Anatomy of a Breach

Anatomy of a Breach: Philippines COMELEC — 55 Million Voters' Personal Data Published Online

> series: anatomy_of_a_breach —— part: 088 —— target: philippines_comelec —— records: 55,000,000 —— data: fingerprints_passports<span class="cursor-blink">_</span>_

Hedgehog Security 30 April 2016 12 min read

55 million voters. Fingerprints. Passport numbers. Published online before an election.

In March 2016, hacktivist group Anonymous Philippines defaced the website of the Commission on Elections (COMELEC), demanding improved security for vote-counting machines ahead of the May 2016 Philippine general election. Days later, a separate group calling themselves LulzSec Pilipinas published the entire COMELEC voter database online — approximately 55 million records containing names, addresses, dates of birth, marital status, passport numbers, and — for voters who had registered using the new biometric system — fingerprint data.

The breach exposed the personal data of virtually the entire voting-age population of the Philippines (approximately 60 million registered voters) just weeks before a national election. The leaked data — searchable online — created risks of identity theft, voter intimidation, and targeted disinformation at a national scale. The breach also included data on overseas Filipino voters, extending the exposure to Filipino communities worldwide. Trend Micro, which analysed the leaked data, described it as potentially the largest government data breach in history at the time.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Voter data breaches threaten democratic processes.

The COMELEC breach occurred in the same year as the DNC hack — together establishing 2016 as the year election security became a global concern. While the DNC hack targeted a political party, the COMELEC breach targeted the electoral infrastructure itself — the voter rolls that underpin the democratic process.

Biometric Data Cannot Be Reset
Like the <a href="/blog/anatomy-of-a-breach-opm">OPM fingerprint theft</a> in 2015, the COMELEC breach exposed biometric data that cannot be changed. Stolen fingerprints represent a permanent compromise — those 55 million individuals' biometric identifiers are compromised forever. For organisations deploying biometric systems, our <a href="/penetration-testing/infrastructure">security assessments</a> evaluate biometric data protection.
Election Integrity at Risk
Voter data can be used for targeted disinformation, voter intimidation, and manipulation of electoral processes. The breach occurred weeks before a national election, creating maximum potential for democratic disruption. For <a href="/blog/sector-under-the-microscope-local-government">UK local government</a> bodies responsible for electoral processes, the COMELEC breach demonstrates the critical importance of securing voter data.
Government Databases Remain Under-Protected
From <a href="/blog/anatomy-of-a-breach-hmrc-child-benefit-data-loss">HMRC</a> (2007) through <a href="/blog/anatomy-of-a-breach-opm">OPM</a> (2015) to COMELEC (2016), government databases consistently demonstrate inadequate security relative to the sensitivity of the data they hold. <a href="/cyber-essentials">Cyber Essentials</a> provides the baseline for public sector data protection.
Hacktivism and Election Timing
The breach was motivated by hacktivist concerns about election security — but the resulting data publication created exactly the kind of threat to electoral integrity that the hacktivists claimed to oppose. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for hacktivist reconnaissance and <a href="https://www.cyber-defence.io/services/threat-intelligence">UK Cyber Defence's threat intelligence</a> tracks hacktivist activity targeting specific sectors.

Voter data demands the highest protection.

For any organisation responsible for electoral data — local councils, electoral registration officers, election technology vendors — the COMELEC and OPM breaches establish that voter and citizen data must be protected with controls commensurate to its sensitivity and the catastrophic consequences of its exposure. Cyber Essentials certification, regular penetration testing, continuous SOC monitoring, and incident response capability are not optional for organisations that hold the data that underpins democratic processes.


55 million voters exposed. Does your organisation hold citizen data?

<a href="/penetration-testing">Penetration testing</a> secures your databases. <a href="/cyber-essentials">Cyber Essentials</a> establishes the baseline. <a href="https://www.socinabox.co.uk/sectors/local-councils">SOC in a Box for Local Government</a> monitors 24/7.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles