• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Afghan Interpreters’ Data Exposed in MoD Breach

You are here: Home / General Cyber Security News / Afghan Interpreters’ Data Exposed in MoD Breach
September 21, 2021

The United Kingdom’s Ministry of Protection has apologized for sending an email that exposed the information of more than 250 Afghan interpreters who worked for British forces. 

The impacted interpreters are searching for to be relocated to the UK possibly from Afghanistan, exactly where many are at this time in hiding from the Taliban, which seized electric power in August, or from another country to which they have relocated. 

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The email – in which the interpreters’ email addresses, names, and some connected profile illustrations or photos have been exposed – was despatched by the team in cost of the UK’s Afghan Relocations and Support Policy (ARAP) to Afghan interpreters who have possibly still left Afghanistan or who keep on being in the state. 

Just one of the email’s recipients told the BBC: “This error could price the existence of interpreters, specially for individuals who are nonetheless in Afghanistan. Some of the interpreters failed to observe the miscalculation and they replied to all the e-mails previously and they stated their problem which is incredibly risky.”

The MoD has reportedly suspended an official and launched an investigation into the facts breach, which UK defense secretary Ben Wallace has described as “unacceptable.”

An MoD spokesperson mentioned: “We apologize to absolutely everyone impacted by this breach and are working tricky to ensure it does not occur once more.”

Commenting on ARAP’s failure to employ the BCC email function, Labour shadow protection secretary John Healey said: “We advised these Afghans interpreters we would hold them protected, in its place this breach has needlessly set lives at risk.”

Martin Jartelius, CSO at Outpost24, explained that even though this style of email-dependent knowledge breach could conveniently come about, it was “unfortunate and pointless in most corporations.”

“It’s so exceptionally straightforward to, by mistake and in tension, ship an email with recipients mentioned openly instead of in BCC,” mentioned Jartelius. “However, for example, in the Office environment365 suite, there are alternatives, of which the least complicated to at the very least give an additional notice is the element mail suggestions.

“Listed here you can set the flag to warn for ‘Large Viewers,’ and even as an group sets what [that] stage is – the default is 25 if enabled. Organizations that do not want to make the exact same mistake can established a warning this way.” 


Some components of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Medical Device Cybersecurity Center Launches in Minnesota
Next Post: #IMOS21: Embrace the Opportunities of Emerging Tech – Lisa Short Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.