EXPOSED CREDENTIALS & HASHES ============================ Source: ergit.presidencia.gov.co ArcGIS Extracted: January 5, 2026 ================================================================================ [1] SUMMARY ================================================================================ | Type | Count | |-------------------|-------| | Total Emails | 460 | | Government Emails | 113 | | Usernames | 3 | | Hashes/GUIDs | 103 | All saved to: C:\Users\Squir\Desktop\NARCO COUNTER OPS\COLOMBIA\Credentials\ ================================================================================ [2] KEY GOVERNMENT EMAILS EXPOSED ================================================================================ PRESIDENCIA.GOV.CO: - alejandrazuleta@presidencia.gov.co - fernandoguevara@presidencia.gov.co - jaidycaro@presidencia.gov.co MUNICIPAL GOVERNMENT: - PERSONERIA@ANORI-ANTIOQUIA.GOV.CO - PERSONERIA@ITUANGO-ANTIOQUIA.GOV.CO - PERSONERIADETAME@ARAUCA.GOV.CO - personeria@tame-arauca.gov.co - (109 more .gov.co emails) ================================================================================ [3] USERNAMES EXPOSED ================================================================================ - angiemontoya - maicolvelasquez - Esri_Anonymous (system account) ================================================================================ [4] HASHES EXTRACTED ================================================================================ 103 hashes extracted (MD5/GUID format) Sample: - 07c69577ecf4431b997679265794deeb - 084deb0f45f2449b980176d80eb265f6 - 08b761a7d5c24f37af29dafbe6756f9f - 09830a5d62de4ade85341adaaf08e393 - (See Hashes/HASHES.txt for full list) Note: These appear to be ArcGIS service GUIDs rather than password hashes. However, they could be useful for: - Identifying specific services - Correlation with other data - Understanding system architecture ================================================================================ [5] PORTAL INFORMATION ================================================================================ Portal ID: 0123456789ABCDEF Portal Name: ArcGIS Enterprise Version: 11.3.0 URL: ergit.presidencia.gov.co/arcpre Auth: Token-based (but data publicly accessible) Token URL: https://ergit.presidencia.gov.co/arcpre/sharing/rest/generateToken ================================================================================ [6] FILES SAVED ================================================================================ C:\Users\Squir\Desktop\NARCO COUNTER OPS\COLOMBIA\Hashes\ ├── EMAILS.txt (460 emails) ├── GOV_EMAILS.txt (113 .gov.co emails) ├── USERNAMES.txt (3 usernames) └── HASHES.txt (103 hashes) ================================================================================ [7] INTELLIGENCE VALUE ================================================================================ These exposed credentials enable: 1. Phishing campaigns against gov employees 2. Credential stuffing attacks 3. Social engineering targets identified 4. Internal org structure mapping 5. Correlation with other breaches OPSEC FAILURE: - Government employee emails exposed in public data - Municipal officials' emails in protection request data - Usernames from ArcGIS editors exposed ================================================================================