Friday, April 25, 2025
HomeCyber AttackMorocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

Published on

SIEM as a Service

Follow Us on Google News

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on leaked documents circulating on social media have revealed that much of the information is false, inaccurate, or incomplete.

Officials state these documents originated from a cyber attack targeting the organization’s computer systems.

The CNSS has activated security protocols, launched an internal investigation, and warned citizens against sharing potentially falsified data.

- Advertisement - Google News

Initial Investigation Reveals False Claim

Initial verification procedures conducted by the National Social Security Fund (CNSS) have determined that documents circulating on social media platforms, allegedly obtained through a cyber attack, contain largely false, inaccurate, or incomplete information.

In an official statement released on Wednesday, the Fund acknowledged that its computer system had been targeted by a series of cyber attacks designed to bypass security measures.

These attacks resulted in a data breach, the full extent and origin of which are still being assessed by security experts.

The CNSS emphasized that preliminary analysis shows significant discrepancies between the leaked information and actual records maintained by the organization.

The Fund stated that comprehensive examination of the shared documents reveals numerous inconsistencies that call into question their authenticity and completeness.

Security teams are continuing their detailed assessment to determine exactly which systems were compromised and what specific data may have been accessed during the breach.

The CNSS has assured stakeholders that they are taking the situation seriously and working diligently to understand the full scope of the incident.

Security Measures Activated

Upon detection of the data breach, the CNSS immediately activated its information technology security protocol and implemented corrective measures to contain the vulnerability exploited by attackers.

According to the statement, these prompt actions successfully sealed the security gap used in the attack and strengthened the overall infrastructure against further intrusions.

The Fund has deployed additional resources to precisely identify all potentially affected data and assess the full impact of the breach on its systems and users.

The organization reiterated that the protection of personal data and confidentiality of user information remains an absolute priority in its operations.

To address the situation comprehensively, the CNSS has initiated a thorough internal administrative investigation to determine how the breach occurred and identify any procedural or technical weaknesses that may have contributed to the incident.

This investigation aims to not only understand the current breach but also to prevent similar incidents in the future through enhanced security measures.

CNSS Notified the Leak

In its official communication, the CNSS confirmed that it has formally notified the appropriate judicial authorities about the cyber attack and subsequent data leak.

This notification has triggered legal proceedings against those responsible for the breach and unauthorized data dissemination.

The Fund emphasized the seriousness of the situation from both cybersecurity and legal perspectives.

The statement concluded with a strong appeal to all citizens and media outlets, urging them to exercise vigilance and responsibility regarding the leaked information.

The CNSS explicitly warned against any dissemination or sharing of the leaked or falsified data, noting that individuals who participate in spreading such information could face legal consequences.

This caution highlights the potential legal ramifications for those who further distribute compromised data, regardless of whether they were involved in the original breach.

The organization stressed the importance of information verification and responsible digital citizenship during this sensitive situation.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Spring Security Vulnerability Exposes Valid Usernames to Attackers

A newly identified security vulnerability, CVE-2025-22234, has exposed a critical weakness in the widely-used...

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations

Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea,...

Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw

Microsoft’s recent attempt to resolve a critical privilege escalation vulnerability has inadvertently introduced a...

SAP NetWeaver 0-Day Vulnerability Enables Webshell Deployment

Cybersecurity analysts have issued a high-priority warning after several incidents revealed active exploitation of...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Spring Security Vulnerability Exposes Valid Usernames to Attackers

A newly identified security vulnerability, CVE-2025-22234, has exposed a critical weakness in the widely-used...

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations

Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea,...

Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw

Microsoft’s recent attempt to resolve a critical privilege escalation vulnerability has inadvertently introduced a...