Massive leak of political data in Spain: an unprecedented attack

This week, Spain was shocked by the massive leak of personal data of senior officials, including President Pedro Sánchez, in an incident investigated as possible cyberterrorism.

What data has been leaked and who is affected?

In the past few days, documents have been published on Telegram and related forums that include:

  • National ID numbers and full addresses
  • Dates of birth, telephone numbers and email addresses
  • Data from around 3,000 Podemos affiliates, in addition to representatives of other formations

This leak reveals the vulnerability of systems and records with sensitive personal data.

Cyberterrorism Investigation

The National High Court has opened proceedings after receiving reports from the General Information Commissioner. It is analyzed whether the publication, the selection of those affected and the political intentionality behind the exposure could be qualified as act of cyberterrorism aimed at destabilization and public blackmail.

How was the information obtained?

Although some of the data may come from OSINT sources and public records, your structured compilation and mass distribution point to an organized attack with objectives of coercion or generation of social and political fear. The alleged author, known as Akkaspace, states that his motivation is to “show the vulnerability of the system” and has acknowledged having used bots to track public information, generating a unique repository with the potential for incalculable reputational and personal damage.

Impact on cybersecurity and public trust

These types of leaks:

  • They weaken public trust in institutions.
  • They facilitate impersonation, blackmail and cyberbullying.
  • They show that it's not just technical hacks that are dangerous: social engineering and the exposure of accessible data without adequate protection are an equally or more damaging vector of attack.

Recommendations for organizations, parties and public administrations

  1. Audit your digital exposure and that of your members.
  2. Implement cyber defense and privacy protocols in high-profile positions.
  3. Perform periodic OSINT analysis to identify leaked data.
  4. Monitor dark web and messaging channels to detect and request the removal of leaks.
  5. Design response and communication plans for reputational breaches and crises.
  6. Collaborate with national CSIRTs, security forces and specialized consultancies to Mitigation and prevention of massive leaks.

Conclusion: digital security as a political and social priority

This case shows that personal data can become a weapon of destabilization when it is not protected with strict protocols. Social engineering, combined with the massive collection of public information, can lead to threats of cyberterrorism and directly affect democratic and social stability.

Protect your organization before it's too late

At Apolo Cybersecurity we offer:

  • Digital Exposure Audits and OSINT
  • Implementation of early warning and risk monitoring systems
  • Strategic and confidential training for senior officials and key personnel

Don't wait any longer and request a meeting with our specialist and get the first consultation completely free of charge.

✅ Request a meeting with our specialist

Prev Post
Next Post

Any questions?
We're happy to help!