Accelerated by:


Copyright © 2025 Apollo Cybersecurity

.webp)
The threat ecosystem continues to hit local governments. On this occasion, the City Council of Béjar (Salamanca) has been identified as the victim of a leak after an alleged security breach attributed to the “ballistic” hacker, who claims to have accessed internal data and records linked to the municipal police. Although the total veracity is still under analysis, the alert has already ignited signs of risk in the Spanish public sector.
According to several specialized portals and screenshots published in dark web forums, the “ballistic” actor claims to have accessed the City Council's systems through a vulnerability in an external server connected to the municipal infrastructure.
By taking advantage of this access point, the attacker claims to have obtained:
The cybersecurity portal Botcrawl qualifies the incident as a highly serious commitment, not only because of the nature of the leaked data but also because of the access to police systems, which significantly increases the potential risk.
The City Council of Béjar operates through a hybrid infrastructure composed of internal systems and services managed by third parties, which provide document storage, administrative applications and communication platforms.
External vendors play a key role in your digital operations, but they also introduce new attack vectors when:
According to information leaked by “ballistic”, the breach occurred precisely because of an outdated or misconfigured external system that allowed it to pivot to more sensitive City Council resources. This pattern coincides with recent incidents in other local Spanish and European entities.
City councils have become one of the favorite targets of cybercriminals. They tend to work with fragmented digital infrastructures, supported by multiple external providers, and have fewer resources to invest in preventive cybersecurity. Added to this is the large amount of sensitive data they manage, from administrative files to police information, which makes these institutions an especially profitable target.
In this context, the Béjar case fits into a growing trend: instead of seeking only to interrupt public services, attackers seek to extract valuable data for sale on the dark web, use it in extortion or gain a criminal reputation by publicly filtering it.
Everything suggests that the leak is due to economic or notorious motivations:
There are no indications of geopolitical espionage or state affiliation.
If confirmed, the leak could have significant consequences:
For public administrations — and especially municipalities — strengthening digital security involves adopting a comprehensive strategy that goes beyond protecting internal systems. It is essential to establish continuous control mechanisms over external suppliers, regularly evaluating their security to detect breaches before they occur. It is also key to apply a Zero Trust approach, limiting extensive or permanent access to critical systems and ensuring that every interaction is verified.
Added to this is the need to carry out periodic penetration tests to test exposed applications, servers and platforms, as well as to define clear protocols for managing especially sensitive data, such as police documents or citizen files. Finally, the continuous training of technical and administrative staff remains one of the most important pillars: the human factor is often the first barrier — or the first point of entry — for attackers.
Attacks on local governments will continue to grow as long as cybercriminals see them as a profitable target.
Protecting your systems today means preventing leaks tomorrow.
If you want to evaluate the security of your city council, agency or public entity, we are here to help.
.webp)