NEW: My post on the student/k-12 tips exposed in "BlueLeaks 2.0" is now up.

P3 Campus and its partner programs like Safe2Say Something PA, Safe2Tell, and Sandy Hook Promise were supposed to provide secure and anonymous ability to report tips.

Promises of security and anonymity do not appear to have been kept. A hacker claims it was easy to gain access and repeatedly access the database to acquire more than 8 million tips.

There is not much anonymous about what I reviewed in the dataset.

Many of the school-related tips I reviewed reported concerns over named students with suicidal ideation or cutting, students being bullied or bullying others, and drugs (mostly vaping) in school. Some students reported cybercriminal activity.

Navigate360, the parent company of P3, still hasn't publicly acknowledged that it was breached and that sensitive information was involved. Their lack of transparency was noted by @douglevin

The dataset has not been leaked publicly, but the "Internet Yiff Machine" who provided it to #ddosecrets and https://infosec.exchange/@mikaelthalen@mastodon.social -- and then to me -- has listed it for sale.

My focus in this post was on the student/school -related tips, but the 93.51 GB dataset has millions of tips that include adult issues and crimes, including drugs, homicide, assaults, etc. I provide one or two examples from the non-student tips to illustrate how sensitive the tips are in this dataset.

This may be the worst breach I've ever seen involving sensitive student information, and I've seen many student-related data breaches over the past two decades.

Read: "P3 Advertised 20+ Years and 0 Security Breaches. You Can Guess What Happened Next.'" at https://databreaches.net/2026/04/16/p3-advertised-20-years-and-0-security-breaches-you-can-guess-what-happened-next/

#BlueLeaks2 #DDoSecrets #databreach #P3Campus #P3Tips #Navigate360 #CrimeStoppers #Safety #Safe2tell #InternetYiffMachine

@zackwhittaker @campuscodi @jgreig @euroinfosec @funnymonkey @mkeierleber @JayeLTee

Infosec Exchange

How to obtain and read the leaked Kash Patel emails on Linux (maybe will work on other OS?)

First download the files from @ddosecrets. They offer both direct DL and torrent options:

https://ddosecrets.org/article/kash-patel-emails

Once you have them unzip the file. These emails are in EML format, and it's possible to import them into Thunderbird so they look just like real emails.

WARNING: If you have TBird hooked up to a live email account you will be able to answer these emails just as if they'd been sent to you. You probably don't want to do this.

I'm running Mint 20.3. Unfortunately the version of TBird in the repository is too old to allow the necessary plugin to work, so I had to install the latest version directly. I used the FlatPak, but any way you can get the latest version is fine. You can download it from:

https://www.thunderbird.net/en-US/

After you have the latest TBird installed go to Addons in the hamburger menu. Search for and install ImportExportTools-NG.

If you already have an actual email account hooked up in TBird skip the next step. If you don't, as I didn't, the only way I could create a local folder was to add a real email account. I could then create a local folder and delete the real account from TBird. It's not necessary to delete it, but having an outgoing server configured when reading leaked emails worries me.

So create a local folder and then right-click on it. You should see an ImportExportTools menu item. Click on that and then Import EML messages and then (most efficient) Import All EML Messages from a Directory and all Subdirectories.

Choose the directory created by unzipping and you're good to go!

#KashPatel #LeakedEmails #DDOSecrets #Handala #Leaks #FBI #HandalaHackTeam

🌕 國土安全部合約探勘工具:DHS Contracts Explorer
➤ 透過視覺化工具解碼政府合約數據的透明化進程
https://micahflee.github.io/ice-contracts/
本文介紹了一款名為「DHS Contracts Explorer」的數位工具,該工具專門用於瀏覽並分析由 DDoSecrets 於 2026 年 3 月 1 日公開的一批外洩數據。這些數據源自美國國土安全部(DHS)產業夥伴關係辦公室(Office of Industry Partnership)。使用者透過此介面,能以視覺化方式深入研究政府合約的細節,包括合約類型、執行階段、各州的資源分配情形以及個別企業的承攬狀況,為解讀政府採購資訊提供了高度透明且便捷的途徑。
+ 這種工具極大降低了研究政府採購流程的門檻,讓公眾能更輕易地監督政府資源的流向。
+ 雖然這批數據來自駭客洩漏,但這類資訊的公開對於評估政府與民間企業的合作效率確實極具價值。
#資安洩漏 #政府合約 #數據分析 #DDoSecrets
DHS Contracts Explorer

📢 Des hacktivistes « Department of Peace » revendiquent le piratage du DHS et publient des données de contrats
📝 Source et contexte — TechCrunch (Lorenzo Franc...
📖 cyberveille : https://cyberveille.ch/posts/2026-03-08-des-hacktivistes-department-of-peace-revendiquent-le-piratage-du-dhs-et-publient-des-donnees-de-contrats/
🌐 source : https://techcrunch.com/2026/03/02/hacktivists-claim-to-have-hacked-homeland-security-to-release-ice-contract-data/
#DDoSecrets #DHS #Cyberveille
Des hacktivistes « Department of Peace » revendiquent le piratage du DHS et publient des données de contrats

Source et contexte — TechCrunch (Lorenzo Franceschi-Bicchierai), 2 mars 2026 : Un groupe de hacktivistes nommé « Department of Peace » revendique un piratage du Department of Homeland Security (DHS), avec une fuite de données publiée par DDoSecrets 🔓. Les données proviendraient de l’Office of Industry Partnership du DHS, chargé d’acquérir des technologies auprès du secteur privé. DHS et ICE n’ont pas répondu immédiatement aux demandes de commentaire. Impact et contenu des données 🗂️ — La publication couvre des contrats entre le DHS, l’ICE et plus de 6 000 entreprises. Le jeu de données comprend notamment :

CyberVeille

The group "Department of Peace" hacked the DHS' internal tool for managing contracts and leaked a list of contractors working with ICE ~6000 of them released today. https://ddosecrets.org/article/ice-contracts

Here is a handy explorer for it https://micahflee.github.io/ice-contracts/
#ice #DepartmentOfPeace #ddosecrets

DHS Contracts - Distributed Denial of Secrets

Details on ICE and DHS contracts with over 6,000 different entities ranging from private businesses to government agencies and even dozens of universities. Some of the notable firms include Anduril, H…

ooooh, la la...

#EpsteinFiles #DDoSecrets

Home - Distributed Denial of Secrets

A 501(c)(3) dedicated to archiving and publishing hacked and leaked data.

Une hacktiviste déguisée en Pink Ranger supprime des sites de nazis en live au 39C3

https://fed.brid.gy/r/https://korben.info/hacktiviste-pink-ranger-supprime-sites-nazis-39c3.html

📢 WhiteLeaks : 8 000 profils et 100 Go de données de sites suprémacistes exposés
📝 Cybernews rapporte qu’un journaliste d’investigation, se présentant sous le pseudonyme « Martha Root », a infiltré la plateforme de ren...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-06-whiteleaks-8-000-profils-et-100-go-de-donnees-de-sites-supremacistes-exposes/
🌐 source : https://cybernews.com/security/investigator-exposes-white-supremacist-sites-users/
#DDoSecrets #EXIF #Cyberveille
WhiteLeaks : 8 000 profils et 100 Go de données de sites suprémacistes exposés

Cybernews rapporte qu’un journaliste d’investigation, se présentant sous le pseudonyme « Martha Root », a infiltré la plateforme de rencontre suprémaciste WhiteDate ainsi que deux sites associés (WhiteChild, WhiteDeal), exfiltrant plus de 8 000 profils et 100 Go de données dans une fuite baptisée « WhiteLeaks ». L’enquête met en cause une fuite de données 🔓 rendue possible par une hygiène de sécurité très faible des sites. Un site vitrine, okstupid.lol, affiche sur une carte 🗺️ les profils exposés à travers le monde.

CyberVeille
🤮🤮🤮🤮🤮 🚫 #Trump really loves 🚫 #pedophiles – who had thought that one. 😡 🚫 #Epstein #DDoSecrets

RE: https://bsky.app/profile/did:plc:awycn3r4572ffn2gl74l7urs/post/3m7slze5ums2d