Today : Oct 21, 2025
U.S. News
21 October 2025

Massive Hack Exposes US Federal Agents’ Data Nationwide

A politically motivated hacking group leaked personal information of hundreds of federal officers and claims to have dossiers on thousands more, raising fears for agent safety and government security.

On October 20, 2025, the United States government was rocked by a sweeping cyberattack that exposed the personal data of hundreds of federal employees, sending shockwaves through law enforcement and intelligence communities nationwide. According to reporting from 404 Media and Cybernews, a hacking collective known as The Com orchestrated the breach, targeting agencies at the heart of American security, including the Department of Homeland Security (DHS), the Department of Justice (DOJ), and the Federal Bureau of Investigation (FBI).

But the hack didn’t stop there. The Com, already notorious for previous politically charged leaks and cyberattacks, claims to have built dossiers on tens of thousands of U.S. government officials. Their reach reportedly extends far beyond DHS and DOJ, touching the National Security Agency (NSA), Defense Intelligence Agency (DIA), Federal Trade Commission (FTC), Federal Aviation Administration (FAA), Centers for Disease Control and Prevention (CDC), Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), members of the Air Force, and several other agencies. 404 Media independently verified samples of the leaked information, confirming the authenticity and breadth of the breach.

In the initial wave, personal details for 680 DHS employees, 190 DOJ officials, and the emails of 170 FBI staff members were leaked online. The data dump included names, office locations, and, in some cases, home addresses—an alarming development for those tasked with upholding public safety and national security. The hackers taunted their targets in public posts on Telegram, with one message reading, “U guys want IRS next?”—a chilling hint at the group’s ongoing campaign.

The leak came at a fraught moment. The Trump administration, facing mounting unrest over its aggressive protest and immigration crackdowns, had recently deployed masked DHS and Immigration and Customs Enforcement (ICE) agents to detain individuals in major cities. Critics described these scenes as “state-sanctioned kidnappings,” while the administration insisted that agents were “under threat.” This framing, some argue, has been used to justify secrecy, enhanced force, and the suppression of public oversight. The White House, for its part, has remained silent on the breach, and neither DHS nor DOJ has publicly acknowledged the full scope of the leak.

As public scrutiny of law enforcement actions intensified, the administration also pressured technology platforms to remove ICE-tracking and reporting apps, such as ICEBlock, further fueling debate over transparency and public accountability. Yet, for federal agents, the threat became all too personal. According to Cybernews, the doxxing of private officer data now presents a very real risk to their safety, especially as opposition to migration policies grows more vocal and confrontational.

Perhaps most disturbing are the reports of a structured bounty system allegedly orchestrated by drug cartels. Intelligence obtained by journalists suggests that cartels have instructed sympathizers—including street gangs in cities like Chicago—to track, harass, or even assassinate federal personnel. The bounty system, as described in the leaked materials, offers $2,000 for doxxing or gathering intelligence on agents (including taking photos or identifying family members), $5,000 to $10,000 for kidnapping or non-lethal assaults on field officers, and up to $50,000 for assassinations of high-ranking officials. The mere existence of such a system—whether or not it’s widely implemented—has put federal officers and their families on high alert.

The fallout from the breach was immediate. On October 9, 2025, DHS issued a statement condemning what it called “dangerous doxxing” attacks. In the agency’s words, “Our officers are facing a more than 1000% increase in assaults against them and their families are being doxxed and threatened online.” The numbers are staggering, and the human toll is impossible to ignore.

Concrete examples of this new reality have emerged across the country. In September, a federal grand jury indicted three women for livestreaming their pursuit of an ICE agent to his home, shouting “Neighbor is ICE!” and “ICE lives on your street and you should know!” before posting the officer’s address on Instagram. What began as a protest quickly escalated into a real-time doxxing operation, blurring the line between activism and targeted harassment.

Threats have extended beyond officers themselves. In Texas, the spouse of an ICE officer received a chilling phone call: “I don’t know how you let your husband work for ICE, and you sleep at night… F you, f your family. I hope your kids get deported by accident… Did you hear what happened to the Nazis after World War II? Because it’s what’s going to happen to your family.” Other spouses have faced similar abuse. One received a Facebook message from a Massachusetts resident reading: “Your husband, the ICE man, is a f** and retribution will come your way eventually.” The pattern is clear: the ripple effects of the breach are deeply personal and far-reaching.

Meanwhile, The Com’s ambitions appear to be growing. A member of the group told 404 Media that they have built dossiers on tens of thousands of government officials using data stolen from Salesforce customer databases. The trove reportedly includes personal information not just on DHS, ICE, and DOJ employees, but also on officials from the NSA, DIA, FTC, FAA, CDC, ATF, Air Force, and more. The scale of this data mining is unprecedented, and the implications for national security are profound.

Cybersecurity experts warn that the breach exposes not just individual officers but also systemic vulnerabilities in how sensitive data is stored and protected. The fact that so much personal information could be extracted from external sources like Salesforce highlights the interconnectedness—and fragility—of modern government IT infrastructure. As federal agencies scramble to assess the damage and shore up their defenses, questions abound: How did this happen? Why were so many agencies left exposed? And what can be done to prevent future attacks?

For now, the affected agencies have largely remained silent, perhaps wary of fueling further panic or revealing investigative strategies. The White House has not provided an official comment, leaving many to speculate about the administration’s next moves. Some critics argue that the lack of transparency only exacerbates public distrust, while others contend that operational secrecy is necessary in the face of ongoing threats.

The political debate is fierce and multifaceted. Supporters of the administration’s crackdown insist that extraordinary measures are required to protect agents and enforce the law. Detractors counter that the erosion of public oversight and the targeting of whistleblowers, journalists, and activists only serve to undermine democratic principles. Meanwhile, those caught in the crossfire—federal officers and their families—must grapple with the very real consequences of being thrust into the spotlight against their will.

As the dust settles, one thing is clear: the breach marks a turning point in the relationship between the government, its agents, and the public. With trust in institutions already strained, the exposure of personal data on such a massive scale has raised urgent questions about privacy, accountability, and the future of cybersecurity in an increasingly polarized nation.

While the full impact of the hack is still unfolding, the message from those on the front lines is unmistakable: the stakes have never been higher, and the need for robust, transparent security measures has never been more urgent.