Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsHacktivists Claim to Have Hacked Homeland Security to Release ICE Contract Data
Hacktivists Claim to Have Hacked Homeland Security to Release ICE Contract Data
CybersecurityDefenseGovTech

Hacktivists Claim to Have Hacked Homeland Security to Release ICE Contract Data

•March 2, 2026
0
TechCrunch (Cybersecurity)
TechCrunch (Cybersecurity)•Mar 2, 2026

Companies Mentioned

Palantir

Palantir

PLTR

Anduril

Anduril

L3Harris

L3Harris

LHX

Raytheon

Raytheon

Microsoft

Microsoft

MSFT

Oracle

Oracle

ORCL

Why It Matters

The disclosure highlights extensive private‑sector involvement in immigration enforcement, raising accountability and reputational risks for major tech and defense firms, and may spur tighter scrutiny of government procurement practices.

Key Takeaways

  • •Hacktivists leak DHS-ICE contract data via DDoSecrets.
  • •Over 6,000 contractors, including Microsoft, Palantir, identified.
  • •Largest contracts: $70M Cyber Apex, $59M SAIC, $29M UL.
  • •Data reveals contractor contacts, contract amounts, procurement unit.
  • •Hacktivists cite protester killings as motive.

Pulse Analysis

The breach claimed by the self‑styled ‘Department of Peace’ adds a new chapter to high‑profile cyber‑intrusions targeting U.S. agencies. By infiltrating DHS’s Office of Industry Partnership, the group extracted over 6,000 contract records linking ICE enforcement to a vast private‑sector network. Published by transparency nonprofit DDoSecrets, the dump lists award amounts, contractor names and direct contacts for firms ranging from defense giants like Raytheon to cloud providers such as Microsoft. This granularity offers an unprecedented view of how immigration policy is outsourced to commercial vendors.

For the technology and defense industries, the exposure is a double‑edged sword. Companies like Palantir and Anduril, already under scrutiny for supplying surveillance tools to immigration authorities, now face public documentation of the exact financial stakes involved. The data also reveals smaller vendors, such as Cyber Apex Solutions, securing multi‑million‑dollar contracts to fill critical infrastructure gaps. Stakeholders—from shareholders to civil‑rights groups—can leverage this information to demand greater transparency, assess compliance risks, and potentially reevaluate partnerships with agencies accused of human‑rights violations.

The fallout may reshape procurement oversight and cybersecurity posture across federal agencies. Lawmakers could introduce stricter reporting requirements for contracts linked to contentious enforcement activities, while agencies might tighten internal security to prevent future leaks. Meanwhile, the hack underscores the strategic value of open‑source intelligence platforms like DDoSecrets, which enable rapid dissemination and analysis of leaked data. As public pressure mounts, firms implicated in the DHS‑ICE supply chain may confront reputational damage, legal challenges, or divestment, prompting a broader industry conversation about ethical sourcing and accountability.

Hacktivists claim to have hacked Homeland Security to release ICE contract data

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...