Leak of documents related to the United States National Security Agency.
Detail
Published
11/01/2026
On January 8, 2026, a threat actor claimed the leak of documents related to the U.S. National Security Agency. The data includes personal information and professional details of approximately 100 individuals associated with U.S. government agencies, primarily involved in national security, counter-terrorism, law enforcement, and diplomatic activities. Exposed key fields include names, email addresses, office and phone numbers, which are linked to specific activity IDs.
This leak poses significant risks, including targeted phishing, social engineering attacks, espionage, or physical threats to U.S. personnel overseas. Affected entities span the Department of Justice (DOJ), Department of State (State), Federal Bureau of Investigation (FBI), Customs and Border Protection (CBP), among others, with a focus on international operations in regions such as Africa, the Middle East, South Asia, and Europe. Adversarial forces such as state-sponsored actors, cybercriminal groups, or terrorist organizations may exploit this information for intelligence gathering or disruptive actions.
Please see the attachment for the relevant data.
On January 8, 2026, a threat actor claimed the leak of documents related to the U.S. National Security Agency. The data includes personal information and professional details of approximately 100 individuals associated with U.S. government agencies, primarily involved in national security, counter-terrorism, law enforcement, and diplomatic activities. Exposed key fields include names, email addresses, office and phone numbers, which are linked to specific activity IDs.
This leak poses significant risks, including targeted phishing, social engineering attacks, espionage, or physical threats to U.S. personnel overseas. Affected entities span the Department of Justice (DOJ), Department of State (State), Federal Bureau of Investigation (FBI), Customs and Border Protection (CBP), among others, with a focus on international operations in regions such as Africa, the Middle East, South Asia, and Europe. Adversarial forces such as state-sponsored actors, cybercriminal groups, or terrorist organizations may exploit this information for intelligence gathering or disruptive actions.
Please see the attachment for the relevant data.