Saudi Ministry of Health Patient Data for Sale on Dark Web

2021 路 Healthcare sector

By Karim El Labban · ZERO|TOLERANCE

馃嚫馃嚘 Saudi PDPLSeptember 20218 min read

# Saudi Ministry of Health: Patient Data for Sale on Dark Web

In 2021, a threat actor advertised a SQL database containing patient records from

Saudi Arabia's Ministry of Health (MOH) for sale on dark web forums. The dataset

included Arabic-language patient names, Saudi national identification numbers,

medical records, hospital visit logs, and treatment details.

The listing provided sample records as proof of authenticity, revealing a structured

database that appeared to originate from the Ministry's hospital information systems.

The sale of government healthcare data on criminal marketplaces represents a dual

failure of both public health data governance and the national cybersecurity posture

protecting critical government infrastructure.

## Key Facts

  • .**What:** Saudi MOH patient SQL database advertised for sale on dark web forums.
  • .**Who:** Patients of Saudi Ministry of Health hospitals and clinics.
  • .**Data Exposed:** Arabic-name records, national IDs, diagnoses, prescriptions, and visit logs.
  • .**Outcome:** Pre-PDPL breach; highlights need for healthcare data security reform.

## What Was Exposed

  • .Patient full names in Arabic script, linked to individual medical records and

national identity documentation

  • .Saudi national identification numbers (Iqama numbers for residents, national ID

numbers for citizens)

  • .Medical records including diagnoses, treatment plans, prescribed medications,

and laboratory test results

  • .Hospital visit logs with timestamps, facility names, department assignments,

and attending physician information

  • .Contact information including phone numbers and residential addresses

associated with patient registration records

  • .Insurance and billing data including coverage details and payment records for

healthcare services

The Ministry of Health operates the largest healthcare system in Saudi Arabia,

managing hundreds of hospitals and thousands of primary care centers serving the

Kingdom's population of over 35 million people. A database breach of MOH patient

records therefore has the potential to affect a significant proportion of the

population, including Saudi nationals, residents, and visitors who accessed

government healthcare facilities.

The Arabic-language nature of the records confirms the Saudi origin and distinguishes

this dataset from fabricated or misattributed data that occasionally appears on dark

web markets. The presence of Arabic-script names, Saudi national ID formats, and

references to specific MOH facilities provides multiple verification points that

establish the authenticity and provenance of the dataset. Dark web buyers are

increasingly sophisticated in their verification demands, and the seller's ability to

provide verifiable Saudi-specific data points increased the dataset's credibility

and market value.

The combination of national identification numbers and medical records creates a

particularly dangerous data pairing. National IDs are used across Saudi Arabia for

banking, government services, employment, and telecommunications registration. When

linked to medical data, they enable targeted fraud schemes where an attacker can

impersonate a victim using their verified identity credentials while exploiting

knowledge of their medical history for social engineering.

Medical identity theft, where an attacker uses stolen identity and health information

to obtain medical services or prescription drugs, is especially difficult to detect

and remediate because it contaminates the victim's medical record with false

information that can persist for years. A victim might discover the theft only when

they receive an unexpected bill, when their insurance is denied due to maxed-out

benefits, or when a physician references a condition or medication they have never

had. In the worst cases, contaminated medical records can lead to dangerous

treatment decisions based on false medical histories.

The sale format of the data, advertised as a SQL database with structured tables,

suggests that the data was exfiltrated directly from a backend database rather than

scraped from a user interface or assembled from multiple sources. SQL database

exports retain the relational structure of the original data, including foreign key

relationships between patients, visits, diagnoses, and prescriptions. This structure

makes the data more valuable to buyers because it can be imported into analytical

tools for systematic exploitation. The technical sophistication of the listing

suggests either a direct SQL injection attack against the MOH's web-facing

applications or insider access to the database backend.

## Regulatory Analysis

The Ministry of Health occupies a unique regulatory position in Saudi Arabia. As a

government entity, it is both a data controller subject to data protection obligations

and a regulator responsible for healthcare data governance standards across the

Kingdom. The exposure of MOH patient data on dark web forums creates a situation

where a government regulator has failed to protect the very category of data it sets

standards for across the private sector.

Article 16 of the PDPL designates health data as sensitive personal data, subject to

enhanced protections beyond those required for ordinary personal data. The processing

of sensitive data requires either explicit consent from the data subject or a specific

legal basis enumerated in the law. For the MOH, the legal basis for processing

patient data derives from the provision of healthcare services and public health

obligations. However, this legal basis carries a commensurate obligation to protect

the data with measures proportionate to its sensitivity.

Article 14 requires appropriate technical and organizational security measures, and

for healthcare data, the standard of "appropriate" is set by the sensitivity of the

data and the potential for harm from its exposure. For a government ministry managing

the healthcare records of millions of residents, appropriate measures would include

database encryption, network segmentation between clinical systems and administrative

networks, multi-factor authentication for database access, regular vulnerability

assessments of web-facing applications, and web application firewalls configured to

detect and block SQL injection attacks.

The successful exfiltration of a SQL database suggests that one or more of these

controls was absent or inadequate. SQL injection remains one of the most common and

well-understood web application vulnerabilities, and its successful exploitation in

2021 against a government ministry's systems indicates a failure to implement even

basic web application security controls that have been industry standard for over a

decade.

Article 19 mandates breach notification to SDAIA when personal data is compromised

in a manner that may harm individuals. The sale of medical records on dark web forums

unambiguously meets this threshold. The Ministry would be required to notify SDAIA of

the breach, provide details of the data categories affected, estimate the number of

affected individuals, and describe the measures taken to contain the breach and

prevent recurrence. The MOH's regulatory responsibilities in the healthcare sector

add an additional dimension: the Ministry should also issue sector-wide guidance to

hospitals and healthcare providers about the breach's implications and the protective

measures that patients should be advised to take.

## What Should Have Been Done

The Ministry of Health should have implemented a comprehensive database security

program specifically designed for its hospital information systems. This program

should have included encryption of patient data at rest using AES-256 or equivalent

algorithms, with encryption keys managed through a dedicated hardware security module

(HSM) infrastructure. Database activity monitoring (DAM) should have been deployed

to detect unusual query patterns, large result sets, and access from unexpected

source IP addresses or user accounts.

All database access should have been logged with sufficient detail to support

forensic investigation, and logs should have been forwarded to a centralized Security

Information and Event Management (SIEM) platform for real-time analysis. The SIEM

should have been configured with correlation rules specific to healthcare data

threats, including alerts for bulk data extraction, off-hours database access, and

queries that span multiple patient records without a corresponding clinical workflow

justification.

Web application security should have been a primary focus, given the likelihood that

the exfiltration occurred through a SQL injection vulnerability in a web-facing

application. All web applications connected to patient databases should have been

developed using parameterized queries and prepared statements to prevent SQL injection

attacks. A web application firewall (WAF) should have been deployed in front of all

healthcare applications, configured with rules specific to healthcare data patterns

and SQL injection attack signatures.

Regular penetration testing, including specific testing for injection vulnerabilities,

should have been conducted by qualified third parties on at least a quarterly basis,

with identified vulnerabilities remediated within defined SLAs based on severity. The

MOH should have also implemented a bug bounty or vulnerability disclosure program to

incentivize external security researchers to report vulnerabilities before they are

exploited by malicious actors.

Network segmentation should have isolated clinical systems containing patient data

from administrative networks, internet-facing systems, and the general government

network. The database servers containing patient records should have been accessible

only from designated application servers through specific, monitored network paths.

Egress filtering should have prevented database servers from initiating outbound

connections to the internet, ensuring that even if an attacker gained database

access, they could not easily exfiltrate data to external infrastructure.

The MOH should also have implemented a data governance framework that included

regular audits of database access permissions, automated identification and

classification of sensitive data within its systems, and a data retention policy

that ensures patient records are archived or purged according to defined schedules.

Legacy data that is no longer needed for active patient care should have been moved

to secure archival storage with restricted access, reducing the volume of data

available to an attacker in the event of a compromise. The Ministry's role as both

data controller and healthcare regulator creates an obligation to lead by example.

When a nation's Ministry of Health becomes a data breach victim, it is not merely

an IT security failure; it is a public trust crisis. Citizens who provide their

most intimate health information to government hospitals expect sovereign-grade

protection. The PDPL demands that government entities meet the same standards as

the private sector. For the MOH, whose regulatory mandate extends to setting

healthcare data standards, the expectation should be to exceed those standards,

not to fall below them.

RELATED ANALYSIS

Cisco Systems: ShinyHunters Claim 3M Salesforce Records, 300+ GitHub Repos, and AWS Data in Triple-Vector Extortion
Mar 31, 2026 路 3M+ records claimed 路 300+ repos 路 April 3 deadline
Oracle's Dual Breach: 6M Cloud SSO Records Stolen, 80 Hospitals Compromised - and a Denial That Collapsed Under Evidence
Mar 21, 2025 路 6M records 路 140K tenants 路 80 hospitals
TriZetto/Cognizant: 3.4M Patient Records Stolen in 11-Month Healthcare Supply Chain Breach
Feb 6, 2026 路 3.4M patients 路 11-month dwell 路 ~24 lawsuits
Infinite Campus: ShinyHunters Breach K-12 Platform Serving 11M Students via 10-Minute Vishing Attack
Mar 18, 2026 路 11M students 路 3,200+ districts 路 46 states
Crunchyroll: 6.8M Users Exposed After Infostealer Malware Compromises TELUS Support Agent's Okta Credentials
Mar 12, 2026 路 6.8M users 路 100GB stolen 路 $5M ransom
MORE DATA BREACHES →