HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔓 Breach

Hackers Exfiltrate 7.7 TB of Sensitive LAPD Litigation Files from LA City Attorney’s Storage System

Threat actors accessed the Los Angeles City Attorney’s digital storage and downloaded over 7.7 TB of LAPD civil‑litigation documents, exposing witness names, medical data, and unredacted complaints. The breach underscores third‑party risk for government agencies and their IT service providers.

🛡️ LiveThreat™ Intelligence · 📅 April 08, 2026· 📰 therecord.media
🟠
Severity
High
🔓
Type
Breach
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
therecord.media

Hackers Exfiltrate 7.7 TB of Sensitive LAPD Litigation Files from LA City Attorney’s Storage System

What Happened – Threat actors compromised the Los Angeles City Attorney’s Office digital storage environment and downloaded over 7.7 TB of files that contain LAPD civil‑litigation discovery material, including witness names, medical records, unredacted criminal complaints, and investigative reports. The breach did not involve any direct intrusion into LAPD networks.

Why It Matters for TPRM

  • Third‑party data repositories can become the weakest link in a government supply chain.
  • Exposure of law‑enforcement records creates legal, regulatory, and reputational risk for both the agency and any vendors that host or manage the data.
  • Demonstrates the need for continuous monitoring of third‑party security controls and data‑handling agreements.

Who Is Affected – Government agencies (law‑enforcement), legal service providers, and any downstream partners that rely on the City Attorney’s document‑management platform.

Recommended Actions – Review contracts and security clauses with the City Attorney’s IT service provider, request evidence of encryption at rest and strict access controls, and conduct a risk‑based audit of all third‑party storage solutions handling sensitive public‑sector data.

Technical Notes – Attack vector not disclosed; likely a credential‑based intrusion or mis‑configuration. No specific CVEs reported. Data types exfiltrated: personally identifiable information (witness names, medical info), unredacted law‑enforcement files, and investigative records. Source: The Record

📰 Original Source
https://therecord.media/breach-exposes-lapd-files-city-attorney-systems

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.