A new cybersecurity alert has raised alarms about a possible leak and commercialization of sensitive data linked to Argentine military personnel. The information replicated by Zona-Militar refers to the publication of the specialized portal Birmingham Cyber Arms, which reports the existence of an active threat actor that "is allegedly offering files containing detailed information on 50,000 members of the Armed Forces."
The event occurred exactly two weeks after Javier Milei's government revalidated with Great Britain the cybersecurity agreements that the country inaugurated with Alberto Fernández. This information came to light after the British Embassy in Argentina announced the nature of the document signed by UK Secretary of Homeland Security Dan Jarvis and Security Minister Patricia Bullrich. "A memorandum of understanding to strengthen cooperation to combat organized crime and safeguard the security of our two nations ," transmitted through its social networks, the diplomatic headquarters of Great Britain in the country.
The same source says the hacked database is being sold in PDF format and distributed on illegal exchange forums . It allegedly includes personal records such as National Identity Document (DNI) numbers, dates of birth, place of service, and addresses of both personnel and their families.
Furthermore, the leaked files reportedly contain additional documentation that exacerbates the level of exposure: travel for service purposes, academic records, transcripts, and other elements that, together, create a highly sensitive picture from a national security perspective.
The information was also published by the threat intelligence monitoring team @teamcapybara_ . It was also replicated by various sources dedicated to tracking cybersecurity incidents with strategic impact.
Although there has been no official confirmation from state agencies at this time, the alleged leak represents a direct risk to the integrity and privacy of Argentine military personnel . These types of hacks, increasingly common in regional environments, not only compromise individual security but could also be used for intelligence purposes by hostile actors.
The magnitude and detail of the leaked data mark a new and worrying development in cyber defense and critical infrastructure protection. From the defense and national security perspective, a response is expected that assesses the impact, contains the threat, and strengthens protocols for safeguarding sensitive information.
Sources: