The National Telecommunications Commission (NTC) of the Philippines has reportedly suffered a significant data breach, with sensitive information allegedly leaked on the hacking forum BreachForums.
The threat actor “ph1ns,” linked to previous high-profile breaches in the country, claims responsibility for compromising internal NTC systems and exfiltrating datasets containing regional records, email addresses, municipalities, phone numbers, and cell IDs.
Overview of the Breach
According to posts on BreachForums, the breach exposed Personally Identifiable Information (PII) tied to NTC operations, including administrative records and telecommunications metadata.

The leaked data could enable identity theft, social engineering attacks, or SIM-swapping fraud by malicious actors.
Notably, “ph1ns” has a history of targeting Philippine entities, including the Philippine National Police (PNP) logistics system and Acer Philippines, where third-party vendor vulnerabilities led to employee data theft.
The NTC has not yet confirmed the breach’s scope but is coordinating with the National Privacy Commission (NPC) and Cybercrime Investigation and Coordinating Center (CICC) to investigate.
Technical Analysis
- Attack Vector: Preliminary reports suggest the breach involved exploiting unpatched vulnerabilities in NTC’s web infrastructure, potentially via SQL injection or compromised third-party vendors. the threat actor may have deployed malware to establish persistence or used phishing campaigns to gain initial access.
- Data Exposed:
- Personally Identifiable Information (PII): Email addresses, phone numbers, and regional identifiers.
- Telecom Metadata: Cell tower IDs (cell IDs) and municipal network logs, which could reveal user location patterns.
- Threat Actor Profile:
- ph1ns: Known for leaking SQL databases and targeting government systems. Their tactics include data-wiping attacks and leveraging dark web markets to monetize stolen data.
- BreachForums: A notorious platform for trading breached data, recently linked to leaks involving 390,000 PNP officers and Acer Philippines’ HR records.
Implications and Risks
- Identity Fraud: Exposed PII could be weaponized for financial scams or credential-stuffing attacks.
- Network Mapping: Cell ID data might aid in geolocation tracking or infrastructure mapping for future attacks.
- Third-Party Exposure: The breach underscores risks associated with vendor management, as seen in Acer Philippines’ 2024 breach via an attendance-system provider.
Mitigation Efforts
The NTC has initiated digital forensics to trace the breach’s origin and assess potential lateral movement within its systems.
Recommendations include:
- Encryption: Implementing end-to-end encryption for sensitive databases.
- Multi-Factor Authentication (MFA): Enforcing MFA for administrative access to prevent credential harvesting.
- Vulnerability Patching: Addressing zero-day exploits and outdated software.
Historical Context
This incident follows a pattern of cyberattacks on Philippine agencies, including the May 2024 PNP logistics breach and the 2024 Acer Philippines HR data theft.
“ph1ns” has repeatedly exploited weak access controls and insufficient encryption, highlighting systemic cybersecurity gaps in critical infrastructure.
The NTC breach underscores the urgent need for robust incident response plans and adherence to frameworks like the Data Privacy Act of 2012 to mitigate future risks.
Also Read: