DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

El Salvador PNC confirms investigation of FocaLeaks

Posted on September 26, 2021 by Dissent

David Bernal recently had an update on the FocaLeaks incident previously covered by this site and DDoSecrets.

On September 22, Bernal reported that Mauricio Arriaza Chicas, director of the National Civil Police (PNC), confirmed that they were conducting an internal investigation into FocaLeaks and a second with the Attorney General’s Office to find the perpetrators.

Of note (to this site, anyway), Chicas reportedly claimed that it was an old database.

DataBreaches.net has no idea what Chicas means by “old,” but the unredacted data sample this site sent to PNC and their National Security Advisor as part of our original inquiry to them had been last updated in January, 2021. Does that make the database “old?” What if the data in the database last updated in January still worked?

According to DataBreaches.net’s sources — a spokesperson for FocaLeaks and one of those actively involved in the hacking — the logins that they exfiltrated were working within a few days prior to publication of the leak.  That second individual, who is not a native English speaker, explained (the following is unedited):

the file login imei , it was overturned in January. do not update it, because it already had the logins.
, the data of the agents if they are recent , That file of the agents was obtained the day they made the illegal arrest of Mario Gomez

So it seems that they are saying that the agents’ data file was current as of the day PNC arrested Mario Gomez on September 1. And there was no need to update the second file as it already contained immutable IMEI numbers and the pins reportedly hadn’t been changed.

DataBreaches.net asked the second individual a few more questions to be sure what they were claiming.  At one point in the exchange, this site asked, “Until the PNC took the domain down a few weeks ago, you knew for a fact that those logins still worked and PNC hadn’t done anything to change any security?”  They answered:

That’s right, they didn’t even know we had it, the policemen here don’t know much about computer science, if you see the requests they don’t have any kind of token in their requests.

As DataBreaches.net reported previously, this site reached out to PNC and El Salvador’s National Security Advisor.  They logged our press inquiry as a “complaint” and issued a complaint number, but we have received no update about any investigation or findings. In light of their statement to El Salvador news media about an “internal investigation,” however, DataBreaches.net has reached out to them again to ask whether this meant that they were looking into whether this was an insider breach.  DataBreaches.net suspects that they just meant that PNC is conducting its own investigation while the prosecutor’s office conducts theirs, but we’ll see.

 

 


Related:

  • How a hacking gang held Italy’s political elites to ransom
  • Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Iran's Critical Infrastructure
  • On Reports of an Alleged Data Breach Involving G-Xchange, Inc. (GCash)
  • NY: Gloversville hit by ransomware attack, paid ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
Category: Breach IncidentsGovernment SectorHackNon-U.S.

Post navigation

← Declaration by the High Representative on behalf of the European Union on respect for the EU’s democratic processes
Desorden Group claims to have stolen 200 GB of data from ABX Express →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Des Moines Man Charged with Computer Fraud
  • CrowdStrike catches insider feeding information to ScatteredLapsus$Hunters
  • Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack
  • Attleboro investigating ‘cybersecurity incident’ impacting city’s IT systems
  • Fired techie admits sabotaging ex-employer, causing $862K in damage
  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Cole v. Quest Diagnostics: The Third Circuit Weighs in on Pixels, Privacy, and Medical Data
  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.