Hacktivists Leak DHS Procurement Data for 6,000 Firms [Prime Cyber Insights]
Hacktivists Leak DHS Procurement Data for 6,000 Firms [Prime Cyber Insights]
Prime Cyber Insights

Hacktivists Leak DHS Procurement Data for 6,000 Firms [Prime Cyber Insights]

On March 2nd, 2026, details emerged regarding a significant data breach targeting the Department of Homeland Security (DHS) by a hacktivist group calling itself the 'Department of Peace.' The group reportedly exfiltrated data from the DHS Office of Indust

Episode E1105
March 3, 2026
03:15
Hosts: Neural Newscast
News
DHS breach
ICE contractors
hacktivism
Department of Peace
cybersecurity
third-party risk
Palantir
Microsoft
Oracle
SAIC
PrimeCyberInsights

Now Playing: Hacktivists Leak DHS Procurement Data for 6,000 Firms [Prime Cyber Insights]

Download size: 6.0 MB

Share Episode

SubscribeListen on Transistor

Episode Summary

On March 2nd, 2026, details emerged regarding a significant data breach targeting the Department of Homeland Security (DHS) by a hacktivist group calling itself the 'Department of Peace.' The group reportedly exfiltrated data from the DHS Office of Industry Partnership and leaked it through the transparency collective DDoSecrets. The leak includes procurement data for over 6,000 companies contracted with DHS and Immigration and Customs Enforcement (ICE), including major tech and defense entities like Palantir, Microsoft, Oracle, Raytheon, and L3Harris. The hackers cited political motivations for the breach, specifically naming recent protester deaths in Minneapolis as their catalyst. The leaked data, which has been organized into a searchable database by security researcher Micah Lee, reveals sensitive financial details such as a $70 million contract for Cyber Apex Solutions and $59 million for SAIC. This incident highlights the growing trend of hacktivists targeting government supply chains to expose private-sector cooperation with federal agencies, posing significant third-party risk.

Subscribe so you don't miss the next episode

Show Notes

A hacktivist collective known as the 'Department of Peace' has reportedly breached the Department of Homeland Security, leaking sensitive procurement data involving over 6,000 companies. This incident, first reported by TechCrunch on March 2nd, 2026, exposes the deep ties between Immigration and Customs Enforcement and major technology players including Palantir, Microsoft, and Oracle. The data release includes specific contract amounts and contact information for thousands of vendors, organized into a searchable interface that details tens of millions of dollars in federal spending. As hacktivists increasingly target the intersection of government policy and private sector cooperation, this breach underscores the significant third-party risk and reputational exposure facing government contractors in the current political climate.

Topics Covered

  • 🔓 Hacktivist group 'Department of Peace' targets DHS Office of Industry Partnership.
  • 📊 Leak exposes contracts for over 6,000 companies, including Palantir and SAIC.
  • ⚠️ Data includes $70 million contract for Cyber Apex Solutions and $59 million for SAIC.
  • 🏢 Reputational and operational risks for tech giants like Microsoft and Oracle.
  • ⚖️ Breach motivated by protests following the deaths of Alex Pretti and Renée Good.

Disclaimer: This briefing is for informational purposes only and does not constitute legal or professional advice.

Neural Newscast is AI-assisted, human reviewed. View our AI Transparency Policy at NeuralNewscast.com.

  • (00:09) - Introduction
  • (01:21) - Procurement and Financial Exposure
  • (01:35) - Conclusion

Transcript

Full Transcript Available
[00:00] Announcer: From Neural Newscast, this is Prime Cyber Insights, [00:03] Announcer: Intelligence for Defenders, Leaders, and Decision Makers. [00:09] Aaron Cole: Welcome to Prime Cyber Insights for March 3rd, 2026. [00:16] Aaron Cole: We are tracking a massive hacktivist leak targeting contractors of the Department of Homeland [00:22] Aaron Cole: Security. [00:22] Lauren Mitchell: Erin, yesterday TechCrunch detailed a breach by a group calling itself the Department [00:27] Lauren Mitchell: of Peace. [00:28] Lauren Mitchell: They have reportedly exfiltrated sensitive data directly from the DHS Office of Industry [00:33] Lauren Mitchell: Partnership. [00:34] Lauren Mitchell: Lauren, this isn't just a random dump. [00:36] Lauren Mitchell: It is highly coordinated. [00:39] Lauren Mitchell: This past Sunday, the group leaked documents via distributed denial of secrets, [00:44] Lauren Mitchell: targeting more than 6,000 companies that conduct business with DHS and ICE. [00:50] Lauren Mitchell: The motivation appears explicitly ideological. [00:54] Lauren Mitchell: The group cited the deaths of protesters, Alex Peretti and Renee Good as their primary catalyst, [01:00] Lauren Mitchell: For practitioners, the concern here is the extreme granularity of the exposure. [01:06] Lauren Mitchell: Exactly. The breadth of the leak is significant. We are looking at a list that includes major [01:12] Lauren Mitchell: defense contractors like Raytheon, Endural, and L3 Harris, alongside technology leaders like [01:19] Lauren Mitchell: Microsoft, Oracle, and most notably, Palantir. And it is all being made searchable, Aaron. [01:26] Lauren Mitchell: Security researcher Micah Lee has organized the data, making names, emails, and direct phone [01:32] Lauren Mitchell: numbers for corporate contacts. [01:33] Lauren Mitchell: easily accessible to the public. [01:35] Lauren Mitchell: The financial specifics are particularly stark. [01:39] Lauren Mitchell: The leak reveals a $70 million contract for CyberApex Solutions [01:43] Lauren Mitchell: and $59 million for SAIC. [01:47] Lauren Mitchell: Lauren, how should these firms be interpreting this risk? [01:50] Lauren Mitchell: They must realize that government procurement data is now a primary attack vector for hacktivists. [01:57] Lauren Mitchell: It is not just about your internal network security. [02:00] Lauren Mitchell: It is about the security posture of the government offices you share your contract metadata with. [02:06] Lauren Mitchell: It creates both a reputational and a physical security risk for the individuals specifically named in these documents. [02:14] Lauren Mitchell: We will continue to monitor the DHS response to this situation. [02:19] Lauren Mitchell: For practitioners, this is a clear reminder that your contract metadata is as much a target as your source code. [02:26] Lauren Mitchell: For more analysis, visit pci-neuralnewscast.com. [02:32] Lauren Mitchell: Neural Newscast is AI-assisted, human-reviewed. [02:36] Lauren Mitchell: View our AI transparency policy at neuralnewscast.com. [02:41] Lauren Mitchell: This briefing is for informational purposes only and does not constitute legal or professional advice. [02:48] Announcer: This has been Prime Cyber Insights on Neural Newscast. [02:52] Announcer: Intelligence for Defenders, Leaders, and Decision Makers. [02:55] Announcer: Neural Newscast uses artificial intelligence in content creation, [02:58] Announcer: with human editorial review prior to publication. [03:02] Announcer: While we strive for factual, unbiased reporting, [03:05] Announcer: AI-assisted content may occasionally contain errors. [03:08] Announcer: Verify critical information with trusted sources. [03:11] Announcer: Learn more at neuralnewscast.com.

✓ Full transcript loaded from separate file: transcript.txt

Loading featured stories...