DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Revealed: Afghan data breach after MoD official left laptop open on train

Posted on October 30, 2025 by Dissent

Holly Bancroft reports:

A Ministry of Defence official revealed confidential information by leaving a laptop open on a train in another Afghan data breach, The Independent can reveal, as new documents reveal a string of government blunders which have put confidential information into the wrong hands.

An officially sensitive personal email relating to Afghans seeking safety in Britain was also accidentally sent to the Civil Service Sports & Social Club – a group for all civil service and public sector employees that has 140,000 members – in August 2023, records show.

The new details come after a catastrophic MoD data breach that potentially put thousands of Afghans who helped UK forces at risk from the Taliban. The major breach, which was discovered in August 2023 and led to thousands of Afghans being secretly relocated to the UK, only came to light earlier this year when The Independent and other media organisations fought to lift an unprecedented gagging order which had been put in place to cover it up.

Read more at The Independent.


Related:

  • MoD fined £350k over data breach that endangered lives of Afghan interpreters
  • Conservatives call for investigation into government data breaches that may have put Afghans in danger
  • Afghanistan: Investigation launched into interpreter data breach
  • Ministry of Defence data breach timeline
Category: ExposureGovernment SectorNon-U.S.

Post navigation

← Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
Legal Aid Agency chief admits difficulties understanding impact of cyberattack →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Fourth Circuit Weighs in on Standing in Data Breach Class Actions
  • ALT5 Sigma sues former consultant over alleged data breach
  • Is your cyberinsurance paid up? Are you sure?
  • Everest Group Interview on Collins Aerospace Breach — Daily Dark Web
  • Breaking Up With Edtech Is Hard to Do
  • Benworth Capital Partners negotiated with threat actors after more than 25,000 lenders had data stolen
  • Android Hit by 0-Click RCE Vulnerability in Core System Component
  • Attorney General James and Multistate Coalition Secure $5.1 Million from Illuminate Education For Failing to Protect Students’ Data
  • The Congressional Budget Office was hacked. It says it has implemented new security measures.
  • Clop Ransomware group claims the breach of The Washington Post

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Modern cars are spying on you. Here’s what you can do about it.
  • Attorney General James and Multistate Coalition Secure $5.1 Million from Education Software Company for Failing to Protect Students’ Data       
  • EU Parliament committee votes to advance controversial Europol data sharing proposal
  • DHS offers “disturbing new excuses” to seize kids’ biometric data, expert says
  • California Adds Injunctive Relief to its Right of Publicity Statute and Extends Liability to Digital Replicas

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.