Qatar National Bank 1.4GB Data Leak Exposes 465K Accounts

Apr 2016 · 465K accounts

By Karim El Labban · ZERO|TOLERANCE

In April 2016, a massive data leak from Qatar National Bank-the largest financial institution

in the Middle East and Africa-exposed approximately 15,460 files totaling 1.4 gigabytes.

The data encompassed roughly 465,000 accounts, including bank account numbers, credit card numbers

with CVVs and PINs, passwords, and Qatari national ID numbers. Records were linked to members of

the Al-Thani ruling family, Al Jazeera journalists, Defence Ministry personnel, and officers of

Qatar’s Mukhabarat intelligence service.

A Turkish hacking group known as Bozkurtlar (Grey Wolves) claimed credit for the breach, which

was suspected to have been executed via SQL injection against QNB’s backend systems. The

leaked files were initially posted to a global file-sharing platform and rapidly disseminated

across social media and dark web channels.

## Key Facts

  • .**What:** Turkish hackers breached Qatar National Bank via suspected SQL injection attack.
  • .**Who:** 465,000 account holders including royal family, intelligence officers, and journalists.
  • .**Data Exposed:** Card numbers with PINs and CVVs, passwords, national IDs, and financial records.
  • .**Outcome:** 1.4GB of data leaked publicly; massive card reissuance and national security crisis.

## What Was Exposed

  • .Bank account numbers, sort codes, and IBAN details for approximately 465,000 individual

and corporate accounts across QNB’s retail and private banking divisions

  • .Credit and debit card numbers with associated CVV security codes and PIN numbers,

enabling direct financial fraud

  • .Online banking passwords stored in what appeared to be plaintext or weakly encrypted

formats within internal systems

  • .Qatari national identification numbers (QIDs) linked to account holder profiles,

creating a comprehensive identity theft vector

  • .Full names, addresses, phone numbers, dates of birth, and employment details for

account holders across multiple customer segments

  • .Transaction histories and account balance information revealing the financial profiles

of high-net-worth individuals and government officials

  • .Internal banking documents organized into clearly labeled directories by customer

category, including folders specifically marked for royal family members, media

organizations, and government ministries

The organizational structure of the leaked data was deeply alarming. Files were sorted into

directories labeled “Al Jazeera,” “Defence,” “Intelligence,”

and “Royal Family,” among others. This categorization suggested either that QNB

internally segmented its high-profile clients in this manner or that the attackers had spent

considerable time organizing the exfiltrated data for maximum impact. Either way, the result

was a curated exposure of Qatar’s most sensitive political, military, and intelligence

figures.

The inclusion of PIN numbers and CVVs alongside card numbers represented an immediate

financial threat. Unlike breaches that expose only card numbers-which can be mitigated

through issuer-side fraud detection-the combination of full card details with PINs

enabled ATM withdrawals and point-of-sale fraud that could bypass standard chip-and-PIN

verification. QNB was forced to undertake a massive card reissuance program affecting

hundreds of thousands of customers.

Perhaps most damaging was the exposure of intelligence personnel records. The identification

of Mukhabarat officers by name, national ID, financial activity, and address effectively

burned the cover of active intelligence operatives. For a country navigating the complex

geopolitics of the Gulf region, this represented a national security compromise of the

highest order. The financial records of Defence Ministry officials similarly provided

adversarial intelligence services with a detailed map of Qatar’s military

establishment’s personal circumstances.

The suspected attack vector-SQL injection-is among the most well-understood

and preventable classes of web application vulnerabilities. SQL injection has appeared

on the OWASP Top 10 list continuously since its inception. For the largest bank in the

Middle East to be compromised through a vulnerability class that has been thoroughly

documented and mitigated since the early 2000s indicated fundamental failures in

application security testing, code review processes, and web application firewall

deployment.

## Regulatory Analysis

The QNB breach occurred in April 2016, predating Qatar’s Law No. 13 of 2016

on Personal Data Privacy Protection, which was promulgated in November of the same year.

At the time of the breach, Qatar had no comprehensive data protection legislation, and

the regulatory response was limited to Qatar Central Bank supervisory measures and

general cybercrime provisions under Law No. 14 of 2014 (the Cybercrime Prevention Law).

Had this breach occurred under the current legal framework, the consequences would be

substantially different. Law No. 13 of 2016 establishes obligations that directly apply

to financial institutions processing personal data. Article 3 requires that personal data

be processed fairly, lawfully, and for specified purposes. The storage of PINs and

passwords in recoverable formats would constitute a violation of the data security

requirements that underpin lawful processing. Article 7 mandates appropriate technical

measures to protect personal data against unauthorized access, and the successful

exfiltration of 1.4GB of customer records through an SQL injection attack would represent

a clear failure to meet this standard.

Article 10 of Law No. 13 governs the transfer of personal data and would be relevant

to the extent that QNB’s systems were accessible from or data was stored in

jurisdictions outside Qatar. Article 12 provides for penalties including imprisonment

of up to three years and fines of up to QAR 1 million for violations of the law’s

provisions. While these penalties are modest compared to international standards, they

represented Qatar’s first legislative framework for holding organizations

accountable for data protection failures.

Under the QFC Data Protection Regulations 2021, which now govern entities licensed

within the Qatar Financial Centre, the penalties would be far more severe. The QFC

Authority can impose fines of up to $25 million for serious data protection violations.

Articles 8 and 9 of the QFC DPR establish requirements for data protection by design

and by default, and Article 29 mandates breach notification to the QFC Authority within

72 hours. A breach of this magnitude involving a systemically important financial

institution would likely trigger the maximum enforcement response.

The Qatar Central Bank, as the prudential regulator of QNB, would also impose

supervisory consequences. QCB Circular No. 4/2015 on Information Security established

minimum security requirements for banks operating in Qatar, and the QNB breach exposed

failures across multiple control areas including application security, access management,

data encryption, and incident response. The reputational damage to Qatar’s

financial sector-at a time when Doha was positioning itself as a regional

financial hub-extended far beyond the direct impact on QNB alone.

## What Should Have Been Done

The QNB breach is a case study in how basic application security failures can cascade

into a national security crisis. The first and most fundamental control that should

have been in place was parameterized queries and prepared statements across all

database-facing applications. SQL injection is not an exotic attack-it is a

well-understood vulnerability with well-established defenses. Every application

interacting with QNB’s customer database should have been developed using

parameterized queries, subjected to static application security testing (SAST)

during development, and validated through dynamic application security testing (DAST)

and penetration testing before deployment.

A web application firewall (WAF) should have been deployed in front of all

internet-facing applications, configured to detect and block SQL injection patterns.

While a WAF is not a substitute for secure coding practices, it provides a critical

defense-in-depth layer that would have detected the malicious queries characteristic

of SQL injection exploitation. The absence of effective WAF protection on a banking

application handling hundreds of thousands of customer records is a significant

security architecture failure.

Credential storage practices required immediate remediation. PINs and passwords

should never be stored in recoverable formats. PINs should be stored as

hardware-security-module-protected cryptographic values that can be verified but

never retrieved. Online banking passwords should be stored using bcrypt, scrypt, or

Argon2 hashing algorithms with per-user salts. The ability of attackers to extract

plaintext or near-plaintext credentials from QNB’s systems indicates

fundamental failures in cryptographic implementation.

Data segmentation and access controls should have ensured that no single database

query or system compromise could yield access to the full breadth of data that was

exfiltrated. Customer account details, card data, authentication credentials, and

internal organizational documents should have resided in separate systems with

independent access controls. The PCI DSS framework, which QNB was presumably

required to comply with as a card-issuing institution, mandates precisely this

kind of segmentation for cardholder data environments.

Finally, QNB should have implemented comprehensive data loss prevention (DLP)

controls to detect and prevent the exfiltration of 1.4GB of structured customer

data. Egress monitoring, database activity monitoring, and anomaly detection

systems should have flagged the systematic extraction of customer records across

multiple categories. The fact that 15,460 files were exfiltrated without triggering

an alert indicates an absence of meaningful monitoring at the database and network

layers.

The QNB breach remains the most significant financial data exposure in Gulf history.

The combination of card numbers with PINs, national IDs, and intelligence personnel

records created a multidimensional crisis spanning financial fraud, identity theft,

and national security. Had Qatar’s current data protection framework been in

place, QNB would face penalties from multiple regulators-but more importantly,

the security standards mandated by that framework might have prevented the breach

entirely.

RELATED ANALYSIS

Cisco Systems: ShinyHunters Claim 3M Salesforce Records, 300+ GitHub Repos, and AWS Data in Triple-Vector Extortion
Mar 31, 2026 · 3M+ records claimed · 300+ repos · April 3 deadline
Oracle's Dual Breach: 6M Cloud SSO Records Stolen, 80 Hospitals Compromised - and a Denial That Collapsed Under Evidence
Mar 21, 2025 · 6M records · 140K tenants · 80 hospitals
TriZetto/Cognizant: 3.4M Patient Records Stolen in 11-Month Healthcare Supply Chain Breach
Feb 6, 2026 · 3.4M patients · 11-month dwell · ~24 lawsuits
Infinite Campus: ShinyHunters Breach K-12 Platform Serving 11M Students via 10-Minute Vishing Attack
Mar 18, 2026 · 11M students · 3,200+ districts · 46 states
Crunchyroll: 6.8M Users Exposed After Infostealer Malware Compromises TELUS Support Agent's Okta Credentials
Mar 12, 2026 · 6.8M users · 100GB stolen · $5M ransom
MORE DATA BREACHES →