Skip to content

Alleged Sale of Uganda Public Service Commission Job Application Database Containing 7.5 GB of Applicant Records

Dark Web Informer — Cyber Threat Intelligence

Alleged Sale of Uganda Public Service Commission Job Application Database Containing 7.5 GB of Applicant Records

February 1, 2026 — 12:56 AM UTC Uganda Government Administration
🧩
Standalone API Access Now Available High-volume threat-intelligence data, automated ingestion endpoints, ransomware feeds, IOC data, and more.
View API

Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Foundational access to breach intelligence. Track breaches, leaks, and threats in real time with high quality screenshots and concise expert summaries.

📚
5,100+ Blog Posts (PRO/ELITE)Continuously updated breach reports and threat summaries.
📢
52,200+ Alerts (PRO/ELITE)Daily breach, leak, and DDoS alerts.
📤
Unredacted Threat FeedLive tracking with JSON export.
🔍
Leak and Breach CoverageDirect access to claims and posts.
📡
Snippets and Quick FactsConcise summaries of DDoS, defacements, and breaches.
🌐
500+ Onion and Clearnet ResourcesVerified index of dark web sites and services.
📊
Real Time Uptime DashboardLive status of 500+ sites.
🤖
Whiteintel.io APIIntegrated checks inside breach posts.
🖼️
High Resolution ImagesUncompressed, watermark free evidence.
🔑
Keyword NotificationsBrowser alerts for tracked terms.

Quick Facts

Date & Time
2026-02-01 00:56:20 UTC
Threat Actor
Daku
Victim Country
🇺🇬 Uganda
Industry
Government Administration
Victim Organization
Uganda Public Service Commission (PSC)
Category
Data Breach
Severity
🔴 High
Network
Open Web

Incident Overview

A threat actor using the handle "Daku" has posted a listing claiming to sell a database from the Uganda Public Service Commission (PSC) online job application portal. The PSC is the official government body responsible for advertising and managing public sector job vacancies in Uganda, operating at vacancies.psc.go.ug.

The listing claims the dataset is 7.5 GB in size and contains personal and identification details of job applicants, including surnames, names, dates of birth, national ID numbers, village information, and personal photographs. The threat actor is asking $300 for the database and provided a sample record as proof.

Compromised Data Categories

Surnames Names Dates of Birth National ID Numbers Village Information Personal Pictures

MITRE ATT&CK Tactics & Techniques

T1190
Initial Access
Exploit Public-Facing Application
T1213
Collection
Data from Information Repositories
T1078
Persistence
Valid Accounts
T1530
Collection
Data from Cloud Storage

Breach Claim URL

Check the Threat Feeds and/or Ransomware Feeds in the subscribers area.

Image Preview

Breach evidence screenshot

Unlock Exclusive Cyber Threat Intelligence

Powered by DarkWebInformer.com

Foundational access to breach intelligence. Track breaches, leaks, and threats in real time with high quality screenshots and concise expert summaries.

📚
5,100+ Blog Posts (PRO/ELITE)Continuously updated breach reports and threat summaries.
📢
52,200+ Alerts (PRO/ELITE)Daily breach, leak, and DDoS alerts.
📤
Unredacted Threat FeedLive tracking with JSON export.
🔍
Leak and Breach CoverageDirect access to claims and posts.
📡
Snippets and Quick FactsConcise summaries of DDoS, defacements, and breaches.
🌐
500+ Onion and Clearnet ResourcesVerified index of dark web sites and services.
📊
Real Time Uptime DashboardLive status of 500+ sites.
🤖
Whiteintel.io APIIntegrated checks inside breach posts.
🖼️
High Resolution ImagesUncompressed, watermark free evidence.
🔑
Keyword NotificationsBrowser alerts for tracked terms.

Latest