In early February, a concerning report surfaced on Reddit and DarkNet forums regarding Uzbekistan’s digital infrastructure: hackers claimed to have put a database containing nearly 15 million citizens’ personal information up for sale. This incident has once again placed the security of centralized identification systems at the center of national debate. According to these claims, the leak may have resulted from vulnerabilities within the Unified Identification System (OneID) or sub-systems operating via the OAuth protocol.
The leaked dataset reportedly includes critical identifiers such as personal identification numbers (JShShIR/PINFL), passport series and numbers, phone numbers, and residential addresses. While this data does not grant direct access to user accounts, it allows hackers to construct a comprehensive “social portrait” of almost any citizen. This significantly increases the potential for identity theft and fraud within digital environments where such data is used for verification.
The most critical aspect of this cyber crisis is the exposure of immutable identifiers like the PINFL. Unlike passwords or email addresses, a personal identification number remains unchanged throughout an individual’s life. This means the stolen database remains a “static arsenal” for hackers that can be exploited for years. To mitigate these risks, experts and government agencies are proposing a focus on two primary strategic directions:
- Enhancing identification protocols: Moving away from reliance on static text-based data (like PINFL and passport numbers) and implementing mandatory multi-factor authentication (2FA) and “Liveness Checks” (biometric verification) across all government and financial services. These measures render static databases ineffective during real-time identification processes.
- Cyber-hygiene and systemic oversight: Users must maintain heightened vigilance over their digital profiles, stay alert to social engineering attacks, and regularly monitor their credit histories. At the state level, there is a pressing need to increase the legal accountability of data operators and conduct rigorous, regular security audits of large-scale databases.
In conclusion, this event serves as a serious warning for Uzbekistan’s digital security strategy. Ensuring data privacy depends not only on the technical sophistication of the systems but also on the constant vigilance of both users and system administrators in an increasingly hostile cyber landscape.













