Sunday, June 1, 2025
HomeCyber AttackMorocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

Published on

SIEM as a Service

Follow Us on Google News

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on leaked documents circulating on social media have revealed that much of the information is false, inaccurate, or incomplete.

Officials state these documents originated from a cyber attack targeting the organization’s computer systems.

The CNSS has activated security protocols, launched an internal investigation, and warned citizens against sharing potentially falsified data.

- Advertisement - Google News

Initial Investigation Reveals False Claim

Initial verification procedures conducted by the National Social Security Fund (CNSS) have determined that documents circulating on social media platforms, allegedly obtained through a cyber attack, contain largely false, inaccurate, or incomplete information.

In an official statement released on Wednesday, the Fund acknowledged that its computer system had been targeted by a series of cyber attacks designed to bypass security measures.

These attacks resulted in a data breach, the full extent and origin of which are still being assessed by security experts.

The CNSS emphasized that preliminary analysis shows significant discrepancies between the leaked information and actual records maintained by the organization.

The Fund stated that comprehensive examination of the shared documents reveals numerous inconsistencies that call into question their authenticity and completeness.

Security teams are continuing their detailed assessment to determine exactly which systems were compromised and what specific data may have been accessed during the breach.

The CNSS has assured stakeholders that they are taking the situation seriously and working diligently to understand the full scope of the incident.

Security Measures Activated

Upon detection of the data breach, the CNSS immediately activated its information technology security protocol and implemented corrective measures to contain the vulnerability exploited by attackers.

According to the statement, these prompt actions successfully sealed the security gap used in the attack and strengthened the overall infrastructure against further intrusions.

The Fund has deployed additional resources to precisely identify all potentially affected data and assess the full impact of the breach on its systems and users.

The organization reiterated that the protection of personal data and confidentiality of user information remains an absolute priority in its operations.

To address the situation comprehensively, the CNSS has initiated a thorough internal administrative investigation to determine how the breach occurred and identify any procedural or technical weaknesses that may have contributed to the incident.

This investigation aims to not only understand the current breach but also to prevent similar incidents in the future through enhanced security measures.

CNSS Notified the Leak

In its official communication, the CNSS confirmed that it has formally notified the appropriate judicial authorities about the cyber attack and subsequent data leak.

This notification has triggered legal proceedings against those responsible for the breach and unauthorized data dissemination.

The Fund emphasized the seriousness of the situation from both cybersecurity and legal perspectives.

The statement concluded with a strong appeal to all citizens and media outlets, urging them to exercise vigilance and responsibility regarding the leaked information.

The CNSS explicitly warned against any dissemination or sharing of the leaked or falsified data, noting that individuals who participate in spreading such information could face legal consequences.

This caution highlights the potential legal ramifications for those who further distribute compromised data, regardless of whether they were involved in the original breach.

The organization stressed the importance of information verification and responsible digital citizenship during this sensitive situation.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...

Beware: Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra...

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages...

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated...