DepEd CAR Database Leak Exposes Over 6 Million Records, Including 30,000+ Teacher Personal Information

A massive data breach has struck the Department of Education – Cordillera Administrative Region (DepEd CAR), after a hacking group calling themselves Quantum Security Group claimed responsibility for successfully compromising internal systems and exfiltrating over six million records across 42 databases. Screenshots posted in underground forums reveal that the attackers gained full access to the database trainingdepedcardmsDB and other systems hosted under the DepEd CAR domain. The leaked Adminer SQL management panel shows tables containing hundreds of thousands of entries, such as those recording document tracking, internal memos, attachments, user tags, and official communications. For example, the document_track and document_track_dest_division tables alone contain nearly 200,000 records each, while the document table holds close to 26,000 entries. Attachments, memos, and other sensitive operational data also appear to have been taken. Upon reviewing the first batch of leaked files, the team confirmed the presence of more than 30,000 teacher records that go beyond basic personal identifiers. Each entry contains a full profile including employee ID, complete name, sex, and birth date, alongside demographic details such as ethnicity and educational attainment. These records also include work-related data such as office, division, section, and school assignments, as well as the teachers’ official position titles. Alarmingly, account information is also stored in the database: usernames, email addresses, and passwords, some of which appear to be in plaintext or weakly encrypted are linked to each user profile. Metadata such as account creation dates, last login attempts, and status fields (whether the account is active, permanent, or flagged for first-time login) further confirm that these are live, operational accounts connected to DepEd CAR’s systems. This means that not only personal information but also credentials that can be used for unauthorized access have now been exposed. Beyond the data theft, the attackers also defaced several DepEd CAR subdomains. Visitors to affected sites, including the verification portal, helpdesk, supply hub, HRMS system, and even testing environments found altered pages with derogatory messages and the suffix “/fuck.htm” added to URLs. The simultaneous defacement of multiple domains is strong evidence that the attackers maintained deep access across the organization’s infrastructure, not merely a single entry point. In their announcement, Quantum Security Group justified the attack by pointing to alleged corruption and negligence within government systems. Their message declared that while many of the stolen passwords were encrypted, others were not, and they emphasized that the breach was intended to serve as a “lesson” rather than a ransomware attack. The group warned that this incident should be taken as a wake-up call, writing: “You did not protect the data of DepEd CAR, this is your responsibility. You think you are safe? Think again a hundred times.” They also suggested that databases from other DepEd regions may already be in their possession.

Other contents

New Home For Deep Web Konek

New Home For Deep Web Konek

Nearly 1M DepEd Records Allegedly Exposed in Training Platform Breach, Claimed by NullSec Philippines

Nearly 1M DepEd Records Allegedly Exposed in Training Platform Breach, Claimed by NullSec Philippines

Philippine Drug Enforcement Agency Data Breached; Threat Actor Issues 48-Hour Ultimatum

Philippine Drug Enforcement Agency Data Breached; Threat Actor Issues 48-Hour Ultimatum

Alleged 13-Million Philippine Data Leak Emerges, Retail and Payment Ecosystem Under Investigation

Alleged 13-Million Philippine Data Leak Emerges, Retail and Payment Ecosystem Under Investigation

Multiple Fast Food Chains, Government Entities Potentially Exposed in Large-Scale Supply Chain Breach

Multiple Fast Food Chains, Government Entities Potentially Exposed in Large-Scale Supply Chain Breach

Initial Review of DPWH Ransomware Attack Confirms Exposure of Internal Communications

Initial Review of DPWH Ransomware Attack Confirms Exposure of Internal Communications

Fast Logistics Data Breach Exposes Employee Records and Internal Files

Fast Logistics Data Breach Exposes Employee Records and Internal Files

Jollibee Internal Portal Breach Exposes Thousands of Corporate Files

Jollibee Internal Portal Breach Exposes Thousands of Corporate Files

Unseen and Unchecked: It’s What We Refuse to See

Unseen and Unchecked: It’s What We Refuse to See

Dangerous Drugs Board Allegedly Breached, Sensitive Drug and Rehabilitation Records Exposed Online

Dangerous Drugs Board Allegedly Breached, Sensitive Drug and Rehabilitation Records Exposed Online