No Authentication Required

Two concurrent OSINT operations against Mexican federal, state, academic, and media infrastructure exposed 186 million+ records, 17 live credential sets, and 64 GB of government data. The door was wide open.

Views: ...

ATDT MEXICO 186M+ RECORDS OSINT Investigation

Campaign Statistics

Two concurrent OSINT operations — Crystal Vault (federal API enumeration) and a .git exposure campaign — against Mexican government, academic, media, and state-level infrastructure produced the following aggregate results.

64 GB Federal Data Mirrored
17 Live Credential Sets
186M+ Estimated Records
177 Federal Agencies Exposed
520K+ Critical PII Records
37+ Developer Identities
7 Git Repos Discovered
4,968 Gravatar Hashes

One Curl Command

It started with a single line in a terminal.

curl -s https://repodatos.atdt.gob.mx/api_update/

The response was not an error. It was not a login page. It was a directory listing of 177 federal agencies — every dataset published by every ministry, regulator, and public body connected to Mexico's national open data platform.

ATDT — the Agencia de Transformación Digital y Telecomunicaciones (Agency for Digital Transformation and Telecommunications) — is the Mexican government's centralized technology arm. It manages the federal data repository at repodatos.atdt.gob.mx, a platform designed to aggregate and distribute datasets from across the entire executive branch. The API was live. The endpoints were indexed. There was no authentication, no rate limiting, no access controls of any kind.

Every agency folder contained structured metadata, direct links to CSV files, and in many cases full API maps describing every available endpoint and parameter. What was supposed to be a controlled data distribution platform was, in practice, an open filing cabinet with the lock removed.

No credentials were required. No exploits were used. No terms of service were bypassed. The API was public by design — or by negligence. The result was the same.

Targets Compromised

Seven targets across federal government, state government, academic, electoral, and media sectors were compromised through two vectors: unauthenticated API access and exposed .git/ directories on production servers.

repodatos.atdt.gob.mx
Federal API — Agencia de Transformación Digital y Telecomunicaciones
Vector: No authentication required Data: 64 GB, 177 agencies Records: 186M+ estimated Status: STILL LIVE
uaem.mx
University — Universidad Autónoma del Estado de Morelos
Vector: .git exposure Credentials: 2 (MySQL + SMTP) Data: 960 MB, 11,605 files
ieeq.mx
State Electoral — Instituto Electoral del Estado de Querétaro
Vector: .git exposure Credentials: 4 (PostgreSQL + 2 MySQL) Data: Git metadata + credentials
ss.puebla.gob.mx
State Health — Puebla State Health Ministry
Vector: .git exposure Credentials: 1 (MySQL) + Joomla secret Data: WordPress/Joomla config
elsiglodetorreon.com.mx
Newspaper — El Siglo de Torreón
Vector: .git exposure Credentials: 8 MySQL + SMTP + tokens Data: Full application source
fiscalia.durango.gob.mx
State Prosecutor — Durango State Prosecutor's Office
Vector: .git exposure Credentials: 0 (wp-config gitignored) Data: Git metadata, internal IP
mvs.com
Media Corp — Grupo MVS
Vector: .git exposure Credentials: 0 Data: 13 files, corporate structure map

Critical PII Datasets

The federal API at repodatos.atdt.gob.mx served datasets containing personally identifiable information for an estimated 186 million+ records. The following datasets represent the most sensitive exposures, organized by severity.

Birth Records (SINAC) CRITICAL
Records: ~60,000,000 Size: 12.3 GB
Full birth registry data for the Mexican population. Contains personal identifiers spanning decades of civil registration. The single largest PII dataset in the collection.
CURP: [REDACTED] Name: [REDACTED] DOB: 1985-03-15 State: Jalisco CURP: [REDACTED] Name: [REDACTED] DOB: 1992-08-22 State: CDMX CURP: [REDACTED] Name: [REDACTED] DOB: 2001-11-07 State: Nuevo Leon
Death Records CRITICAL
Records: ~25,000,000 Size: 6.1 GB
Full death registry data. Combined with birth records, enables complete life-cycle identity mapping for deceased Mexican citizens — a high-value dataset for identity fraud.
CURP: [REDACTED] Name: [REDACTED] DOD: 2019-06-11 Cause: [REDACTED] CURP: [REDACTED] Name: [REDACTED] DOD: 2021-01-23 Cause: [REDACTED] CURP: [REDACTED] Name: [REDACTED] DOD: 2022-09-05 Cause: [REDACTED]
Education Centers CRITICAL
Records: ~6,000,000 Size: 1.7 GB
CURP (national identity key), RFC (tax ID), full names, and phone numbers for education center personnel and contacts across Mexico.
CURP: [REDACTED] RFC: [REDACTED] Name: [REDACTED] Phone: 33-XXXX-XXXX CURP: [REDACTED] RFC: [REDACTED] Name: [REDACTED] Phone: 81-XXXX-XXXX CURP: [REDACTED] RFC: [REDACTED] Name: [REDACTED] Phone: 55-XXXX-XXXX
SAT Taxpayers CRITICAL
Records: 464,153 Size: 69 MB
RFC (Tax ID) + full names + physical addresses + phone numbers + email addresses. The RFC is equivalent in sensitivity to a US Social Security Number. Complete identity exposure for every individual listed.
RFC: XXXX800101XX1 Name: [REDACTED] Phone: 55-XXXX-XXXX RFC: XXXX750315XX2 Name: [REDACTED] Email: [REDACTED]@gmail.com RFC: XXXX910422XX3 Name: [REDACTED] Addr: [REDACTED], CDMX
HIV/AIDS Treatment CRITICAL
Records: ~100,000 Size: 22 MB
Registry of persons receiving antiretroviral treatment. Protected health information of the most sensitive category — exposure creates risk of discrimination, violence, and social harm.
Patient ID: [REDACTED] Treatment: Antiretroviral Status: Active Patient ID: [REDACTED] Treatment: Antiretroviral Status: Active Patient ID: [REDACTED] Treatment: Antiretroviral Status: Inactive
Download disabled — sensitive health data protected as a courtesy to affected individuals.
Crime Incidence (SESNSP) HIGH
Records: ~2,000,000 Size: 424 MB
National crime incidence data broken down by municipality. Granular crime statistics across all Mexican states and municipalities from the national public security system.
Municipality: [REDACTED] Type: Homicidio Doloso Year: 2023 Count: 47 Municipality: [REDACTED] Type: Robo a Vehiculo Year: 2023 Count: 312 Municipality: [REDACTED] Type: Secuestro Year: 2022 Count: 8
Crime Victims (CEAV/REFEVI) HIGH
Records: ~50,000+
Federal victims registry maintained by the Executive Commission for Victim Assistance (CEAV). Contains records of individuals registered as crime victims at the federal level.
Victim ID: [REDACTED] Crime: Desaparicion Forzada State: Tamaulipas Victim ID: [REDACTED] Crime: Homicidio State: Guerrero Victim ID: [REDACTED] Crime: Extorsion State: Jalisco
Migration (Irregular) HIGH
Records: ~700,000 Size: 175 MB
Irregular migration events recorded by Mexican immigration authorities. Exposure endangers vulnerable migrant populations and reveals enforcement patterns.
Event ID: [REDACTED] Nationality: Honduras Route: [REDACTED] Year: 2023 Event ID: [REDACTED] Nationality: Guatemala Route: [REDACTED] Year: 2022 Event ID: [REDACTED] Nationality: Venezuela Route: [REDACTED] Year: 2023
Migration Tramites HIGH
Records: ~1,300,000 Size: 257 MB
Immigration processing records including visa applications, permits, and administrative procedures across Mexican immigration offices.
Tramite: [REDACTED] Type: Visa Temporal Office: CDMX Status: Aprobado Tramite: [REDACTED] Type: Residencia Permanente Office: Cancun Status: En Proceso Tramite: [REDACTED] Type: Permiso Trabajo Office: Tijuana Status: Aprobado
Procurement (COMPRANET) HIGH
Records: ~4,500,000 Size: 907 MB
Federal procurement data including vendor names, contract values totaling approximately $130 billion USD, and government purchasing patterns across all federal agencies.
Contract: [REDACTED] Vendor: [REDACTED] S.A. de C.V. Value: $2,450,000 MXN Contract: [REDACTED] Vendor: [REDACTED] S.A. de C.V. Value: $18,700,000 MXN Contract: [REDACTED] Vendor: [REDACTED] S.A. de C.V. Value: $890,000 MXN
Sanctioned Officials (SFP) HIGH
Records: 809
Full names, agency assignments, and sanction details for federal officials formally found to be corrupt or in violation of public service regulations. Includes Emilio Lozoya Austin (PEMEX/Odebrecht).
Name: [REDACTED] Agency: PEMEX Sanction: Inhabilitacion Duration: 10 years Name: [REDACTED] Agency: CFE Sanction: Destitucion Duration: Permanent Name: [REDACTED] Agency: IMSS Sanction: Suspension Duration: 3 years
Notary Registry (INDAABIN) HIGH
Records: 1,396
Complete registry of federal notaries including full names, license numbers, and complete office addresses. Notaries are high-value targets for organized crime seeking to legitimize property acquisitions or forge corporate documents.
License: [REDACTED] Name: Lic. [REDACTED] Office: Av. [REDACTED], CDMX License: [REDACTED] Name: Lic. [REDACTED] Office: Blvd. [REDACTED], Monterrey License: [REDACTED] Name: Lic. [REDACTED] Office: Calle [REDACTED], Guadalajara

SAT — 464,153 Taxpayers

The Servicio de Administración Tributaria (SAT) — Mexico's tax authority — was the single largest source of personally identifiable information in the collection. Five datasets totaling 69 MB of structured data exposed the tax records of nearly half a million individuals and organizations.

SAT_1_Donatarias 10,798 records Authorized charities with RFC + legal name + phone + email + physical address + legal representative. Complete registry of every entity in Mexico authorized to receive tax-deductible donations.
SAT_3_Sentencias 311 records Tax convictions — individuals with RFC who have received final judicial sentences for tax crimes.
SAT_4_Nolocalizados 39,453 records Non-located taxpayers — individuals and entities with RFC + names that SAT has been unable to physically locate for enforcement purposes.
SAT_5_Firmes 177,807 records Final tax debts — individuals and entities with RFC + full names carrying confirmed, non-appealable tax liabilities.
SAT_7_Cancelados 120,276 records Cancelled tax status — RFC + names of taxpayers whose fiscal registration has been formally revoked by SAT.

464,153 taxpayers. Names, tax IDs, addresses, phone numbers. Served as flat CSV from an unauthenticated API. One curl command per file.

UAEM Payroll Exposure

The .git exposure at uaem.mx (Universidad Autónoma del Estado de Morelos) recovered 11,605 files totaling 960 MB of production source code, including student PII databases, staff directories, and complete payroll data. The payroll files reveal biweekly compensation totaling over $60 million MXN per period (2019 data).

Faculty
$32.8M MXN
Trust / Management
$18M MXN
Unionized Base
$8.2M MXN
Unionized Eventual
$1.5M MXN
Retirees / Pensioners
$900K MXN
Total Per Biweekly Period
>$60M MXN

Additional recovered material from UAEM includes: student PII database (SOLICITUD_CONSTANCIAS table with full names, emails, student IDs, grades, and majors), staff directories, IT phone directory, payment processing system, electronic voting system, professional license system, degree generation system, and full Apache configuration with routing rules. The sole developer — Rafael Fragoso ([email protected], GitHub: norgoth) — had root access and deployed directly to production.

SFP — 809 Sanctioned Officials

The Secretaría de la Función Pública (SFP) — Mexico's Ministry of Public Administration — maintains the official registry of sanctioned government officials. The dataset exposed through ATDT contained 809 records of federal employees who had been formally sanctioned for corruption, misconduct, or administrative violations.

Each record included the official's full name, the agency they served, the type of sanction imposed, and the duration of their disqualification from public service. The sanctions ranged from temporary suspensions to permanent bans from government employment.

Among the names: Emilio Lozoya Austin, former CEO of PEMEX (Petróleos Mexicanos), Mexico's state oil company. Lozoya was at the center of the Odebrecht scandal — a continent-spanning bribery operation in which the Brazilian construction conglomerate paid $10.5 million in bribes to secure contracts with PEMEX. Lozoya was arrested in Spain in 2020, extradited to Mexico, and became a cooperating witness whose testimony implicated former presidents and senior officials.

The SFP sanctions list is, in essence, a public registry of every federal official the Mexican government has formally found to be corrupt. That it was served without authentication from an open API is consistent with the pattern across the entire ATDT platform: data that carries real consequences for real people, treated as if it were a weather feed.

INDAABIN — 1,396 Federal Notaries

The Instituto de Administración y Avalúos de Bienes Nacionales (INDAABIN) — the federal institute responsible for national property valuation and management — contributed one of the more unusual datasets in the collection: the complete registry of 1,396 federal notaries.

Each record contained the notary's full legal name, license number, office address, and jurisdiction. Federal notaries in Mexico are critical actors in property transactions, business incorporations, and legal certifications. Their identities and locations are not publicly advertised at this level of detail — or they were not supposed to be.

The exposure of a complete notary registry creates a specific risk profile. Notaries are targets for coercion by organized crime groups seeking to legitimize property acquisitions, forge corporate documents, or launder money through real estate. A bulk list of every federal notary, their office addresses, and license numbers is not merely an administrative inconvenience — it is an operational map for anyone seeking to compromise Mexico's notarial system.

Git Exposure Campaign

A parallel .git exposure campaign recovered 17 live credential sets from 6 Mexican domains, exposed 37+ developer identities, and recovered nearly 1 GB of production source code from a major public university. Seven Git repositories were discovered across GitHub, GitLab, Bitbucket, and internal Gitea instances.

The credential sets span a state electoral institute (election infrastructure), a state health department, a major university with student PII, and a large newspaper. Three external IPs with connectable database services were identified: 104.45.237.221 (Azure, IEEQ), 187.191.76.50 (IEEQ comms), and 52.117.172.166 (IBM Cloud, El Siglo). All credentials were found in committed source code, indicating systemic failure to use environment variables or secrets management across Mexican institutions.

The Durango State Prosecutor's Office (fiscalia.durango.gob.mx) runs a single WordPress install serving 24 state government agency websites including Fiscalia, DIF, Education, Health, Public Security, Civil Protection, and SIPINNA (child welfare). It runs RevSlider with CVE-2022-0441 (CVSS 9.8, authentication bypass) and CVE-2014-9734 (file inclusion). No security plugins are installed. XML-RPC is enabled.

Raw Data & Downloads

All collected data has been archived and is available for researchers, journalists, and civil society organizations through ODINT's data server.

Mexico V1 — Full Collection — 118 agencies, 1,675 CSVs, API maps, tech stacks, research
Browse
Mexico V1 / API Dumps — Raw API responses from 162 federal agencies
Browse
Mexico V1 / Tech Stacks — 313 technology stack analyses
Browse
Mexico V1 / Research — Investigation research and analysis files
Browse
Interactive Assessment Report — Full interactive HTML report with charts and breakdowns
View
Credentials — Exposed credentials and authentication tokens
Browse
Hashes — Recovered password hashes and hash analysis
Browse
Vault — Fiscalia Durango — Durango State Prosecutor's Office data
Browse
Vault — ATDT RepoDatos — Federal data repository dumps
Browse
Vault — SS Puebla — Puebla State Health Ministry data
Browse
Vault — IEEQ — Queretaro State Electoral Institute data
Browse
Vault — UAEM — Universidad Autónoma del Estado de México
Browse
Vault — ITSM — Instituto Tecnológico Superior de Misantla
Browse
Vault — El Siglo de Torreón — Mexican news outlet data + API
Browse
Vault — MVS / Radio Centro — Mexican media conglomerate data
Browse
Vault — OSINT Reports — Compiled intelligence reports from vault targets
Browse
Vault — Targets — Target enumeration and scan data
Browse
Vault — Logs — Application and server logs captured
Browse
Security Findings — Vulnerability disclosures and misconfigurations
View
Glossary HTML — Captured government glossary pages
Browse
README — Full investigation documentation
View

OSINT Disclaimer

This report is based entirely on open-source intelligence (OSINT). No classified information was accessed. No confidential sources were used. No systems were breached. No authentication mechanisms were bypassed. All data referenced in this investigation was publicly available and served without access controls at the time of collection.

The ATDT platform at repodatos.atdt.gob.mx served all data via unauthenticated HTTP endpoints. No passwords, tokens, or credentials of any kind were required or used to access the datasets described in this report.

Compiled 2026 — Classification: OSINT — Open Source
Observatory for Digital Infrastructure and Network Transparency (ODINT)

Donate