Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    TikTok’s ‘ban’ problem could end soon with a new app and a sale

    July 6, 2025

    How to watch Summer Games Done Quick 2025

    July 6, 2025

    The Verge’s summer “in” and “out” list

    July 6, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » A Spy Agency Leaked People’s Data Online—Then the Data Was Stolen
    Security

    A Spy Agency Leaked People’s Data Online—Then the Data Was Stolen

    News RoomBy News RoomNovember 30, 20232 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    The list of data is long. Names, professions, blood groups, parents’ names, phone numbers, the length of calls, vehicle registrations, passport details, fingerprint photos. But this isn’t a typical database leak, the kind that happens all the time—these categories of information are all linked to a database held by an intelligence agency.

    For months, the National Telecommunication Monitoring Center (NTMC), an intelligence body in Bangladesh that’s involved in collecting people’s cell phone and internet activity, has published people’s personal information through an unsecured database linked to its systems. And this past week, anonymous hackers attacked the exposed database, wiping details from the system and claiming to have stolen the trove of information.

    WIRED has verified a sample of real-world names, phone numbers, email addresses, locations, and exam results included in the data. However, the exact nature and purpose of the amassed information is unclear, with some entries appearing to be test information, incorrect, or partial records. The NTMC and other officials in Bangladesh have not responded to requests for comment.

    The disclosure, which appears to have been unintentional, provides a tiny glimpse into the highly secretive world of signals intelligence and how communications may be intercepted. “I wouldn’t be expecting this to happen for any intelligence service, even if it’s not really something that sensitive,” says Viktor Markopoulos, a security researcher for CloudDefense.AI who discovered the unsecured database. “Even if many data are test data, they still reveal the structure that they’re using, or what exactly it is that they are intercepting or plan to intercept.”

    After Markopoulos discovered the exposed database, he linked it back to the NTMC and login pages for a Bangladeshi national intelligence platform. Markopoulos believes the database was likely exposed due to a misconfiguration. Within the database, there are more than 120 indexes of data, with different logs stored in each. The indexes include names such as “sat-phone,” “sms,” “birth registration,” “pids_prisoners_list_search,” “driving_licence_temp,” and “Twitter.” Some of those files contain a handful of entries each, while others contain tens of thousands.

    The vast majority of the data exposed in the NTMC database is metadata—the extremely powerful “who, what, how, and when” of everyone’s communications. Phone call audio isn’t exposed, but metadata shows which numbers may have called others and how long each call lasted. This kind of metadata can be used broadly to show patterns in people’s behavior and whom they interact with.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleFresh Bitcoin Hype Shows Crypto Just Can’t Help Itself
    Next Article Activision Blizzard had a plan — or ploy — to launch its own Android game store

    Related Posts

    The Promise and Peril of Digital Security in the Age of Dictatorship

    July 5, 2025

    Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams

    July 3, 2025

    A Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right Now

    July 3, 2025

    How to Protest Safely in the Age of Surveillance

    July 3, 2025

    US Supreme Court Upholds Texas Porn ID Law

    July 3, 2025

    ICE Rolls Facial Recognition Tools Out to Officers’ Phones

    July 3, 2025
    Our Picks

    How to watch Summer Games Done Quick 2025

    July 6, 2025

    The Verge’s summer “in” and “out” list

    July 6, 2025

    GM’s Cruise Cars Are Back on the Road in Three US States—But Not for Ride-Hailing

    July 6, 2025

    Lenovo Chromebook Plus 14 review: the new king of Chromebooks

    July 6, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Gear

    How to Use Voice Typing on Your Phone

    By News RoomJuly 6, 2025

    Tap the small “i” icon on the left of the toolbar if you need more…

    How to Travel to the Most Remote Office on Earth

    July 6, 2025

    With RFK Jr. in Charge, Insurers Aren’t Saying If They’ll Cover Vaccines for Kids If Government Stops Recommending Them

    July 5, 2025

    I’m an Outdoor Writer. I’m Shopping These 55 Deals From REI’s 4th of July Sale

    July 5, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.