DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Yemen Cyber Army dumps visa data from Saudi Ministry of Foreign Affairs

Posted on May 29, 2015 by Dissent

The Yemen Cyber Army (YCA) has released more data from its hack of the Saudi Ministry of Foreign Affairs (previous coverage here and here).  Media sources reported after the first disclosure that Riyadh confirmed the internal Internet network attack but disputed the extent of the hack. At this rate, their protestations might want to be walked back a bit.

In a new data dump and paste yesterday, YCA writes:

DATA Mirror – 1,000,000 Records Of Saudi VISA Database
We Will Publish 1M Record Every Weekend To Stopping Saudi Attacks
Also We Sent 400K(30G) Private Saudi MOFA Documents to wikileaks.org For Backup

In yesterday’s paste, they provided 10 records from a database with extensive information including numerous fields:

ROM [MOFA_VISA].[dbo].[TBL_VISA_person]

VDM_ID  vdm_visa_visakind       VDM_EMBASSY_CODE        VDM_VISA_NUMBER VDM_VISA_ISSUE_DATE     VDM_VISA_JOB_OR_RELATION        VDM_SPONSER_NAME        VDM_SPONSER_NUMBER      VDM_SPONSER_ADDRESS     VDM_SPONSER_PHONE_NUMBER        VDM_ENTERED     VDM_VERIFIED    VDM_PRINTED     VDM_PERSON_NAME VDM_EMBASSY_VISA_NUMBER VDM_EMBASSY_VISA_DATE   VDM_NAME_OF_SERVICE_COMPANY     VDM_BORDER_NO   VDM_VISA_JOB_CODE       VDM_BL_FLAG     VDM_INTERVAL    VDM_NATIONALITY VDM_APP_NO      COMPANY_ENTER_APP       Moatmr_Iqama_Period     Omra_Foreign_Company    VDM_HAJJ_ADMIN  VDP_PERSON_NAME_ARABIC_FIRST    VDP_PERSON_NAME_ARABIC_FATHER   VDP_PERSON_NAME_ARABIC_GRAND    VDP_PERSON_NAME_ARABIC_FAMILY   VDP_PERSON_NAME_ENGLISH_FIRST   VDP_PERSON_NAME_ENGLISH_FATHER  VDP_PERSON_NAME_ENGLISH_GRAND   VDP_PERSON_NAME_ENGLISH_FAMILY  VDP_PERSON_BIRTH_PLACE  VDP_PERSON_BIRTH_DATE   VDP_PERSON_SEX  VDP_PERSON_SOCIAL_STATUS        VDP_PERSON_RELIGION     VDP_PASSPORT_NUMBER     VDP_PASSPORT_ISSUE_DATE VDP_PASSPORT_ISSUE_PLACE        VDP_PASSPORT_EXPIRY_DATE        VDP_PASSPORT_TYPE       VDP_MAHRAM_NAME VDP_MAHRAM_RELATION     VDP_ARAB48      VDE_KSA_ENTRY_POINT     VDE_VALIDITY_RESIDENCY_IN_KSA   VDE_VALIDITY_BEFORE_FLIGHT      VDE_VALIDITY_NUMBER_OF_ENTRIES  VDE_VALIDITY_COMING_THROUGH     VDE_NAME_OF_SERVICE_COMPANY     VDE_EMBASSY_ORDER_NUMBER        VDE_EMBASSY_ORDER_DATE  VDe_car_number  vde_prpose      vde_sau_c       VDE_HMLA_NAME   vdp_person_address_home job_rec_number  visa_print_date visa_Receipt_date       visa_senddatae  vuserid vdm_deleted     vdm_print_file  VDM_VISA_STATE  PERSON_ID       VDM_OWNER       hjid    VisaControlTransFG      Arc_fg!
Consistent with this site’s policy of not linking to databases exposing individuals’ personal information, I’m not linking to the actual databases. If anyone (hint, hint, LEE!) analyzes the data, though, I’ll update this post.
DataBreaches.net would still like to know if the hackers carried through on their threat the Saudi databases would self-delete last week.  Does anyone know whether that actually happened? And if it did, where is the proof?

Related:

  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • China Amends Cybersecurity Law and Incident Reporting Regime to Address AI and Infrastructure Risks
  • Alan Turing institute launches new mission to protect UK from cyber-attacks
  • Safaricom-Backed M-TIBA Victim of a Possible Data Breach Affecting Millions of Kenyans
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
Category: Breach IncidentsExposureGovernment SectorHackNon-U.S.Of Note

Post navigation

← Jersey City Medical Center employee gaffe exposed patients’ PHI in e-mail attachment
Buffalo Heart Group discovers insider wrongdoing involving patient information →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.