Dramatic illustration of a darknet leak of Swedish government IT data by hackers, showing computer screens with source code, passwords, and personal files.
Dramatic illustration of a darknet leak of Swedish government IT data by hackers, showing computer screens with source code, passwords, and personal files.
Immagine generata dall'IA

Swedish government IT data leaked on darknet

Immagine generata dall'IA

A hacker group called ByteToBreach has leaked sensitive information from a government IT system on the darknet. The leak includes source code, passwords, and personal data from a platform managed by IT consultant CGI Sweden. Authorities like Cert-SE confirm they are aware of the reports but decline to comment.

On the evening of Thursday, March 12, 2026, large amounts of sensitive information were posted on the darknet, according to reports from Dagens Nyheter, Expressen, and SVT Nyheter. The data stems from a breach at IT consultant CGI Sweden, which manages critical digital services for Swedish authorities. The hacker group ByteToBreach claims responsibility, stating they exploited flaws in the digital infrastructure.

The leaked material includes the full source code for Sweden's e-government platform, email passwords, personnel data, configurations for an e-signature portal, and a representatives' register. The platform is used for digital identity management, including BankID logins for agencies like Skatteverket. The group has made the source code available for free download, while databases containing personal data on Swedish citizens and electronic signing documents are sold separately.

The leak was reported by the site Darkwebinformer and the cybersecurity account International Cyber Digest. Cyber Digest describes it as ”a serious exposure of the trust anchors and identity solutions that power Sweden's digital state.” ByteToBreach is also suspected in a prior breach at Viking Line, where passenger data was leaked.

Cert-SE, tasked with preventing IT security incidents under MSB, confirms: ”We are aware of the reports but cannot comment at this time.” DN has reviewed the alleged leak and published details on how the breach was carried out on a cybercriminal forum. CGI Sweden has been sought for comment.

Cosa dice la gente

Cybersecurity accounts on X are sharing alerts and analyses of the ByteToBreach leak of Swedish e-government source code, passwords, PII, and configs from CGI Sweden's infrastructure. Reactions highlight supply chain risks, exposed vulnerabilities like RCE PoCs, and concerns over government vendor security practices.

Articoli correlati

Illustration of ANCI-confirmed cyber infiltration in Chilean public agency due to stolen credentials, featuring hacker screens and government imagery.
Immagine generata dall'IA

ANCI confirms infiltration in public agency due to stolen credentials

Riportato dall'IA Immagine generata dall'IA

Chile's Agencia Nacional de Ciberseguridad (ANCI) detected an infiltration in a public agency after a staff member's login credentials were stolen. Security Minister Trinidad Steinert described the alert as delicate and deferred the investigation to ANCI. The issue was resolved by closing accesses, though most circulating data stems from prior leaks.

Gym chain Sats has confirmed a data breach affecting employees and members after a mid-March cyberattack. Sensitive HR data and member information have surfaced on the darknet, according to IT expert Karl Emil Nikka. The company is still investigating the full scope.

Riportato dall'IA

Gagnef municipality has used the same general password for officials and politicians for several years, recently leading to a security incident. The issue involves the Netpublicator service. The municipality is now tightening security.

The European Commission has disclosed a cyber attack that affected its cloud infrastructure hosting the Europa.eu websites. Officials stated that data was taken from the sites, and the incident has been contained while investigations continue. Bleeping Computer reported that hackers accessed over 350GB of data, including employee information.

Riportato dall'IA

Colombian banks face a potential indirect cyberattack via an external debt collection provider, compromising customer data such as names, IDs and phone numbers. BBVA and Nu Colombia confirmed the incident and activated security protocols. No entity reports access to keys or deposits.

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta