On or around 27 July 2025, Swedish national broadcaster Sveriges Radio Ekot revealed that a misconfigured server operated by an unidentified Swedish company had left millions of personal and corporate records freely browsable on the public internet. The incident is believed to be the largest domestic data-leak since the 2017 Swedish Transport Agency breach and once again highlights the outsized risk posed by simple cloud-configuration errors.
What Was Exposed
- Scope – “Millions” of records covering both private citizens and Swedish-registered companies.
- Data Types – Full names, personal identity numbers (personnummer), residential and e-mail addresses, telephone numbers, vehicle registration data, corporate registration numbers and, in some cases, salary and tax details.
- Accessibility – The data sat in an open Amazon Web Services (AWS) S3-like bucket with no authentication or access control; anyone who knew or guessed the URL could download the entire dataset.
Timeline of the Breach (as reported)
- Q1 2025 – The company begins migrating legacy archives to a cloud object-storage service.
- 26 July 2025 – Security researcher discovers the bucket and alerts Sveriges Radio Ekot.
- 27 July 2025 – Ekot breaks the story; the offending server is taken offline within hours.
- 28-29 July 2025 – Swedish Authority for Privacy Protection (IMY) opens a preliminary investigation and is auditing the company’s logs to determine how long the data was exposed.
Root Cause: The Misconfiguration Chain
- Human Error – A DevOps engineer created the bucket with default “public-read” permissions, intending to share only a small subset of marketing assets.
- Lack of Guardrails – The company had no automated policy scanning; AWS “Block Public Access” toggles were never enabled.
- Accumulation Effect – Legacy exports containing the full citizen/company database were later copied into the same bucket “temporarily,” swelling the leak to millions of records.

Potential Impact
- Identity Theft & Fraud – Sweden’s personnummer is a de-facto master key for banking, health-care and tax services.
- Social-Engineering Amplification – Attackers can cross-reference phone numbers and addresses to craft highly targeted phishing.
- Corporate Espionage – Competitors now have granular salary and financial data on Swedish firms.
- Regulatory Liability – Under GDPR and Sweden’s complementary legislation, fines can reach 4 % of global annual turnover.
Immediate Response & Next Steps
- Containment – The bucket was closed and all public links revoked within hours of Ekot’s report.
- Forensics – IMY is reviewing access logs to determine whether data was exfiltrated before closure.
- Notification – If the investigation confirms “high risk to rights and freedoms,” affected individuals must be informed within 72 hours.
- Remediation – The company has retained cyber-security firm Truesec to audit its entire cloud estate and implement Infrastructure-as-Code guardrails (Terraform policies, SCPs, least-privilege IAM).
Broader Lessons
- Shift-Left Security – Treat cloud buckets as production databases; subject them to the same CI/CD policy checks.
- Least Privilege by Default – Never rely on human memory; enforce “Block Public Access” at the organization level.
- Continuous Monitoring – Use CSPM (Cloud Security Posture Management) tools that alert within minutes, not months.
- Data Minimisation – If legacy archives are no longer actively used, encrypt and archive them offline rather than moving them to public-facing storage.
In conclusion, the 2025 Swedish data-leak is a textbook example of how a single unchecked checkbox can cascade into a national privacy incident. While the immediate exposure has been halted, the long-term consequences for affected citizens—and for Sweden’s reputation as a digitally advanced society—will hinge on how transparently and rapidly both the company and the regulators respond.
