Saudi Intelligence Agency 11GB Classified Data Leak

Mar 1, 2025 · Intelligence sector

CRITICAL

By Karim El Labban · ZERO|TOLERANCE

Saudi Intelligence Agency: 11GB Classified Data Leak

In March 2025, approximately 11 gigabytes of data attributed to Saudi Arabia's General Intelligence Presidency (GIP) surfaced on dark web platforms and encrypted messaging channels.

The leaked material reportedly included classified operational intelligence, internal personnel records, and sensitive documents relating to the Kingdom's security apparatus. This breach represents one of the most significant intelligence data exposures in the Middle East.

01

KEY FACTS

  • .What: 11GB of classified data from Saudi intelligence agency leaked online.
  • .Who: Saudi General Intelligence Presidency (GIP) personnel and operations.
  • .Data Exposed: Classified documents, personnel records, and internal communications.
  • .Outcome: National security crisis; potential criminal penalties up to SAR 5M.
02

WHAT HAPPENED

In March 2025, threat intelligence firms identified approximately 11 gigabytes of data attributed to Saudi Arabia's General Intelligence Presidency appearing simultaneously across multiple distribution channels.

The material surfaced on established dark web forums, encrypted Telegram channels associated with hacktivist and state-aligned groups, and file-sharing platforms.

The simultaneous multi-platform distribution was deliberate and coordinated - not the hallmark of opportunistic cybercrime but of an operation designed for maximum exposure and permanence.

The leaked dataset included classified operational intelligence documents bearing Saudi classification markings, personnel records identifying GIP staff by name, identification number, role, and organizational assignment, as well as internal communications between GIP divisions and other government entities.

Operational planning documents, strategic intelligence assessments, and technical infrastructure details relating to the agency's communications systems were also included. Financial records revealing budget allocations and procurement documentation completed the exposure.

The breadth of the material indicates access to core GIP information systems rather than a peripheral compromise.

The distribution pattern is consistent with two scenarios: a state-sponsored intelligence operation conducted by a rival nation-state seeking to damage Saudi intelligence capabilities and expose personnel, or a sophisticated hacktivist campaign with geopolitical motivations leveraging insider access.

The absence of a ransom demand or financial motive distinguishes this from conventional cybercrime. No threat actor has claimed responsibility with verified evidence.

The Saudi government has not publicly acknowledged the leak or disclosed the attack vector, making definitive attribution impossible at this time.

03

WHAT WAS EXPOSED

  • .Classified operational intelligence documents, including reports marked with various Saudi classification levels
  • .Personnel records of GIP staff, including names, identification numbers, roles, and organizational assignments
  • .Internal communications and correspondence between GIP divisions and other government entities
  • .Operational planning documents and strategic intelligence assessments
  • .Technical infrastructure details relating to the agency's communications and information systems
  • .Financial records including budget allocations and procurement documentation

The distribution pattern suggests a deliberate leak rather than a conventional cyberattack. Materials appeared simultaneously on multiple platforms, including Telegram channels associated with hacktivist groups and state-aligned actors, as well as established dark web forums.

This is consistent with either a state-sponsored intelligence operation or a sophisticated hacktivist campaign with geopolitical motivations.

04

REGULATORY ANALYSIS

The GIP data leak sits at the complex intersection of personal data protection and national security law. The PDPL applies to all entities processing personal data within the Kingdom.

The personnel records are unambiguously personal data under the PDPL. Article 14's requirement for appropriate security measures applies with even higher standards for intelligence agency data.

Saudi Arabia's Anti-Cyber Crime Law (Royal Decree M/17) criminalizes unauthorized access to government systems and disclosure of classified information, with penalties including imprisonment up to ten years and fines up to SAR 5 million.

05

ZERO|TOLERANCE Advisory

Eleven gigabytes of classified intelligence data from the General Intelligence Presidency of Saudi Arabia is now distributed across dark web forums and encrypted messaging channels.

The personnel records identify intelligence officers by name, role, and organizational assignment. The operational planning documents reveal strategic assessments and collection priorities.

The technical infrastructure details expose the communications architecture that underpins the Kingdom's intelligence apparatus.

This is not a data breach in the conventional sense - it is an intelligence compromise with consequences that cannot be remediated through password resets or credit monitoring.

The simultaneous multi-platform distribution suggests either a state-sponsored operation or an insider threat with sophisticated operational tradecraft. In either case, the first control failure was at the data classification and access boundary.

Intelligence agencies operate on the principle of compartmentalization - no single individual or system should have access to the full breadth of classified operational intelligence, personnel records, communications infrastructure details, and financial procurement data simultaneously.

The scope of this leak indicates that compartmentalization either did not exist or was not enforced.

Data Loss Prevention (DLP) solutions tuned for classified document markings, combined with strict role-based access controls limiting each analyst and administrator to their operational compartment, would have constrained any single compromise to a fraction of the total exposure.

The difference between a compartmentalized breach and a total exposure is the difference between losing one operational thread and losing the entire intelligence picture.

The personnel records represent the most immediately dangerous category of exposed data. Intelligence officers whose identities are now public face personal security risks that extend to their families.

Counterintelligence programs must assume that every identified officer is now known to adversary services.

Immediate measures include identity protection protocols for exposed personnel, reassignment from field operations where cover has been compromised, and monitoring for targeting activity against named individuals and their family members.

Personnel security databases must be isolated on air-gapped networks with Hardware Security Module (HSM) controlled encryption, ensuring that even a network breach cannot expose identity records without physical access to the decryption infrastructure.

The technical infrastructure details - communications systems, information system architectures, and procurement records revealing technology vendors and capabilities - provide adversaries with a blueprint for signals intelligence collection and network exploitation against GIP systems.

Infrastructure documented in the leak must be assumed compromised. Communications systems identified in the leaked material should be migrated to new architectures with different vendors, encryption protocols, and network topologies.

Procurement records revealing vendor relationships and capability gaps must be treated as adversary intelligence and factored into future acquisition decisions.

Continuing to operate on infrastructure whose architecture has been publicly documented is operationally equivalent to conducting classified communications on an open channel.

The absence of a claimed threat actor and the lack of a financial motive point toward either a state-sponsored operation or a privileged insider.

Insider threat programs combining User and Entity Behavior Analytics (UEBA) with mandatory access logging, anomaly detection on bulk data access patterns, and periodic counterintelligence polygraph screening are the standard countermeasure for this threat vector.

UEBA platforms detect anomalous behavior - an analyst accessing document categories outside their operational mandate, bulk downloads from classified repositories, or access from unusual locations or times - and generate alerts for counterintelligence investigation.

No intelligence agency can prevent all insider threats, but the absence of behavioral monitoring means the agency cannot even detect them.

06

SOURCES

Resecurity, The Record by Recorded Future, Middle East Monitor, Saudi PDPL (Royal Decree M/19), Saudi Anti-Cyber Crime Law (Royal Decree M/17)

RELATED ANALYSIS

Cisco Systems: ShinyHunters Claim 3M Salesforce Records, 300+ GitHub Repos, and AWS Data in Triple-Vector Extortion
Mar 31, 2026 · 3M+ records claimed · 300+ repos · April 3 deadline
Oracle's Dual Breach: 6M Cloud SSO Records Stolen, 80 Hospitals Compromised - and a Denial That Collapsed Under Evidence
Mar 21, 2025 · 6M records · 140K tenants · 80 hospitals
TriZetto/Cognizant: 3.4M Patient Records Stolen in 11-Month Healthcare Supply Chain Breach
Feb 6, 2026 · 3.4M patients · 11-month dwell · ~24 lawsuits
Infinite Campus: ShinyHunters Breach K-12 Platform Serving 11M Students via 10-Minute Vishing Attack
Mar 18, 2026 · 11M students · 3,200+ districts · 46 states
Crunchyroll: 6.8M Users Exposed After Infostealer Malware Compromises TELUS Support Agent's Okta Credentials
Mar 12, 2026 · 6.8M users · 100GB stolen · $5M ransom
MORE DATA BREACHES →