Le Maroc parmi les candidats arabes au conseil de l'OACI    Clôture à Praia de la cinquième réunion ministérielle du Processus des Etats africains atlantiques : un appel réaffirmé à la coordination régionale    Huit aires marines protégées officiellement instituées par le Maroc, affirme Leïla Benali    Le géant espagnol Iberdrola fonde une filiale au Maroc et inscrit l'axe Rabat–Madrid dans la géographie de l'énergie verte    Le Samsung Galaxy S25 Edge : L'Innovation du Verre Céramique Gorilla® 2 pour une Durabilité Inégalée    LG Prend une Longueur d'Avance dans l'Industrie des Ecrans OLED avec le PhOLED Bleu    ONU/ODD : Hilale co-préside à New York le Forum de l'ECOSOC sur la science, la technologie et l'innovation    Leila Benali : « Le Maroc a mis en place officiellement huit Aires marines protégées »    Football : le Maroc s'offre un triplé européen inédit    Fès: Neuf morts dans l'effondrement d'un immeuble résidentiel    CNN encense Taroudant, la « petite Marrakech » où le calme le dispute à un charme authentique    Informations publiques : un rapport dénonce l'inertie des institutions face aux demandes d'accès    Le Maroc engage une refonte de ses infrastructures routières entre Fès et Casablanca    FICAM 2025 : Loading... L'animation et le gaming s'entrelacent avec audace    La Cour suprême espagnole classe l'affaire de génocide contre le Polisario    Botola D1 / J29 : Statu quo favorable aux FAR en tête, le HUSA barragiste !    Demi-finale Conférence League / Fiorentina - Bétis : Zalzouli buteur et finaliste en vidéos !    CAN U20 / Groupe A : quel adversaire pour les Lionceaux en quart de finale ?    À l'occasion de son vingt-deuxième anniversaire : chaleureuses félicitations au Prince Moulay El Hassan    Le processus de l'Afrique atlantique, initié par le Maroc, se met en marche au Cap vert    Du débat à l'action : l'Institut Royal des Etudes Stratégiques (IRES) catalyse la vision nucléaire du Maroc pour une souveraineté énergétique durable    L'ONMT vise le marché chinois à travers le label China Ready    La Chine et la Russie renouvellent leur alliance par une déclaration commune globale    Un vaccin révolutionnaire contre la grippe mis au point par des scientifiques chinois : une protection complète sans aiguilles    Les prévisions du vendredi 9 mai    Larache-Tetouan police foil attempt to smuggle two tons of cannabis resin    L'ONMT apunta al mercado chino a través de la etiqueta China Ready    Comment le Pakistan a tracé sa voie vers l'arme nucléaire    Ligue Europa : Manchester United atomise Bilbao et se qualifie en finale    Maroc - Sahel : Au-delà des alliances de circonstance... [INTEGRAL]    Réforme du système éducatif : Aziz Akhannouch attendu à la Chambre des Représentants    Léon XIV, le nouveau souverain pontife, un Américain modéré    Libéria : Tanger Med Engineering s'occupera de la modernisation des ports    Diplomatie : Pedro Sánchez salue l'appui du Maroc lors du blackout en Espagne    Sonarges : allier performance et inclusion sociale, un défi stratégique    Corruption dans le tourisme : Benalilou tire la sonnette d'alarme    Conclave : Fumée blanche, un nouveau pape est élu    Le monde a connu son second mois d'avril le plus chaud jamais enregistré    S.A.R. la Princesse Lalla Hasnaa célèbre les femmes de culture à Bakou    Le Caftan marocain, de l'héritage saharien au label mondial    Souveraineté culturelle : une nouvelle législation pour protéger l'histoire marocaine    Industrie cinématographique : il était une fois Ouarzazate ?    FITC : Vingt ans sur les planches et pas une ride    Rose à parfum : une production annuelle de 4.100 tonnes    IBM Accélère la Révolution de l'IA Générative en Entreprise avec des Capacités Hybrides    Prix des Médias Arabes : Les gagnants dévoilés le 27 mai    L'aviation pakistanaise affirme sa supériorité en abattant des chasseurs indiens avancés dans leur propre espace aérien    Achraf Hakimi marque le but de la victoire, le PSG en finale de Ligue des champions    







Merci d'avoir signalé!
Cette image sera automatiquement bloquée après qu'elle soit signalée par plusieurs personnes.



What Morocco's largest data leak says about public cybersecurity [Interview]
Publié dans Yabiladi le 15 - 04 - 2025

Last week, Morocco fell victim to a major data breach after two of its public institutions were targeted in cyberattacks claimed by an Algerian hacking group. The incident has raised serious questions about the country's cybersecurity policies and the strategies in place to protect personal data and public institutions. Moroccan entrepreneur and consultant Youssef El Maddarsi, CEO of Naoris Consulting, offers insight. He leads initiatives at the crossroads of decentralized cybersecurity, blockchain, AI, and digital trust infrastructure.
Could you provide an overview of the cyberattacks on Morocco's Employment Ministry and CNSS? What methods did the attackers likely use to gain access to these systems?
The recent cyberattacks on Morocco's National Social Security Fund (CNSS) and the Ministry of Economic Inclusion have been described by analysts as the most significant data breach in the country's history.
According to analyses by The Record and the cybersecurity firm Resecurity, the attacks, believed to have been carried out by the Algerian hacker group JabaRoot DZ, likely exploited a zero-day vulnerability in a third-party Oracle-based system, which enabled them to infiltrate the network without detection.
Once inside, they reportedly bypassed internal security protocols and accessed large volumes of unencrypted data. Rather than deploying ransomware or demanding payment, the attackers appear to have quietly exfiltrated the data and later published it on Telegram. The absence of financial demands, combined with the strategic nature of the leak, has led some experts to suggest a political motive—although attribution in such cases should always be treated with caution pending official confirmation.
CNSS had warnings about its weak cybersecurity. Now that 2 million people's salary info got leaked, how could they have prevented this?
What makes this breach especially concerning is that it was not the first. In 2020, a previous incident exposed the personal data of over 3.5 million users due to an unsecured access point. Despite that earlier warning, several vulnerabilities persisted—particularly around access control, encryption practices, and third-party system oversight.
This incident underscores the urgent need to modernize and strengthen cybersecurity measures across Morocco's critical digital infrastructure. With well-established best practices—such as end-to-end encryption, zero-trust architecture, timely patching, and real-time threat detection—the risks could have been significantly reduced. Like in many public systems worldwide, this breach highlights the importance of elevating cybersecurity from a purely technical domain to a matter of strategic national importance.
These cyberattacks have been claimed by Algerian hackers, representing a continuation of mutual cyberattacks between Algerian and Moroccan hacker groups. How would you describe this cyber warfare?
These recent incidents did not occur in isolation—they form part of an increasingly visible pattern of mutual cyber operations between non-state actors in Algeria and Morocco. What we are witnessing is a form of undeclared, asymmetric cyber conflict, where hacker groups aligned with national narratives carry out attacks that reflect broader geopolitical tensions.
This tit-for-tat dynamic has clearly intensified over the past few years. What began as symbolic acts—such as website defacements—has evolved into high-impact data breaches affecting millions of citizens. If this cycle of escalation continues unchecked, we may eventually see attacks targeting critical infrastructure: power grids, financial systems, telecommunications, or transport networks.
While these are often framed as actions by unofficial groups, the strategic consequences are real. It underscores the urgent need for regional cyber diplomacy, stronger cross-border digital norms, and national-level cyber resilience to prevent these operations from triggering broader instability.
What are your immediate recommendations to address this situation swiftly and effectively?
The breach must be treated as both a national security risk and a wake-up call for long-overdue reform. In the immediate term, authorities should act on several urgent fronts.
1- They must contain the damage by monitoring where the leaked data is spreading and working with platforms to restrict its circulation. The National Commission for Personal Data Protection (CNDP) has already cautioned against unauthorized use—this message must be enforced.
2- Morocco's public institutions need to conduct a full security audit of critical systems; particularly where third-party software is involved. Patching known vulnerabilities, strengthening authentication protocols, and deploying continuous threat detection systems are immediate priorities.
3- Cyber awareness across all government IT personnel must be significantly upgraded. Social engineering and phishing remain the most common points of entry for attackers. Training, red teaming, and policy enforcement must all be intensified.
4- Authorities should consider engaging with international cybersecurity experts to help fortify the country's digital infrastructure and ensure best-in-class practices are implemented without delay.
5- This escalating pattern of cyber retaliation between non-state actors in the region calls for the establishment of regional diplomatic frameworks around cyber norms and shared digital resilience. Without coordinated response mechanisms, the risks of disruption and escalation will only grow.
How do these cyberattacks impact public trust in government institutions, particularly concerning data protection and digital services?
This breach has had a significant impact on public trust. When an institution like CNSS—responsible for pensions, health coverage, and social benefits—is compromised so extensively, it casts doubt on the security of all digital public services. Citizens are understandably concerned about identity theft, fraud, and how their most sensitive information is being managed.
But this goes beyond one breach. It exposes a systemic issue: centralization. When security depends on a single point of failure, the entire infrastructure becomes fragile. Once that single door is forced open, everything behind it is exposed. This is precisely what happened.
To rebuild trust, Morocco must go beyond short-term fixes. The country needs to rethink the foundation of its cybersecurity approach. Decentralized cybersecurity architectures replace centralized bottlenecks with a mesh of interconnected nodes that validate, isolate, and respond to threats autonomously.
Had such a system been in place, the impact would have been drastically reduced. Compromised systems could have been automatically quarantined, sensitive data would have remained encrypted and unreadable, and essential services could have continued operating securely even under attack.
This isn't theoretical. In real-world use, decentralized cybersecurity models have already blocked billions of threats, detecting and neutralizing anomalies before they cause harm. They create self-healing, sovereign digital ecosystems that become more resilient with every attempted breach.


Cliquez ici pour lire l'article depuis sa source.