Saudi Ministry of Foreign Affairs 1.4M Employee Records on Dark Web

2023 路 Government sector

By Karim El Labban · ZERO|TOLERANCE

馃嚫馃嚘 Saudi PDPLJune 20238 min read

# Saudi Ministry of Foreign Affairs: 1.4M Employee Records on Dark Web

In mid-2023, dark web monitoring platforms identified a 600MB dataset containing

approximately 1.4 million employee records attributed to the Saudi Ministry of

Foreign Affairs (MFA) being offered for sale on underground forums. The leaked data

included names, government positions, contact details, and information pertaining to

diplomatic staff stationed at Saudi embassies and consulates worldwide.

The appearance of this dataset coincided with the formal enactment of Saudi Arabia's

PDPL, making it one of the first major government data exposures tested against the

Kingdom's new data protection framework.

## Key Facts

  • .**What:** 1.4 million MFA employee records found for sale on dark web forums.
  • .**Who:** Current and former Saudi Ministry of Foreign Affairs staff worldwide.
  • .**Data Exposed:** Names, positions, diplomatic postings, and security clearance data.
  • .**Outcome:** National security implications; coincided with PDPL enactment in 2023.

## What Was Exposed

  • .Full names and government employee identification numbers for approximately

1.4 million current and former MFA staff

  • .Job titles, departmental assignments, and hierarchical position data across

the Ministry's organizational structure

  • .Contact details including official email addresses, phone numbers, and in some

cases residential addresses

  • .Diplomatic staff assignment records, including embassy and consulate postings

across multiple countries

  • .Internal administrative data including hire dates, salary grades, and security

clearance indicators

The scale of the leak, at 1.4 million records, appears to encompass not just current

employees but a historical database spanning years or potentially decades of MFA

employment records. This is significant because it means the exposure includes

information about individuals who may have since moved to other government agencies,

retired, or entered the private sector, dramatically widening the circle of affected

persons beyond the Ministry's current headcount.

The diplomatic dimension of this breach elevates it far beyond a routine employee

data leak. The identification of diplomatic staff, their postings, and their

organizational roles provides hostile intelligence services with a comprehensive

mapping of Saudi diplomatic operations. This information could be used to identify

intelligence officers operating under diplomatic cover, to target diplomats for

recruitment or blackmail, or to map the Kingdom's diplomatic priorities and

relationships based on staffing patterns.

For a nation with Saudi Arabia's geopolitical prominence, this type of exposure

carries genuine national security implications. The Kingdom maintains one of the

most extensive diplomatic networks in the Middle East, with embassies and consulates

in over 100 countries. The exposure of staffing records across this entire network

provides a level of organizational intelligence that would normally require years of

human intelligence collection to assemble.

The 600MB dataset was advertised on multiple Russian-language and English-language

dark web forums, with the seller providing sample records as proof of authenticity.

The structured nature of the data, with consistent field formatting and complete

records, suggests it was extracted from a centralized HR or personnel management

database rather than compiled from multiple sources. This points to either a direct

database compromise, an insider threat, or the exploitation of an API or integration

point connected to the Ministry's personnel systems.

## Regulatory Analysis

The timing of this breach is particularly significant from a regulatory perspective.

Saudi Arabia's PDPL came into force in September 2023, and while the leak appeared

to surface months earlier, the ongoing exposure of the data on dark web forums means

the Ministry's obligations under the new law were immediately relevant from the

PDPL's effective date. Government entities are explicitly covered by the PDPL, and

SDAIA has not carved out exemptions for sovereign ministries.

Article 5 of the PDPL establishes the requirement for a lawful basis for processing

personal data. For government entities, the lawful basis typically derives from the

public interest or the exercise of official authority. However, the obligation to

process data lawfully extends to ensuring that the data remains protected throughout

its lifecycle. The fact that 1.4 million records were exfiltrated and made available

on criminal marketplaces represents a fundamental failure of the duty of care that

accompanies any lawful basis for processing.

Article 14 mandates appropriate organizational and technical measures to protect

personal data from unauthorized access, disclosure, or loss. For a government

ministry handling diplomatic personnel data, the expected standard of security is

exceptionally high. The breach suggests failures in multiple security domains:

access controls that should have limited who could query or export the full

personnel database, encryption that should have rendered exfiltrated data unusable,

data loss prevention mechanisms that should have detected the extraction of 600MB

of structured data, and monitoring systems that should have flagged anomalous

database queries or data transfers.

Article 21 of the PDPL contains provisions specifically relevant to government

entities, establishing that government bodies must comply with the same data

protection standards as private sector organizations. This is a deliberate design

choice in the Saudi framework, reflecting the Kingdom's understanding that citizens

entrust government agencies with vast quantities of personal data and that this

trust must be backed by commensurate security measures.

Given the sensitivity of diplomatic personnel data and the potential national

security implications, SDAIA could impose the maximum fine of SAR 5 million.

However, the more significant regulatory consequence for a government ministry

would likely be a mandated remediation program, including mandatory security audits,

implementation of specified technical controls, and ongoing reporting obligations

to SDAIA. The political dynamics of regulating a fellow government ministry present

unique challenges, but the PDPL's credibility depends on consistent enforcement

across all sectors.

## What Should Have Been Done

Protecting a dataset of this sensitivity requires a defense-in-depth strategy that

begins with the assumption that any single control can fail. The Ministry should

have implemented database-level encryption with key management segregated from the

database administrator role, ensuring that even if an attacker gained access to the

database, the data would remain encrypted and unusable without separate key

compromise. Column-level encryption for the most sensitive fields, such as

diplomatic postings, clearance levels, and residential addresses, would have added

an additional layer of protection proportionate to the data's sensitivity.

Access to the personnel database should have been governed by a strict role-based

access control (RBAC) model with mandatory multi-factor authentication and

privileged access management (PAM) for any queries involving bulk data extraction.

No individual user should have the ability to export the entire personnel database

without triggering automated alerts and requiring supervisor approval. Database

activity monitoring (DAM) solutions should have been deployed to detect and flag

unusual query patterns, large result sets, or access from unexpected network

locations or times.

The Ministry should have maintained comprehensive audit logging of all access to

the personnel database, with logs forwarded to a Security Information and Event

Management (SIEM) platform monitored by a 24/7 Security Operations Center. The

exfiltration of 600MB of data represents a significant data transfer that should

have been detectable through network flow analysis and endpoint monitoring.

Regular threat hunting exercises focused on database access patterns would have

increased the probability of detecting an ongoing compromise before the full

dataset was extracted. Proactive threat hunting, as opposed to purely reactive

alert-based monitoring, is essential for detecting sophisticated adversaries who

design their operations to evade automated detection rules.

Given the diplomatic sensitivity of the data, the Ministry should also have

implemented a data classification scheme that segregated diplomatic personnel

records from general administrative staff data, with enhanced controls for the

diplomatic subset. Regular penetration testing specifically targeting the personnel

management system, combined with red team exercises simulating insider threats,

would have tested the effectiveness of these controls in realistic scenarios.

Finally, an incident response plan specifically addressing personnel data breaches

should have been maintained and regularly exercised, with pre-established

communication channels to SDAIA and affected individuals.

When 1.4 million government employee records surface on the dark web, it is not

merely a data protection failure; it is a national security event. Saudi government

ministries must recognize that the PDPL applies to them without exception, and that

the sensitivity of diplomatic personnel data demands security measures that exceed

private sector standards, not fall below them.

RELATED ANALYSIS

Cisco Systems: ShinyHunters Claim 3M Salesforce Records, 300+ GitHub Repos, and AWS Data in Triple-Vector Extortion
Mar 31, 2026 路 3M+ records claimed 路 300+ repos 路 April 3 deadline
Oracle's Dual Breach: 6M Cloud SSO Records Stolen, 80 Hospitals Compromised - and a Denial That Collapsed Under Evidence
Mar 21, 2025 路 6M records 路 140K tenants 路 80 hospitals
TriZetto/Cognizant: 3.4M Patient Records Stolen in 11-Month Healthcare Supply Chain Breach
Feb 6, 2026 路 3.4M patients 路 11-month dwell 路 ~24 lawsuits
Infinite Campus: ShinyHunters Breach K-12 Platform Serving 11M Students via 10-Minute Vishing Attack
Mar 18, 2026 路 11M students 路 3,200+ districts 路 46 states
Crunchyroll: 6.8M Users Exposed After Infostealer Malware Compromises TELUS Support Agent's Okta Credentials
Mar 12, 2026 路 6.8M users 路 100GB stolen 路 $5M ransom
MORE DATA BREACHES →