Tagged: Bashe Ransomware group (APT73), Breach, Data Leak, DPWH Philippines, MSOC in the Philippines, Ransomware
- This topic has 0 replies, 1 voice, and was last updated 1 month ago by
Rameses Quiambao.
- AuthorPosts
- March 30, 2026 at 11:51 am #1844
Rameses Quiambao
ParticipantSummary
On March 29, 2026, the Department of Public Works and Highways (DPWH) ransomware incident has escalated following partial data leaks attributed to the Bashe Ransomware group (APT73).
The threat actor claimed to have exfiltrated approximately 50GB of data, with an initial 1.77GB sample already released and analyzed.
Initial findings confirm compromise of the DPWH mail system, exposing internal communications and sensitive datasets.
Research Source
According to analysis from Deep Web Konek (DWK Team), the leaked data was validated after being published by the threat actor on its leak site.
The dataset appears to originate from direct mail server or backup extraction, rather than manual collection.
Technical Details
Analysis of the leaked 1.77GB dataset revealed:
• Over 2,000 email files
• More than 78,000 email records extracted
• Nearly 2,000 URLs
• Over 7,000 contact numbers
• Linked datasets containing names, emails, job titles, and affiliationsThe structure of the data suggests:
• Bulk extraction from mail archives
• Timestamped and organized email records
• Inclusion of attachments and bundled communicationsObserved Attack Activity
Threat Actor
• Bashe Ransomware (APT73)Initial Access & Exfiltration
• Compromise of mail system infrastructure
• Extraction of bulk email archives and datasetsData Leak Activity
• Release of 1.77GB sample data
• Claim of total 50GB exfiltrated dataExposed Content
• Internal government communications
• Inter-agency emails across Philippine government domains
• Procurement and flood control documents
• Citizen-submitted complaints (potential PII exposure)
• Internal URLs and non-public system linksPotential Risks
• Exposure of internal infrastructure
• Leakage of sensitive communications
• Aggregation of government-related intelligenceImpact
The breach may result in:
• Exposure of sensitive government communications
• Potential compromise of personally identifiable information (PII)
• Increased risk of phishing and social engineering
• Disclosure of internal systems and infrastructure links
• Reputational and operational impact to DPWH and related agenciesThe presence of cross-agency communication data increases the risk beyond a single organization, potentially affecting multiple government entities.
Mitigation
Recommended actions include:
Conduct full forensic investigation of affected systems
Reset credentials associated with compromised mail systems
Review and restrict access to internal portals and URLs
Monitor for phishing attempts using leaked data
Notify affected individuals if PII exposure is confirmed
Strengthen email security and backup protection mechanismsGovernment agencies should also coordinate incident response across affected departments.
- AuthorPosts
- You must be logged in to reply to this topic.
