Dramatic illustration of a darknet leak of Swedish government IT data by hackers, showing computer screens with source code, passwords, and personal files.
Dramatic illustration of a darknet leak of Swedish government IT data by hackers, showing computer screens with source code, passwords, and personal files.
Image générée par IA

Swedish government IT data leaked on darknet

Image générée par IA

A hacker group called ByteToBreach has leaked sensitive information from a government IT system on the darknet. The leak includes source code, passwords, and personal data from a platform managed by IT consultant CGI Sweden. Authorities like Cert-SE confirm they are aware of the reports but decline to comment.

On the evening of Thursday, March 12, 2026, large amounts of sensitive information were posted on the darknet, according to reports from Dagens Nyheter, Expressen, and SVT Nyheter. The data stems from a breach at IT consultant CGI Sweden, which manages critical digital services for Swedish authorities. The hacker group ByteToBreach claims responsibility, stating they exploited flaws in the digital infrastructure.

The leaked material includes the full source code for Sweden's e-government platform, email passwords, personnel data, configurations for an e-signature portal, and a representatives' register. The platform is used for digital identity management, including BankID logins for agencies like Skatteverket. The group has made the source code available for free download, while databases containing personal data on Swedish citizens and electronic signing documents are sold separately.

The leak was reported by the site Darkwebinformer and the cybersecurity account International Cyber Digest. Cyber Digest describes it as ”a serious exposure of the trust anchors and identity solutions that power Sweden's digital state.” ByteToBreach is also suspected in a prior breach at Viking Line, where passenger data was leaked.

Cert-SE, tasked with preventing IT security incidents under MSB, confirms: ”We are aware of the reports but cannot comment at this time.” DN has reviewed the alleged leak and published details on how the breach was carried out on a cybercriminal forum. CGI Sweden has been sought for comment.

Ce que les gens disent

Cybersecurity accounts on X are sharing alerts and analyses of the ByteToBreach leak of Swedish e-government source code, passwords, PII, and configs from CGI Sweden's infrastructure. Reactions highlight supply chain risks, exposed vulnerabilities like RCE PoCs, and concerns over government vendor security practices.

Articles connexes

Illustration of ANCI-confirmed cyber infiltration in Chilean public agency due to stolen credentials, featuring hacker screens and government imagery.
Image générée par IA

L'ANCI confirme une infiltration dans une agence publique en raison d'identifiants volés

Rapporté par l'IA Image générée par IA

L'Agencia Nacional de Ciberseguridad (ANCI) du Chili a détecté une infiltration au sein d'une agence publique après le vol des identifiants de connexion d'un membre du personnel. La ministre de la Sécurité, Trinidad Steinert, a qualifié l'alerte de délicate et a confié l'enquête à l'ANCI. Le problème a été résolu par la fermeture des accès, bien que la majeure partie des données circulant provienne de fuites antérieures.

Gym chain Sats has confirmed a data breach affecting employees and members after a mid-March cyberattack. Sensitive HR data and member information have surfaced on the darknet, according to IT expert Karl Emil Nikka. The company is still investigating the full scope.

Rapporté par l'IA

Gagnef municipality has used the same general password for officials and politicians for several years, recently leading to a security incident. The issue involves the Netpublicator service. The municipality is now tightening security.

La Commission européenne a révélé une cyberattaque ayant affecté son infrastructure cloud hébergeant les sites web Europa.eu. Les responsables ont déclaré que des données ont été extraites des sites et que l'incident a été contenu pendant que les enquêtes se poursuivent. Bleeping Computer a rapporté que des pirates ont accédé à plus de 350 Go de données, incluant des informations sur des employés.

Rapporté par l'IA

Des banques colombiennes sont confrontées à une potentielle cyberattaque indirecte via un prestataire externe de recouvrement de créances, compromettant les données clients telles que les noms, les numéros d'identification et les numéros de téléphone. BBVA et Nu Colombia ont confirmé l'incident et activé les protocoles de sécurité. Aucune entité ne fait état d'un accès à des mots de passe ou à des dépôts.

Ce site utilise des cookies

Nous utilisons des cookies pour l'analyse afin d'améliorer notre site. Lisez notre politique de confidentialité pour plus d'informations.
Refuser