DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Swedish IT Company Data Breach Exposes Personal Details of 1.5 Million Users

Posted on November 5, 2025 by Dissent

Divya reports:

Swedish authorities have launched formal investigations into a significant data breach affecting Miljödata, a prominent IT company whose security lapse exposed the personal information of over 1.5 million individuals.

The Swedish Data Protection Authority (IMY) initiated the probe following the August attack, which resulted in sensitive data being published on the Darknet and affecting multiple Swedish municipalities and regional entities that relied on Miljödata’s services.

The attack represents one of Sweden’s most substantial data exposures in recent years, compromising personal details across a large portion of the country’s population.

The Swedish Prosecution Authority confirmed that attackers successfully extracted and published data belonging to more than 1.5 million private citizens.

Since the initial attack, IMY has maintained ongoing communication with Miljödata and affected organizations, working to understand the full scope of the incident and its implications for Swedish data protection standards.

Read more at gbhackers.

DataBreach.com provides a timeline and a search tool to check if your data was caught up in the breach.

A Timeline of the Unraveling

  • August 23-24, 2025: Miljödata’s IT environment is breached in a cyberattack over the weekend. The company detects the attack on Saturday, August 23.
  • August 27, 2025: The attack is publicly disclosed, with Miljödata confirming it is working with external experts to investigate the scope.
  • September 1, 2025: Based on information from the ongoing investigation, some clients perform a controlled restart of the affected Adato system.
  • September 12, 2025: The hacker group responsible for the breach posts a threat on the darknet, warning they will publish the stolen data.
  • September 14, 2025: The threat is realized as experts confirm the vast trove of personal data has been published on the darknet, increasing the risk of fraud.
  • September 15, 2025: Swedish prosecutors confirm the scale of the leak, stating over 1.5 million individuals are affected and a preliminary investigation into gross unauthorized access and attempted extortion is underway.
  • September 16, 2025: Affected organizations like Lund University supplement their reports to authorities with new information regarding the darknet publication.
Category: Business SectorHackNon-U.S.

Post navigation

← Something Old and Something New: The False Claims Act and Cybersecurity
Hack exposes Kansas City, Kansas, Police’s secret officer misconduct list →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.