Breach exposes sensitive LAPD files stored in city attorney system

April 8, 20266 min read3 sources
Share:
Breach exposes sensitive LAPD files stored in city attorney system

Introduction: A Cascade of Compromise

In July 2023, the City of Los Angeles faced a severe cybersecurity crisis that extended beyond a single department. The Los Angeles City Attorney's office confirmed it had suffered a significant data breach, an incident quickly claimed by the notorious LockBit ransomware group. The attackers didn't just encrypt files; they exfiltrated and later published a staggering 7.7 terabytes of data. The fallout was immediate and far-reaching, as the stolen data contained highly sensitive files belonging to the Los Angeles Police Department (LAPD), exposing the personal information of officers, details of ongoing investigations, and confidential legal documents.

This incident serves as a stark case study in the interconnected risks of modern governance. While the LAPD's own networks remained secure, their data, entrusted to a partner agency, became a primary casualty. The breach highlights a critical vulnerability in public sector cybersecurity: the security of shared data is only as strong as the weakest link in the chain.

Technical Details: LockBit's Double Extortion Playbook

The threat actor behind this attack, LockBit, was one of the most prolific and damaging Ransomware-as-a-Service (RaaS) operations at the time. Their business model allowed affiliates to use LockBit's malware and infrastructure to launch attacks, creating a widespread and persistent threat. The attack on the LA City Attorney's office followed LockBit's characteristic double extortion methodology.

First, the attackers gained unauthorized access to the city attorney’s network. The specific initial access vector has not been publicly disclosed, which is common in ongoing investigations. However, LockBit operators typically gain entry by exploiting unpatched vulnerabilities in public-facing systems like VPNs, using compromised Remote Desktop Protocol (RDP) credentials purchased on dark web forums, or through sophisticated phishing campaigns targeting employees.

Once inside, the attackers would have moved laterally across the network, escalating privileges and identifying high-value data repositories. The second stage of the attack involved data exfiltration, where the 7.7 terabytes of files were copied to attacker-controlled servers. Finally, the ransomware payload was deployed to encrypt the city attorney's systems, crippling their operations.

The city's refusal to pay the ransom demand prompted LockBit to execute the final step of its double extortion tactic: publishing the stolen data on its dark web leak site. This public release transformed a contained operational disruption into a massive privacy and public safety disaster.

Impact Assessment: A Wide and Dangerous Blast Radius

The consequences of this breach are severe and multifaceted, affecting organizations and individuals on multiple levels.

Affected Parties:

  • Los Angeles City Attorney's Office: As the primary target, the office faced operational paralysis, significant financial costs for remediation, and severe reputational damage.
  • Los Angeles Police Department (LAPD): Though not directly breached, the LAPD suffered a catastrophic loss of sensitive data. This included personnel files, medical information, internal affairs investigations, and details related to criminal cases.
  • Individuals: The most profound impact is on people. This includes sworn LAPD officers, civilian employees, witnesses, informants, victims of crime, and even suspects. The official breach notification sent in November 2023 confirmed the exposure of names, Social Security numbers, driver’s license numbers, financial account details, and health information.

Severity of Impact:

The exposure of this specific data set creates unique and dangerous risks. For law enforcement personnel, the leak of their personal identifying information (PII) puts them and their families at risk of harassment, doxxing, and physical threats from criminals. The disclosure of medical records is a profound violation of privacy.

For the justice system, the impact is equally grave. Publishing details of ongoing investigations, witness statements, or informant identities could jeopardize active cases, endanger lives, and undermine the integrity of future law enforcement operations. Criminals could leverage this information to intimidate witnesses or evade capture. The breach erodes the trust between the public and the agencies sworn to protect them, creating a chilling effect that may deter people from cooperating with law enforcement in the future.

How to Protect Yourself and Your Organization

While the breach has already occurred, there are critical steps for both affected individuals and other organizations to take to mitigate the damage and prevent future incidents.

For Affected Individuals:

  1. Activate Credit Monitoring: The City Attorney's office offered complimentary credit monitoring and identity protection services. If you were notified, enroll immediately. This service will alert you to suspicious activity involving your personal information.
  2. Freeze Your Credit: Go a step further by placing a security freeze on your credit reports with the three major bureaus (Equifax, Experian, TransUnion). This prevents anyone from opening new lines of credit in your name.
  3. Beware of Phishing: Threat actors will use the details from this breach to craft highly convincing phishing emails, text messages, and phone calls. Be extremely skeptical of any unsolicited communication that asks for personal information or immediate action, even if it seems to know details about you.
  4. Secure Your Accounts: Change passwords on your critical online accounts, especially for banking and email. Use a password manager to create strong, unique passwords for every site, and enable multi-factor authentication (MFA) wherever possible.

For Government Agencies and Other Organizations:

  1. Review Data Governance and Sharing: This breach is a lesson in third-party risk. Organizations must rigorously vet the security posture of any partner with whom they share sensitive data. Implement strict data sharing agreements that mandate specific security controls.
  2. Implement Network Segmentation: A flat network allows attackers to move freely after an initial compromise. Segmenting networks limits the blast radius of a breach, preventing an intrusion in one department from compromising the entire organization.
  3. Prioritize Data Encryption: Sensitive data should be protected by strong encryption both at rest (on servers and storage) and in transit (as it moves across the network). Encrypted data is useless to attackers even if they manage to exfiltrate it.
  4. Maintain a Rigorous Patching Cadence: Many breaches, including those by LockBit, begin by exploiting known software vulnerabilities. A systematic and timely patch management program is a foundational element of cybersecurity.
  5. Develop and Test an Incident Response Plan: Know exactly who to call and what steps to take when a breach is detected. Regularly test this plan with tabletop exercises to ensure every team member understands their role.

The LA City Attorney breach is a painful reminder that cybersecurity is not just an IT problem; it is an issue of public safety and institutional trust. The terabytes of data now in the wild represent real people, ongoing court cases, and the sensitive inner workings of a major metropolitan police force. The lessons learned from this incident must lead to more resilient security practices across all levels of government.

Share:

// FAQ

What happened in the Los Angeles City Attorney data breach?

In July 2023, the LockBit ransomware group breached the LA City Attorney's network, stealing and later publishing 7.7 terabytes of data. This data included highly sensitive files belonging to the Los Angeles Police Department (LAPD) that were stored on the city attorney's systems.

Who was affected by this breach?

The breach affected the LA City Attorney's office, the LAPD, and numerous individuals. This includes police officers, civilian staff, and people involved in legal cases (such as victims, witnesses, and suspects). Exposed data included names, Social Security numbers, medical records, and confidential case details.

What is LockBit?

LockBit was a highly active Ransomware-as-a-Service (RaaS) operation. Its affiliates would breach networks, encrypt data, and also steal it to pressure victims into paying a ransom under threat of public data release. The group's infrastructure was significantly disrupted by an international law enforcement operation in February 2024.

How can I protect myself if I think my data was exposed in this breach?

If you received a notification letter, you should immediately accept the free credit monitoring and identity protection services offered. It is also highly recommended to place a fraud alert or a security freeze with the major credit bureaus (Equifax, Experian, TransUnion). Be extremely cautious of phishing emails or calls that might use your stolen information to appear legitimate.

Why was LAPD data on the City Attorney's system?

The City Attorney's office handles legal matters for the city, including criminal prosecutions and civil litigation involving the LAPD. As a result, it routinely stores and accesses LAPD files, such as case reports, evidence, and personnel records, as part of its normal legal functions.

// SOURCES

// RELATED

Rockstar Games data leaked online following breach at analytics partner

Data allegedly belonging to Rockstar Games has been leaked by the ShinyHunters gang after a breach at third-party analytics vendor Anodot.

6 min readApr 14

Passport numbers for more than 300,000 leaked during December Eurail data breach

Eurail.com suffered a major data breach, exposing passport numbers and other PII for over 300,000 customers after a hacker exploited an exposed API to

6 min readApr 12

Hims breach exposes the most sensitive kinds of PHI

Telehealth giant Hims & Hers exposed sensitive health data of nearly 400,000 users, creating a severe risk of targeted blackmail, fraud, and extortion

6 min readApr 11

The anatomy of a non-leak: How a public Orbán quote became a cybersecurity myth

A viral story claimed a 'leaked call' exposed a Hungarian leader's comments. The truth? It was a public interview. A case study in misinformation.

6 min readApr 9