- 2
- April
Personal data of over 66 million Thai citizens — nearly the entire population — has been put up for sale on the Dark Web for just 1,650 baht ($46 USD). The leaked data includes Universal Coverage Scheme (Gold Card) records, Social Security records, civil servant healthcare records, and hospital names where individuals received treatment. Even the Prime Minister's data was not spared. This article provides a technical analysis of how it happened, how to check if your data was compromised, and what government IT systems must do to prevent it from happening again.
Timeline of Major Thai Data Breach Incidents:
- Mar 2023 — 9Near: A hacker claimed to possess data of 55 million Thai citizens from the Mor Prom (Doctor Ready) app, including full names, national ID numbers, addresses, and phone numbers
- Jan 2024 — Elderly Database: 20 million records from the Department of Older Persons, OBEC, and the Volunteer Defense Corps were sold on the Dark Web
- 2024 — Government Agency: A government web application was hacked, leaking data of 200,000 individuals. The Personal Data Protection Committee (PDPC) imposed a 15 million baht fine
- Feb 2026 — Social Security App: After an update to the SSO Connect app, addresses were swapped — users could see other people's addresses in their personal data
- Mar 2026 — Move Forward Party (Successor): Member data was leaked, including national ID card images used for registration
- 2026 — 66 Million Records: Healthcare entitlement data of nearly all Thai citizens was sold on the Dark Web for 1,650 baht
Technical Analysis — How Did This Happen?
Large-scale data breaches rarely stem from a single cause. They are typically the result of multiple vulnerabilities converging within a system. Based on analysis of past incidents, the most common causes found in Thai government IT systems are as follows:
1. APIs Without Authentication (Broken Authentication)
Many systems expose API endpoints that allow data retrieval without login credentials, or use simple API keys that are never rotated. Hackers can write scripts to scrape data record by record around the clock, as these systems lack rate limiting or alerts for abnormal data access volumes.
2. Unpatched SQL Injection Vulnerabilities
SQL Injection is a vulnerability that was first discovered over 25 years ago, yet it remains prevalent in government web applications. When systems fail to use Parameterized Queries, hackers can inject SQL commands through input fields or URLs and extract entire databases in a single attack.
3. Publicly Exposed Databases (Misconfigured Database)
Many databases (such as MongoDB, Elasticsearch) are configured to be accessible from the internet without requiring a password. This typically occurs when systems are deployed with default configurations without changing the binding address or properly configuring the firewall. Tools like Shodan and Censys continuously scan for exposed databases worldwide.
4. Insider Threat — The Enemy Within
In many cases, data is not hacked from the outside but rather "extracted" by insiders with access privileges. These may be IT staff, contract employees, or outsourced companies that have been granted full admin access without any auditing in place.
5. No Data Processing Agreement (DPA) with Developers
The 2024 case where PDPC imposed a 15 million baht fine clearly demonstrated that government agencies outsourced web application development but had no Data Processing Agreement (DPA), no verification of the developer's security standards, no security audit before going live, and used weak passwords.
6. Unencrypted Data (No Encryption at Rest)
Even if hackers breach a system, properly encrypted data (AES-256 or similar) would be unreadable. However, most government systems store personal data as plain text — national ID numbers, names, addresses, and phone numbers without any encryption whatsoever.
Common Vulnerabilities Found in Thai Government IT Systems:
| Vulnerability | Severity | Found In |
|---|---|---|
| Broken Authentication / No Auth API | Critical | Mor Prom, Social Security |
| SQL Injection | Critical | Multiple government web apps |
| Misconfigured Database | High | Common in MongoDB, Elasticsearch |
| No Encryption at Rest | High | Nearly every incident |
| No DPA with Vendors | Medium | PDPC 15M baht fine case |
| Insider Threat / Over-privileged Access | High | Multiple undisclosed cases |
Check Yourself — Has Your Data Been Compromised?
When a large-scale data breach occurs, the first thing to do is check whether your data has been affected:
For Individuals
- Check via Have I Been Pwned (haveibeenpwned.com) — enter your email to check if your data has been leaked in any known breach
- Check the Social Security App (SSO Plus) — open the SSO Plus app to verify that your address, phone number, and email are correct
- Change your passwords immediately — especially for systems that use your national ID number as the username; change all passwords
- Enable Two-Factor Authentication (2FA) — enable two-factor authentication on every service that supports it
- Beware of scams — after data leaks, scammers often call pretending to be banks, Social Security, or government agencies, using your real data to appear more credible
For IT Administrators / Organizations
- Review Access Logs — check for abnormal database access volumes, such as queries pulling hundreds of thousands of records in a short time
- Run Vulnerability Scans — use tools like OWASP ZAP, Nessus, or Burp Suite to scan for SQL Injection, XSS, and other vulnerabilities
- Monitor the Dark Web — use Dark Web Monitoring services (such as SpyCloud, Have I Been Pwned for Domain) to check if organizational data is being sold
- Review Access Privileges — audit who has access to what data and revoke unnecessary permissions
Why Do Government Systems Keep Getting Breached?
A question many people ask is why Thai government IT systems suffer repeated data breaches. The true structural causes are multifaceted:
- IT budgets are focused on "building," not "maintaining" — government agencies typically have budgets for developing new systems but no budget for security audits, penetration testing, or post-launch system monitoring
- Outsource and forget — external companies are hired to develop systems, but there is no code review, security testing, or even a DPA before project handover
- No dedicated Security Team — many agencies lack a dedicated cybersecurity team, relying on general IT staff to handle everything from computer repairs to database management
- Legacy systems never updated — many systems were built over 10 years ago using outdated frameworks with known vulnerabilities, but there is no budget or personnel to update them
- No strict legal enforcement — although Thailand has the Personal Data Protection Act (PDPA), penalties remain lenient and enforcement is inconsistent, compared to Europe's GDPR which can fine up to 4% of a company's total revenue
How to Prevent — Security Checklist for Government IT Systems
Based on past lessons, here is a checklist that government (and private) IT systems should have at minimum:
Security Checklist for Systems Storing Personal Data:
Level 1: Basic (Must Have)
- Encrypt personal data in the database (Encryption at Rest — AES-256)
- Encrypt data in transit (Encryption in Transit — TLS 1.2+)
- Use Parameterized Queries to prevent SQL Injection on every endpoint
- All APIs must have Authentication + Authorization
- Set Rate Limiting for every API endpoint
- Change Default Credentials on all systems
- Firewall — close all unnecessary ports
Level 2: Monitoring (Should Have)
- Conduct Penetration Tests at least once per year
- Vulnerability Assessments every quarter
- Role-Based Access Control (RBAC) — grant only necessary permissions
- Audit Logs for all personal data access, retained for at least 1 year
- Establish Data Processing Agreements (DPA) with all developers
- Code Review before every deployment
Level 3: Advanced (Recommended)
- Security Information and Event Management (SIEM) for real-time monitoring
- Data Loss Prevention (DLP) to prevent internal data leaks
- Zero Trust Architecture — trust no one, verify every time
- Incident Response Plan — practiced with live drills annually
- Bug Bounty Program — allow external experts to report vulnerabilities
Lessons for Government ERP Systems
ERP systems are the backbone of any organization, storing everything from employee data (HR) and financial records (GL) to vendor and customer information (AP/AR). If an ERP system is breached, the impact is many times more severe than breaching any other system.
What a good ERP system must have from the design stage (Security by Design):
- Role-Based Access Control (RBAC) — each user sees only the data they need. Procurement staff should not be able to see salary information
- Audit Trail for every action — who did what, when, and what data was modified must be fully traceable
- Encryption both at Rest and in Transit — data in the database and data transmitted between client-server must be encrypted
- Two-Factor Authentication — not just passwords; two-factor verification is required for accessing sensitive data
- No reliance on Third-party Cloud without DPA — choose systems deployed on your organization's own servers, or cloud providers with clear compliance
Warning for Government IT Executives:
Data breaches are not a matter of "if" but "when" — every system storing personal data is at risk. What separates secure organizations from breached ones is preparation, not hoping it won't happen. Agencies that have not yet conducted a Security Audit should start today — don't wait for an incident to happen first.
IT Maintenance Budget — How Much Should You Spend?
The primary reason government IT systems keep getting breached is that there is always budget for purchasing new systems, but little to no budget for maintenance. Many agencies invest tens of millions of baht building systems, but once the project is delivered, there is no budget for ongoing maintenance. It's like buying a new car and never changing the oil.
How Much Should IT Maintenance Cost?
International standards (Gartner, NIST) recommend that maintenance budgets should be 15-20% of the system's value per year. For Thai government agencies, the breakdown is as follows:
| Item | Budget Proportion | Example (10M Baht System) | Activities |
|---|---|---|---|
| Software Maintenance | 5-8% | 500,000-800,000/year | Patch updates, bug fixes, system updates for new regulations |
| Security Operations | 3-5% | 300,000-500,000/year | Penetration Test, Vulnerability Scan, Security Audit, Monitoring |
| Infrastructure | 3-4% | 300,000-400,000/year | Server costs, backup, SSL certificate, domain, cloud hosting |
| Training & Awareness | 1-2% | 100,000-200,000/year | Security Awareness training for staff, Incident Response drills |
| Incident Response Reserve | 2-3% | 200,000-300,000/year | Emergency reserve fund, forensics, PDPC notification |
| Total | 15-20% | 1.5-2.0 million/year | For a system valued at 10 million baht |
Note for Smaller Systems:
The 15-20% ratio applies to systems valued at 10 million baht or above. For smaller systems, the maintenance budget may need to exceed 20% because fixed costs such as Security Audits and Backup Infrastructure do not scale down with system value — a 3-million-baht system requires the same security monitoring as a 10-million-baht one.
The Reality in Thai Government:
Most agencies allocate only 3-5% of system value for IT maintenance — or in some cases, nothing at all. After the development contract ends, no one maintains the system — no patch updates, no vulnerability scanning — until it becomes an "orphaned system" waiting to be breached.
What Maintenance Should Cover — By Frequency
Daily Operations
- Verify Backup completion — both database backup and file backup
- Monitor Server uptime, CPU, Memory, Disk usage
- Review Security Logs — check for abnormal login attempts
- Verify SSL certificate has not expired
Weekly
- Apply OS security patches
- Review Firewall rules — check for unnecessarily open ports
- Check Disk space — clean old logs, temp files
- Test Backup restore — a backup that has never been restore-tested is not a backup
Monthly
- Vulnerability Scan with automated tools
- Review User accounts — disable accounts for departed or expired-contract staff
- Review Access privileges — check for over-privileged users
- Apply Application patches (ERP, middleware, libraries)
- Check Database performance — identify abnormally slow queries
Quarterly
- Security Assessment / Mini Penetration Test
- Review Disaster Recovery Plan
- Conduct Security Awareness training for staff
- Review DPA with external vendors
Annually
- Full Penetration Test by external specialists
- Security Audit against standards (ISO 27001, NIST CSF)
- Incident Response drill — simulate a data breach scenario
- Review PDPA Compliance policies
- Upgrade hardware past warranty expiry
Monthly Reports for Management
IT system administrators (or contracted maintenance companies) should prepare a Monthly Security & Operations Report for management every month. The report should contain at minimum the following:
Monthly Security & Operations Report Outline:
1. Executive Summary
- Overall status: Secure / At Risk / Critical
- Key incidents in the past month (if any)
- 3 key metrics: Uptime %, Number of vulnerabilities found, Number of anomalous events
2. System Availability Report
- Uptime/Downtime of core systems (target: 99.5%+)
- Root cause of downtime (if any) and remediation plan
- Performance metrics: Response time, concurrent user count
3. Security Report
- Vulnerability scan results: Count of Critical / High / Medium / Low
- Vulnerabilities remediated vs. outstanding (with reasons and remediation timeline)
- Number of abnormal failed login attempts
- Security patches installed this month
4. Backup & Recovery Report
- Daily backup status: Success / Failure
- Restore test results (at least once per month)
- Actual Recovery Time Objective (RTO) vs. target
5. User Access Report
- Active users, New users, Disabled users this month
- List of users with admin / super user privileges
- Accounts inactive for over 90 days (should be disabled)
6. Next Month's Plan
- Patches to be installed
- Planned improvements
- Budget spent vs. remaining
7. Recommendations / Risks Requiring Decisions
- Risks requiring management approval for budget/remediation plans
- System improvement proposals (if any)
This report does not need to be lengthy — 2-3 A4 pages is sufficient. What matters is that it is produced consistently every month and that management actually reads it, asks questions, and takes action. A report that nobody reads is no different from having no report at all.
The Cost of "Not Maintaining" vs. "Maintaining":
| Item | Prevention Cost (Per Year) | Damage Cost When Breached |
|---|---|---|
| Penetration Test | 200,000-500,000 baht | — |
| Security Monitoring | 300,000-600,000 baht | — |
| PDPC Fine | — | Up to 5 million baht |
| Forensic Investigation | — | 500,000-2,000,000 baht |
| Rebuilding the System | — | 5-20 million baht |
| Reputational Damage | — | Incalculable |
| Total Per Year | 1.5-2.0 million | 5.5-27+ million (one-time) |
As the table shows, prevention costs of 1.5-2 million baht per year are far cheaper than the 5.5-27 million baht damage from a single breach — not to mention the incalculable damage to public trust. A maintenance budget is not an "expense" but rather the most cost-effective "insurance policy" you can buy.
Conclusion
The 66 million record data breach is no surprise to cybersecurity experts, as the structural problems have existed for years — legacy systems, no auditing, no encryption, no DPA. Here is what each stakeholder should do now:
- Individuals: Change passwords, enable 2FA, watch out for scammers
- System Administrators: Run vulnerability scans, review access logs, audit access privileges
- Executives: Allocate budget for security audits, choose systems with Security by Design, establish DPAs with all vendors
Personal data of 66 million Thai citizens is being sold on the Dark Web for just 1,650 baht — cheaper than a year's worth of coffee. The question is: how much longer will government IT systems continue using the same standards?
— Saeree ERP Team
References
- 66 Million Thai Citizens' Data Leaked on Dark Web — TheThaiger
- Social Security App Update Causes Address Mix-up — Dailynews
- 9Near Hacks 55 Million Thai Citizens' Data — PPTVHD36
- Nearly 20 Million Elderly Records Leaked — Thai PBS
- Five data breach incidents in Thailand 2024: PDPC fines — Lexology
- 70% of Thai Population Data Leaked — PDPACore
