Hackers Claim Access to Over 8 Million Crime‑Tip Records from P3 Global Intel
What Happened – Hacktivist group “Internet Yiff Machine” says it exfiltrated more than 8.3 million records from P3 Global Intel, the cloud‑based tip‑management platform used by Crime Stoppers programs worldwide. The leaked data allegedly contains names, addresses, phone numbers, dates of birth, Social Security numbers, license‑plate numbers and unencrypted login credentials.
Why It Matters for TPRM –
- Exposure of personally identifiable information (PII) for millions of tipsters creates legal, reputational, and compliance risk for any organization that relies on the service.
- The breach highlights the danger of third‑party platforms that promise anonymity but may store sensitive data in insufficiently protected forms.
- Ongoing investigations and public advisories (e.g., Portland Police) may disrupt law‑enforcement tip‑collection workflows, affecting service continuity.
Who Is Affected – Law‑enforcement agencies, schools, federal‑government programs, and any organization that uses Crime Stoppers or P3’s tip‑management SaaS.
Recommended Actions –
- Review contracts and data‑protection clauses with Navigate360/P3 Global Intel.
- Verify whether your organization submits tips through the platform; if so, assess the exposure of any submitted data.
- Request evidence of remediation, encryption, and incident‑response plans from the vendor.
- Consider temporary alternative channels for anonymous tip collection until the investigation concludes.
Technical Notes – The attack vector has not been publicly disclosed; investigators suspect a compromise of the vendor’s cloud environment or a third‑party dependency. The data set includes unencrypted personal identifiers, user‑account details, and internal law‑enforcement bulletins. Source: Malwarebytes Labs