#1 out of 335.5M est. views40.98%
technology18h ago
Website that leaked info about ICE agents is down after ‘cyberattack,’ founder says
Independent.co.uk and 2 more
- A Russia-linked cyberattack disrupted the ICE List site while it prepared to publish thousands of staff IDs, signaling a coordinated attempt to interfere with public access to personnel data.
- The Direct Denial of Service attack began Tuesday evening and persisted during coverage, aligning with the planned release of about 4,500 ICE personnel names.
- Attackers used proxy-laden IPs to obscure origins, suggesting a well-resourced operation aiming to destabilize the leak timing.
- Dominick Skinner attributed a substantial share of malicious requests to Russia-based bot traffic, underscoring the potential scale of the intrusion.
- ICE List’s data cache expanded to roughly 6,500 names after the breach, including on-the-ground agents, supervisors, and work details.
- The leak follows the Jan. 7 fatal shooting of Renee Good, intensifying scrutiny of DHS and ICE data handling.
- Skinner indicated the dataset included roughly 4,500 immigration personnel, with about 1,800 frontline agents and around 150 supervisors, along with extensive background data.
- The attackers’ intent appeared to be to deter public access to ICE and Border Patrol personnel data, provoking anger and resolve among staffers.
- Skinner framed the hack as a resilience test during a server migration aimed at restoring service and addressing ongoing operational challenges.
- The incident adds to broader concerns about how immigration personnel data is handled and exposed amid public scrutiny and DHS tensions.
- The Independent’s report corroborates that a Russian-linked cyberattack targeted ICE List, amplifying debates over doxxing and government transparency.
Vote 20
.jpg?width=1200&height=800&crop=1200:800)







