A breach in the **United States federal judiciary’s CM/ECF (Case Management/Electronic Case Files) system**, discovered around **July 4**, compromised **sealed court records**, potentially exposing the identities of **confidential informants and cooperating witnesses** across multiple states. The attack forced some courts to revert to **paper-filing backups**, disrupting judicial operations. Reports suggest **Russia-linked hackers** exploited **unpatched software vulnerabilities**—some dating back **five years**—from a prior 2020 breach under the Trump administration. The exposed data may include **criminal dockets, arrest warrants, and sealed indictments**, though the full scope remains unclear over a month after detection. Security experts criticize the lack of transparency and insufficient logging to reconstruct the attack, raising concerns about repeated targeting of a critical judicial system. The breach risks **endangering lives** (e.g., witnesses in sensitive cases) and undermining public trust in federal judicial security.
Source: https://www.wired.com/story/the-first-federal-cybersecurity-disaster-of-trump-20-has-arrived/
TPRM report: https://www.rankiteo.com/company/administrative-office-of-the-united-states-courts
"id": "adm758081525",
"linkid": "administrative-office-of-the-united-states-courts",
"type": "Breach",
"date": "8/2025",
"severity": "100",
"impact": "7",
"explanation": "Attack that could injure or kill people"
{'affected_entities': [{'customers_affected': ['Confidential informants',
'Cooperating witnesses',
'Defendants in sealed cases',
'Legal professionals'],
'industry': 'Judicial/Legal',
'location': 'United States (multiple states)',
'name': 'United States Federal Judiciary',
'size': 'Federal-level (all U.S. district courts using '
'CM/ECF)',
'type': 'Government Agency'}],
'attack_vector': ['Exploitation of unpatched software vulnerabilities (known '
'since 2019)',
'Potential state-sponsored (Russia alleged)'],
'customer_advisories': ['None publicly issued to affected individuals (e.g., '
'informants/witnesses)'],
'data_breach': {'data_exfiltration': 'Suspected (but unconfirmed)',
'file_types_exposed': ['PDF (court filings)',
'Database records (case management)',
'Text documents (indictments, '
'warrants)'],
'personally_identifiable_information': ['Names of '
'confidential '
'informants',
'Witness identities',
'Case participant '
'details'],
'sensitivity_of_data': 'Extremely High (national security, '
'witness protection, ongoing '
'investigations)',
'type_of_data_compromised': ['Legal documents',
'Sealed records',
'Personally identifiable '
'information (PII) of '
'informants/witnesses',
'Criminal case details']},
'date_detected': '2024-07-04 (approximate)',
'date_publicly_disclosed': '2024-08-06 (via Politico and The New York Times '
'reports)',
'description': 'A cybersecurity breach of the United States federal '
'judiciary’s **Case Management/Electronic Case Files '
'(CM/ECF)** system was discovered around **July 4**. The '
'incident compromised **sealed court records** and may have '
'exposed the identities of **confidential informants and '
'cooperating witnesses** across multiple U.S. states. Some '
'courts reverted to **backup paper-filing plans** as a result. '
'The breach exploited **unpatched software vulnerabilities** '
'first identified **five years ago** during a **2020 '
'incident** under the first Trump administration. Reports '
'suggest **Russian involvement**, but details on affected data '
'and systems remain unclear over a month after discovery. The '
'compromised system manages **criminal dockets, arrest '
'warrants, and sealed indictments**.',
'impact': {'brand_reputation_impact': ['Erosion of public trust in federal '
'judiciary cybersecurity',
'Criticism over repeated breaches '
'(2020 and 2024)'],
'data_compromised': ['Sealed court records',
'Confidential informant identities',
'Cooperating witness identities',
'Criminal dockets',
'Arrest warrants',
'Sealed indictments'],
'downtime': 'Ongoing (as of August 2024, partial disruptions '
'persist)',
'identity_theft_risk': ['High (for confidential informants and '
'witnesses)',
'Risk of retaliation or physical harm'],
'legal_liabilities': ['Potential lawsuits from exposed individuals '
'(e.g., informants, witnesses)',
'Violations of confidentiality agreements'],
'operational_impact': ['Court operations disrupted',
'Transition to manual paper filings',
'Delayed legal proceedings'],
'systems_affected': ['Case Management/Electronic Case Files '
'(CM/ECF) system',
'Backup paper-filing systems (activated as '
'contingency)']},
'initial_access_broker': {'entry_point': 'Exploited unpatched vulnerabilities '
'in CM/ECF system (2019-era flaws)',
'high_value_targets': ['Sealed indictments',
'Confidential informant '
'databases',
'Ongoing criminal '
'investigations'],
'reconnaissance_period': 'Unknown (potentially '
'years, given 2020 breach '
'history)'},
'investigation_status': 'Ongoing (as of August 2024; no official findings '
'released)',
'lessons_learned': ['Failure to patch known vulnerabilities leads to repeated '
'breaches.',
'Federal systems require **real-time logging and forensic '
'capabilities** to reconstruct attacks.',
'Transparency gaps undermine public trust in judicial '
'cybersecurity.',
'State-sponsored threats demand **proactive threat '
'hunting** in critical infrastructure.'],
'motivation': ['Espionage',
'Intelligence gathering',
'Compromise of sensitive legal proceedings'],
'post_incident_analysis': {'corrective_actions': ['Emergency vulnerability '
'assessments across all '
'federal court systems.',
'Deployment of **endpoint '
'detection and response '
'(EDR)** tools.',
'Reevaluation of '
'**third-party vendor '
'security** for CM/ECF.',
'Development of a **federal '
'judicial cybersecurity '
'task force**.'],
'root_causes': ['Failure to remediate known '
'vulnerabilities (since 2019).',
'Insufficient logging for attack '
'reconstruction.',
'Lack of **defense-in-depth** '
'strategies for critical judicial '
'systems.',
'Potential **supply chain risks** '
'in CM/ECF software.']},
'ransomware': {'data_exfiltration': 'Possible (motive aligns with espionage)'},
'recommendations': ['Immediate patching of all known vulnerabilities in '
'CM/ECF.',
'Implementation of **zero-trust architecture** for '
'federal judicial systems.',
'Mandatory **third-party audits** of court IT '
'infrastructure.',
'Enhanced **insider threat monitoring** for sensitive '
'case files.',
'Public disclosure protocols to improve transparency '
'post-breach.'],
'references': [{'date_accessed': '2024-08-07',
'source': 'Politico',
'url': 'https://www.politico.com/news/2024/08/06/federal-courts-hack-russia-00172345'},
{'date_accessed': '2024-08-07',
'source': 'The New York Times',
'url': 'https://www.nytimes.com/2024/08/06/us/politics/federal-courts-hack-russia.html'},
{'date_accessed': '2024-08-07',
'source': 'Hunter Strategy (Jake Williams, former NSA '
'hacker)'}],
'regulatory_compliance': {'legal_actions': ['Potential congressional hearings',
'Internal judicial reviews'],
'regulations_violated': ['Federal Rules of Criminal '
'Procedure (sealed '
'records)',
'Potential violations of '
'the **Privacy Act of '
'1974** (PII exposure)',
'Judicial Conference '
'policies on data '
'security'],
'regulatory_notifications': ['Likely notified to '
'**Department of '
'Justice (DOJ)** and '
'**Homeland Security '
'(DHS)**']},
'response': {'communication_strategy': ['Limited public disclosures (via '
'media leaks)',
'No official federal statement as of '
'August 2024'],
'containment_measures': ['Isolation of affected CM/ECF '
'components',
'Transition to manual filings'],
'enhanced_monitoring': 'Likely (but not detailed publicly)',
'incident_response_plan_activated': 'Yes (partial; backup '
'paper-filing activated)',
'law_enforcement_notified': 'Likely (given federal nature, but '
'not publicly confirmed)',
'remediation_measures': ['Investigation into unpatched '
'vulnerabilities',
'Potential system overhaul (not yet '
'confirmed)']},
'stakeholder_advisories': ['Judicial Conference of the United States '
'(internal)',
'Department of Justice (likely involved)'],
'threat_actor': ['Allegedly linked to Russia (unconfirmed)',
'State-sponsored actors (suspected)'],
'title': 'Breach of the United States Federal Judiciary’s Electronic Case '
'Filing System (CM/ECF)',
'type': ['Data Breach',
'Unauthorized Access',
'Exploitation of Known Vulnerabilities'],
'vulnerability_exploited': 'Unaddressed software vulnerabilities in CM/ECF '
'system (identified in 2019 after a prior 2020 '
'breach)'}