Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    AirPods Pro 3 review: tripling down on a good thing

    September 15, 2025

    The New Math of Quantum Cryptography

    September 15, 2025

    Charlie Kirk Was Shot and Killed in a Post-Content-Moderation World

    September 15, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » A Spy Agency Leaked People’s Data Online—Then the Data Was Stolen
    Security

    A Spy Agency Leaked People’s Data Online—Then the Data Was Stolen

    News RoomBy News RoomNovember 30, 20232 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    The list of data is long. Names, professions, blood groups, parents’ names, phone numbers, the length of calls, vehicle registrations, passport details, fingerprint photos. But this isn’t a typical database leak, the kind that happens all the time—these categories of information are all linked to a database held by an intelligence agency.

    For months, the National Telecommunication Monitoring Center (NTMC), an intelligence body in Bangladesh that’s involved in collecting people’s cell phone and internet activity, has published people’s personal information through an unsecured database linked to its systems. And this past week, anonymous hackers attacked the exposed database, wiping details from the system and claiming to have stolen the trove of information.

    WIRED has verified a sample of real-world names, phone numbers, email addresses, locations, and exam results included in the data. However, the exact nature and purpose of the amassed information is unclear, with some entries appearing to be test information, incorrect, or partial records. The NTMC and other officials in Bangladesh have not responded to requests for comment.

    The disclosure, which appears to have been unintentional, provides a tiny glimpse into the highly secretive world of signals intelligence and how communications may be intercepted. “I wouldn’t be expecting this to happen for any intelligence service, even if it’s not really something that sensitive,” says Viktor Markopoulos, a security researcher for CloudDefense.AI who discovered the unsecured database. “Even if many data are test data, they still reveal the structure that they’re using, or what exactly it is that they are intercepting or plan to intercept.”

    After Markopoulos discovered the exposed database, he linked it back to the NTMC and login pages for a Bangladeshi national intelligence platform. Markopoulos believes the database was likely exposed due to a misconfiguration. Within the database, there are more than 120 indexes of data, with different logs stored in each. The indexes include names such as “sat-phone,” “sms,” “birth registration,” “pids_prisoners_list_search,” “driving_licence_temp,” and “Twitter.” Some of those files contain a handful of entries each, while others contain tens of thousands.

    The vast majority of the data exposed in the NTMC database is metadata—the extremely powerful “who, what, how, and when” of everyone’s communications. Phone call audio isn’t exposed, but metadata shows which numbers may have called others and how long each call lasted. This kind of metadata can be used broadly to show patterns in people’s behavior and whom they interact with.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleFresh Bitcoin Hype Shows Crypto Just Can’t Help Itself
    Next Article Activision Blizzard had a plan — or ploy — to launch its own Android game store

    Related Posts

    Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

    September 13, 2025

    Defense Department Scrambles to Pretend It’s Called the War Department

    September 12, 2025

    US Investment in Spyware Is Skyrocketing

    September 11, 2025

    Cindy Cohn Is Leaving the EFF, but Not the Fight for Digital Rights

    September 11, 2025

    Massive Leak Shows How a Chinese Company Is Exporting the Great Firewall to the World

    September 10, 2025

    ICE Has Spyware Now

    September 9, 2025
    Our Picks

    The New Math of Quantum Cryptography

    September 15, 2025

    Charlie Kirk Was Shot and Killed in a Post-Content-Moderation World

    September 15, 2025

    ‘People Are So Proud of This’: How River and Lake Water Is Cooling Buildings

    September 15, 2025

    Microsoft is changing how Xbox controllers work on Windows 11

    September 15, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Science

    Researchers Create 3D-Printed Artificial Skin That Allows Blood Circulation

    By News RoomSeptember 15, 2025

    When treating severe burns and trauma, skin regeneration can be a matter of life or…

    Apple’s new iPhone charger is a first of its kind

    September 15, 2025

    The SSD version of LaCie’s iconic Rugged drive gets a speed boost

    September 15, 2025

    What’s next for Apple after the iPhone 17?

    September 14, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.