something." "They clearly want to improve their brand and capabilities, but as time goes on, you start to wonder if it's really that sensitive." According to Gutiérrez, the ATDT appears to have revoked compromised access credentials and offered incident response and remediation to the government agencies that may have been compromised.
The ATDT is Mexico's primary cybersecurity agency for defense of government organizations. He claims that while these steps are in line with an initial stage of incident management, they may not be sufficient to address the government's more serious cybersecurity issues.












.webp%3Fw%3D1068%26resize%3D1068%2C0%26ssl%3D1&w=3840&q=75)