The CTFC data breach has emerged as a significant cybersecurity incident impacting the Spanish research community. Devman, a known hacking group specializing in corporate and institutional extortion, has claimed responsibility for breaching the Centro de Ciencia y Tecnología Forestal de Cataluña (CTFC), or the Forest Science and Technology Centre of Catalonia. The attackers reportedly exfiltrated 30 gigabytes of data containing confidential scientific research, administrative communications, and financial information. A ransom demand of $248,000 has been issued, with the attackers threatening to publish the stolen materials if payment is not made before the November 16, 2025 deadline.
Background on CTFC
The Centro de Ciencia y Tecnología Forestal de Cataluña is a leading Spanish public research institution dedicated to advancing forest science, biodiversity conservation, and sustainable land management. Established in 1996, CTFC conducts research across forestry ecology, climate change adaptation, environmental restoration, and rural development. The center operates from its headquarters in Solsona, Spain, and collaborates with universities, government ministries, and private partners throughout Europe to develop data-driven solutions for forest and environmental management.
CTFC’s official website, ctfc.cat, highlights its mission to bridge science and policy by providing evidence-based insights into natural resource management. With a workforce composed of scientists, engineers, and environmental specialists, the institution has played an essential role in shaping sustainable forestry policies within Spain and the European Union. The organization’s research projects often involve sensitive ecological datasets, fieldwork documentation, and collaborative agreements with international institutions, making it a valuable target for cybercriminal groups seeking monetizable data.
Details of the CTFC Data Breach
According to information posted on Devman’s leak portal, the attackers infiltrated CTFC’s internal systems and extracted approximately 30 gigabytes of files. The stolen materials allegedly include project proposals, grant applications, research results, and employee correspondence. Devman’s message accompanying the listing suggests that the hackers discovered several unprotected databases and internal file servers during the intrusion, enabling them to exfiltrate the data without triggering immediate alerts. The group’s ransom demand is set at $248,000, payable in cryptocurrency, with a countdown timer giving CTFC four days to comply before publication.
- Threat Actor: Devman
- Date Observed: November 12, 2025
- Data Volume: 30 GB
- Ransom Demand: $248,000
- Sector: Scientific Research and Technology
- Location: Solsona, Catalonia, Spain
- Deadline: November 16, 2025
While the full extent of the breach has yet to be confirmed, early indicators suggest that the hackers accessed multiple servers containing both research and administrative data. These may include detailed field research datasets, unpublished environmental studies, staff information, and project funding documentation from collaborations with the Spanish Ministry for Ecological Transition and the European Commission.
Impact on Scientific Research and Institutional Operations
The impact of the CTFC data breach could be significant, particularly within Spain’s scientific and environmental research sectors. If Devman releases the stolen files, sensitive ecological data could become publicly accessible, undermining ongoing projects and exposing confidential research partnerships. Leaked grant applications or unpublished manuscripts could damage the credibility of research teams and potentially compromise intellectual property rights. Furthermore, environmental data collected across Catalonia’s forests may include geospatial and ecological mapping information that could be misused if accessed by unauthorized parties.
The breach also poses administrative risks. Exfiltrated files are believed to include internal communications between CTFC management, local government departments, and partner institutions. These communications may reveal strategic decisions, personnel data, and project timelines. The exposure of such information could hinder CTFC’s ability to maintain active collaborations or secure future research funding. For a publicly funded research institution, any compromise of confidential donor or project partner data could lead to reputational damage and loss of trust among stakeholders.
Devman’s Role and Attack Pattern
The Devman hacking group has gained notoriety throughout 2025 for targeting educational, research, and industrial organizations. Their strategy typically involves penetrating vulnerable networks through phishing campaigns or exploiting outdated web applications and remote access tools. Once inside, the attackers harvest data, encrypt key systems, and post a ransom demand with a strict payment deadline. Unlike many ransomware groups, Devman is known for exfiltrating large data volumes before initiating encryption, ensuring leverage even if the victim attempts recovery from backups.
Cybersecurity experts monitoring the group note that Devman often tailors its ransom amounts to the financial profile of its victims. In the case of the CTFC data breach, the $248,000 demand likely reflects an assumption of limited resources compared to private-sector organizations. The hackers’ dark web listing references “scientific files and research correspondence,” suggesting a focus on monetizing intellectual property rather than personal information. This approach aligns with Devman’s pattern of targeting specialized institutions where the value of data lies in its uniqueness and exclusivity.
Possible Methods of Intrusion
Preliminary analysis by security researchers indicates that the Devman intrusion into CTFC’s systems may have been facilitated through exposed network services or unpatched content management software. As research institutions often rely on open-source tools for collaboration and data sharing, they may inadvertently expose critical assets to the internet without adequate protection. Misconfigured servers and outdated security certificates have been common attack vectors in similar breaches involving academic or scientific organizations.
Phishing campaigns also remain a leading cause of such compromises. With large teams of researchers and administrative staff frequently exchanging documents via email, it is plausible that a malicious attachment or spoofed communication provided attackers with the necessary foothold. Once inside the network, Devman could have leveraged administrative privileges to access file storage systems, compress data archives, and exfiltrate them to external servers before detection.
Regulatory and Legal Considerations
The CTFC data breach will likely draw attention from Spanish and European regulatory authorities. As a publicly funded research organization, CTFC is bound by the European Union’s General Data Protection Regulation (GDPR) and Spain’s national data protection laws. These frameworks require organizations to report breaches involving personal or sensitive data within 72 hours of discovery. Failure to comply can result in penalties and public disclosure obligations that could further damage the institution’s reputation.
In addition to regulatory scrutiny, CTFC may face pressure from partner organizations and research consortia to clarify the scope of the incident and provide assurances regarding data integrity. Depending on the content of the stolen files, international research partners could pause collaboration or impose additional cybersecurity requirements before resuming data exchange. Transparency and prompt communication will be essential to maintaining trust across academic and governmental networks.
Reactions from the Research Community
Spanish cybersecurity professionals have expressed concern that the CTFC data breach reflects a broader vulnerability among academic and scientific institutions. Many research centers rely on legacy systems and underfunded IT departments, leaving them susceptible to ransomware operations. Experts from the National Cryptologic Center (CCN-CERT) have emphasized the need for continuous threat monitoring, routine patch management, and secure data sharing protocols for research organizations.
Academic peers have also warned that the exposure of raw environmental data could hinder global climate and forestry research efforts. CTFC’s datasets are often shared with other institutions for ecological modeling and conservation studies. A public leak could disrupt these partnerships or lead to the misuse of unverified information by third parties.
CTFC’s Response and Next Steps
As of this writing, CTFC has not issued an official public statement confirming the details of the breach. However, internal communications obtained by local media suggest that the institution is conducting an internal investigation in cooperation with Spanish law enforcement and cybersecurity agencies. IT staff have reportedly restricted external access to several internal systems while forensic analysis continues. Researchers have been advised to suspend data transfers and review account security settings.
Experts recommend that CTFC immediately implement the following steps:
- Engage third-party forensic analysts to assess network compromise depth and identify persistence mechanisms.
- Reset all employee passwords and review privileged access accounts.
- Temporarily suspend any remote desktop or VPN services until a full security audit is completed.
- Notify all potentially affected research partners and funding bodies of the incident.
- Begin drafting breach notifications in compliance with GDPR requirements to minimize regulatory risk.
It remains unclear whether CTFC intends to engage in ransom negotiations with Devman. Experts strongly discourage paying the ransom, as doing so does not guarantee data deletion and may encourage further attacks. Instead, the organization is advised to rely on incident recovery, data restoration, and transparency with stakeholders.
Global Context and Broader Implications
The CTFC data breach illustrates how cybercriminal groups are increasingly targeting academic and environmental institutions rather than traditional corporate entities. Research organizations hold vast amounts of proprietary data that are often inadequately protected, making them lucrative targets for extortion. These incidents not only disrupt research continuity but also threaten the integrity of scientific collaboration across borders.
Similar breaches across Europe in 2025 have targeted universities, public laboratories, and environmental research centers. Attackers recognize that these institutions manage complex networks connecting multiple departments, external partners, and funding agencies, often with limited cybersecurity oversight. Such structures create multiple entry points for exploitation. The CTFC data breach will likely prompt renewed focus on data security in academia, particularly in Spain’s research and development sectors.
Lessons for Other Research Institutions
Other organizations can draw key lessons from this incident. First, research institutions must treat cybersecurity as a core operational function rather than a peripheral IT task. Second, data backups must be encrypted and stored offline to ensure recovery even if ransomware is deployed. Third, collaborative networks and data-sharing platforms must implement strict access controls and endpoint verification to prevent unauthorized connections.
Investment in staff training also remains critical. Regular phishing simulations, security awareness campaigns, and robust authentication mechanisms can significantly reduce the risk of successful intrusions. Finally, partnerships with cybersecurity firms and participation in national threat intelligence sharing programs can provide early warnings of emerging attacks before they escalate into full-scale breaches.
Conclusion
The CTFC data breach marks a turning point for the cybersecurity posture of public research institutions in Spain. As attackers continue to evolve their methods, it is crucial for academic and environmental organizations to implement proactive defenses and foster a culture of security awareness. The exposure of 30 gigabytes of sensitive research data underscores the need for robust protection mechanisms across all layers of the scientific community.
For verified updates on global data breaches and the latest cybersecurity developments, visit Botcrawl for continuous reporting and in-depth analysis of major digital security incidents worldwide.
- Udemy Data Breach Resurfaces as 1.4M Records Circulate on Forum
- ClickUp Data Leak Shows $4B Came Before Customer Security for Over a Year
- Rheem Manufacturing Data Breach Claim Follows Reported INC Ransom Listing
- Polycorp Data Breach Exposes 400GB of Internal Manufacturing Data
- Uniview Technologies Data Breach Claimed by The Gentlemen Ransomware Group
WordPress Bot Protection
Bot Blocker for WordPress
Detect bot traffic, monitor live activity, apply bot-aware rules, and control AI crawlers, scrapers, scanners, spam bots, and fake trusted bots from one clean WordPress admin interface.
Sean Doyle
Sean is a tech author and security researcher with more than 20 years of experience in cybersecurity, privacy, malware analysis, analytics, and online marketing. He focuses on clear reporting, deep technical investigation, and practical guidance that helps readers stay safe in a fast-moving digital landscape. His work continues to appear in respected publications, including articles written for Private Internet Access. Through Botcrawl and his ongoing cybersecurity coverage, Sean provides trusted insights on data breaches, malware threats, and online safety for individuals and businesses worldwide.






