Hackers breach LAPD-linked storage system, leak massive trove of sensitive police files

Cybercriminals stole and published a massive cache of internal documents tied to the Los Angeles Police Department, more than 337,000 files totaling 7.7 terabytes, in what may rank among the largest law-enforcement data breaches in recent memory. The leaked material reportedly includes personnel files, internal affairs investigations, and legal discovery documents, TechCrunch reported.

The LAPD said the breach did not involve its own systems or networks. Instead, the department pointed to "a digital storage system" belonging to the Los Angeles City Attorney's Office. A spokesperson for the City Attorney's Office, Ivor Pine, told TechCrunch the office became aware "of unauthorized access to a third-party tool."

That distinction may matter on an IT flowchart. It will matter far less to the officers, witnesses, and complainants whose sensitive records are now circulating online.

What was exposed, and who took it

Emma Best, founder of the transparency group Distributed Denial of Secrets, identified the gang behind the breach as World Leaks. Best said in an online post that she reviewed some of the leaked data when it was briefly posted, then deleted, on the gang's leak website. Distributed Denial of Secrets now hosts the data, TechCrunch reported.

The Los Angeles Times reported that the leaked files included personnel records, internal affairs investigations, and discovery documents. Most police officer records are deemed private under California state law. The Times described the leak, if authentic, as a "stunning breach of police data."

Authenticity has not been confirmed. TechCrunch noted that the data had not been verified as genuine at the time of its reporting. The LAPD itself said it is still "working with the LA City Attorney's Office to gain access to the impacted files to understand the full scope of the data breach."

That language is worth pausing on. The department is still trying to figure out what was taken. The criminals already know.

World Leaks and the ransom playbook

World Leaks launched its operations in January 2025, apparently as a rebrand of a previous group known as Hunters International. The gang publicizes stolen data in an attempt to pressure victims into paying a ransom. When the victim refuses, or when the gang decides to move on, the files go public.

Cybersecurity firm Halcyon has described World Leaks as having "demonstrated capability against defense contractors and Fortune 500 organizations." If accurate, the group's targeting of a municipal law-enforcement agency's storage vendor represents a notable shift, or expansion, in its ambitions.

The broader pattern is familiar. Government agencies at every level have struggled to secure sensitive data, whether through contested federal data-collection practices or the patchwork of third-party tools that city offices increasingly rely on to manage records.

The City Attorney's Office downplays the damage

Pine, the City Attorney's spokesperson, offered a carefully worded reassurance. He told TechCrunch:

"The information was self contained in this application without any links or access to any department records or systems."

If that claim holds, it means the breach was limited to whatever data lived inside one third-party tool, not a gateway into broader city or LAPD networks. But the volume of the exposed material, 7.7 terabytes, more than 337,000 files, raises an obvious question: how much sensitive law-enforcement data was parked inside a single outside application in the first place?

The LAPD's own public statement, posted on X, confirmed the department is investigating. It acknowledged the breach affected the City Attorney's storage system and said the department is working to understand the full scope.

Neither agency has disclosed what third-party tool was compromised, how the unauthorized access occurred, or what date range of records the leaked files cover. Those gaps leave officers and the public in the dark about who, specifically, may be affected.

Officers and witnesses left exposed

The real cost of a breach like this falls on the people inside those 337,000 files. Personnel records can contain home addresses, financial information, disciplinary histories, and family details. Internal affairs files can identify officers under investigation, and the civilians who filed complaints against them. Discovery documents can expose witnesses, informants, and victims whose identities were supposed to remain protected.

Under California law, most police personnel records carry strict privacy protections. A breach of this scale, if the data proves authentic, would bypass every legal safeguard in one stroke. No court order. No Pitchess motion. Just a ransomware gang and a vulnerable third-party tool.

The question of how sensitive government records are managed and released has been a recurring flashpoint across multiple levels of government. Here, the release was not a policy decision. It was a crime, and one that city officials appear to have been slow to detect.

A pattern of institutional vulnerability

Los Angeles is no stranger to institutional failures that leave residents bearing the consequences. The city has faced repeated questions about how its agencies handle data, contracts, and oversight. Concerns about government accountability and fraud exposure in California have only intensified in recent years.

This breach adds a new dimension. When a city attorney's office stores massive volumes of law-enforcement records in a third-party application, and that application gets cracked open, the failure is not just technical. It is a failure of judgment about where sensitive data belongs and who is responsible for protecting it.

The LAPD said the breach did not touch its own systems. The City Attorney's Office said the compromised tool was "self contained." But the data that spilled out was anything but contained. It reportedly included the most sensitive categories of police records that exist.

Government agencies routinely outsource data storage and management to third-party vendors. The practice is widespread and, in many cases, necessary. But when breaches occur, the finger-pointing between agencies and vendors often obscures a simpler truth: the data was entrusted to a system that failed, and the people in those files had no say in the arrangement.

Security vulnerabilities around major government institutions, whether physical or digital, carry consequences that extend well beyond the agencies themselves. Officers who work undercover, witnesses who cooperated with investigations, and civilians who filed complaints all face potential exposure.

What remains unanswered

Several key questions remain open. The exact date of the breach has not been disclosed. The identity of the compromised third-party tool has not been named publicly. The LAPD has not confirmed whether it has notified affected individuals. And the authenticity of the leaked data, while strongly suggested by the volume and described contents, has not been officially verified.

The gang's motive appears straightforward: extortion. World Leaks posted the data, then removed it, a common tactic to demonstrate capability before demanding payment. When the data resurfaced through Distributed Denial of Secrets, the leverage evaporated. The damage, however, did not.

Debates over government access to personal data, including law-enforcement subpoenas for phone records, have centered on the power officials wield over private information. This breach flips that concern. Here, it is the government's own inability to protect the data it collects that created the risk.

The LAPD and the City Attorney's Office owe the public, and especially the officers and civilians in those files, a full accounting of what happened, when it happened, and what they are doing to prevent it from happening again. So far, the answers have been partial, hedged, and late.

When the people charged with enforcing the law cannot secure their own records, the rest of us are entitled to ask who is minding the store.

Privacy Policy