Hacktivists Leak Data on 6,000 Companies Linked to Federal Deportation Efforts

Hacktivists Leak Data on 6,000 Companies Linked to Federal Deportation Efforts

2026-03-03 politics

Washington D.C., Monday, 2 March 2026.
A hacktivist collective breached the Department of Homeland Security, leaking sensitive contract data for over 6,000 private firms—including Microsoft and Raytheon—to protest federal deportation operations.

Breach Exposes Federal Supply Chain

In a significant cybersecurity escalation targeting the current administration’s immigration policies, a hacktivist group known as the “Department of Peace” claimed responsibility for hacking the Department of Homeland Security (DHS) on Sunday, March 1, 2026 [1]. The breach specifically targeted the DHS Office of Industry Partnership, resulting in the exfiltration and subsequent leak of contract data involving over 6,000 entities [1][2]. The leaked dataset, published by the transparency collective Distributed Denial of Secrets (DDoSecrets), illuminates the vast network of private sector support for Immigration and Customs Enforcement (ICE) and its ongoing mass deportation campaign [1][2]. This event underscores the growing operational risks for companies servicing controversial government mandates.

Financial Scale of Disclosed Contracts

The exposed data reveals substantial financial commitments from the federal government to private contractors. Among the most significant allocations identified in the leak are contracts awarded to Cyber Apex Solutions, Science Applications International Corporation (SAIC), and Underwriters Laboratories [1]. Cyber Apex Solutions, a firm focused on critical infrastructure security, received contracts totaling $70 million, while SAIC was awarded $59 million for artificial intelligence services [1]. Underwriters Laboratories secured $29 million for testing and certification services [1]. The combined value of just these three top-tier contracts amounts to 158 million, highlighting the lucrative nature of these federal partnerships despite the associated reputational risks.

Political Volatility and Administrative Context

The hacktivists explicitly cited the recent killings of Alex Pretti and Renée Good by federal agents in Minneapolis earlier in 2026 as the catalyst for the breach [1]. In a statement accompanying the leak, the group utilized a grim play on words, noting they had “a couple Pretti Good reasons” for the attack, asserting that the public deserves to know which corporations are facilitating DHS operations [1][2]. This cyber-protest occurs against a backdrop of instability within the federal cybersecurity apparatus. Just days prior, on February 28, 2026, the DHS appointed Nick Anderson as the new acting director of the Cybersecurity and Infrastructure Security Agency (CISA), replacing Madhu Gottumukkala [3]. This leadership turnover follows a period of void in high-level cyber command; President Trump had previously fired Air Force Gen. Timothy Haugh in April 2025, leaving the National Security Agency (NSA) and US Cyber Command without a confirmed lead for ten months [3].

Corporate Exposure and Market Implications

The leak implicates a wide array of industry giants and defense contractors, stripping away the anonymity of their involvement with ICE. Major corporations including Microsoft, Oracle, Raytheon, L3Harris, Palantir, and Anduril are listed among the 6,681 organizations in the dataset [1][2]. While some entities listed include universities and water safety organizations, the hacktivists emphasized that the goal was to expose the commercial architecture supporting the government’s deportation machinery [2]. For investors and board members, this incident represents a material escalation in Environmental, Social, and Governance (ESG) risk, as association with the administration’s contentious immigration policies is now a matter of public record, organized for accessibility by security researchers [1][2].

Summary

The Department of Peace hack serves as a critical intersection of political dissent and corporate transparency. By linking specific contract values—such as the massive sums awarded to Cyber Apex Solutions and SAIC—to the administration’s deportation efforts, the hacktivists have forced a public accounting of the private sector’s role in federal law enforcement [1]. As the DHS grapples with this breach amidst leadership changes at CISA and the lingering effects of President Trump’s 2025 dismissal of top cyber officials, government contractors must now navigate a landscape where digital obscurity is no longer guaranteed [3].

Sources


Cybersecurity Government Contracting