DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Baltimore City State’s Attorney’s Office hacked; Data leaked

Posted on April 19, 2025 by Dissent

One of the many cyberattacks that has escaped recent media attention is an incident involving the Baltimore City State’s Attorney’s Office in Maryland. Yesterday, data from the incident was leaked.

The group known as Kairos added stattorney[.]org to its leak site on March 31, 2025.  At that time, Kairos claimed that they had acquired 325 GB of files and provided a number of screenshots as proof of their claims. The screenshots, which they partially redacted to mask sensitive information, suggested that they had acquired some really sensitive information on victims of crimes and perpetrators. One of the screenshots appeared to be the body of a man murdered as part of a gang war.

Despite sending multiple inquiries to the state office’s media contacts over a more than two-week period, DataBreaches received no reply to two simple questions: had the Baltimore City State’s Attorney’s Office confirmed that there had been a breach, and if so, what were they doing in response to it?  As of publication today, there is still nothing on their website to indicate that there has been any breach or cybersecurity incident.

But according to Kairos, the state attorney’s office did — and does —  know about the breach. In encrypted communications with DataBreaches, Kairos stated that their general method is to give their targets 7 days to get in touch. “If the target doesn’t get in touch, we publish it on the website with a countdown.” In this case, they said, about 5 days after they listed the state agency on the leak site, “they wrote to us saying they hadn’t seen our messages and also said they were interested in us not posting anything. After that, we started negotiations.”

The negotiations were reportedly short-lived and unsuccessful. “Office of the State’s Attorney for Baltimore City asked us for a listing of all the files we downloaded and also asked us to send 5 files of their choice. After that, negotiations ended., ” Kairos’s spokesperson told DataBreaches. But the state had reason to know even before that proof demonstration, as Kairos tells DataBreaches that their presence was detected while they were in the state’s system exfiltrating data.

Personal and Sensitive Data Leaked on Juvenile Offenders

According to Kairos, they did not encrypt or delete any files but just exfiltrated data.

DataBreaches’ inspection of the data tranche confirmed Kairos’s claims that they had downloaded a lot of criminal case files, including personal information about offenders and victims. Because many of the case files in the tranche are court cases with public records, DataBreaches will not describe them here. But many records in the tranche involved juveniles and provided demographic data as well as details of their crimes, their placement, treatment, and vocational retraining etc. Juveniles’ records may often be sealed or subsequently expunged. DataBreaches does not know the status of all of the juveniles’ cases, but this leak put detailed, multi-page reports about juveniles into the public domain, which may affect them for the rest of their lives if they seek jobs or educational opportunities.

In addition to the individual multi-page reports on juvenile offenders, DataBreaches also noted some spreadsheets with data on juvenile offenders.  One spreadsheet recorded 46 juveniles who were under 13 years old as of June 1, 2022. It listed their names, date of birth, race, gender, date of incident, type of incident, officer involved, outcome, notes, and other fields:

Another spreadsheet in the tranche recorded 586 juveniles who were arrested in 2023. This particular spreadsheet did not list their date of birth, but did list their first and last name, the criminal charge, their race, gender, and age, and the disposition of the arrest.

Disciplinary and Personal Data on Police Department Personnel

But juveniles weren’t the only ones who had their personal information leaked.  Although DataBreaches did not spot any databases with personnel data such as human resource data or payroll data, DataBreaches did spot reports on police officer investigations from the Internal Affairs Department and the Baltimore Police Department Bureau of Public Integrity. DataBreaches also spotted a spreadsheet created in 2022 with names, ranks and what appeared to be personal phone numbers of more than 6,350 members of the Baltimore Police Department. From a Google search, some of those individuals are no longer with the department but appear to still have the same phone numbers. Others in the list appear to still be active employees of the police. No attempt was made to determine how many were currently employed and still associated with those phone numbers.

Victim and Witness Data

While much of the personal and non-public data that DataBreaches noted involved perpetrators and defendants, some of the files concerned witnesses and victims of crimes. Those also contained personal and in some cases, sensitive, information.

As noted earlier, Baltimore City State’s Attorney’s Office did not respond to multiple email inquiries about this breach and there is nothing on their  site about any breach. DataBreaches will continue to monitor their site for any disclosure or information about their incident response.


Related:

  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea's largest guarantee insurer
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
  • More than 100 British government personnel exposed by Ministry of Defence data leak
  • New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
Category: Breach IncidentsGovernment SectorHack

Post navigation

← Don’t be so quick to claim there’s no reason to believe there’s compromise of patient info: Saturday edition
Breaches Within Breaches: Contractual Obligations After a Security Incident →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Government will ‘robustly defend’ compensation claims from Afghans put at risk by data breach
  • Authorities released free decryptor for Phobos and 8base ransomware
  • Singapore Facing ‘Serious’ Cyberattack by Espionage Group With Alleged China Ties
  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea’s largest guarantee insurer
  • Theft from Glasgow’s Queen Elizabeth University Hospital sparks probe
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
  • More than 100 British government personnel exposed by Ministry of Defence data leak
  • New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • 𝐔𝐠𝐚𝐧𝐝𝐚 𝐨𝐫𝐝𝐞𝐫𝐬 𝐆𝐨𝐨𝐠𝐥𝐞 𝐭𝐨 𝐫𝐞𝐠𝐢𝐬𝐭𝐞𝐫 𝐚𝐬 𝐚 𝐝𝐚𝐭𝐚‑𝐜𝐨𝐧𝐭𝐫𝐨𝐥𝐥𝐞𝐫 𝐰𝐢𝐭𝐡𝐢𝐧 𝟑𝟎 𝐝𝐚𝐲𝐬 𝐚𝐟𝐭𝐞𝐫 𝐥𝐚𝐧𝐝𝐦𝐚𝐫𝐤 𝐩𝐫𝐢𝐯𝐚𝐜𝐲 𝐫𝐮𝐥𝐢𝐧𝐠.
  • Meta investors, Zuckerberg reach settlement to end $8 billion trial over Facebook privacy violations
  • ICE is gaining access to trove of Medicaid records, adding new peril for immigrants
  • Microsoft can’t protect French data from US government access
  • Texas Enacts Electronic Health Record Data Localization Law
  • Upstate NY county clerk again refuses to enforce Texas abortion judgment
  • Attorney General James Leads Coalition Urging Congress to Protect Americans from Masked ICE Agents

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.