HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔓 Breach

Hackers Claim Access to Over 8 Million Crime‑Tip Records from P3 Global Intel

Hacktivists say they stole more than 8 million tip‑submission records from P3 Global Intel, exposing names, addresses, SSNs and unencrypted credentials. The breach threatens law‑enforcement anonymity guarantees and raises third‑party risk for agencies using Crime Stoppers platforms.

🛡️ LiveThreat™ Intelligence · 📅 March 26, 2026· 📰 malwarebytes.com
🟠
Severity
High
🔓
Type
Breach
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
malwarebytes.com

Hackers Claim Access to Over 8 Million Crime‑Tip Records from P3 Global Intel

What Happened – Hacktivist group “Internet Yiff Machine” says it exfiltrated more than 8.3 million records from P3 Global Intel, the cloud‑based tip‑management platform used by Crime Stoppers programs worldwide. The leaked data allegedly contains names, addresses, phone numbers, dates of birth, Social Security numbers, license‑plate numbers and unencrypted login credentials.

Why It Matters for TPRM

  • Exposure of personally identifiable information (PII) for millions of tipsters creates legal, reputational, and compliance risk for any organization that relies on the service.
  • The breach highlights the danger of third‑party platforms that promise anonymity but may store sensitive data in insufficiently protected forms.
  • Ongoing investigations and public advisories (e.g., Portland Police) may disrupt law‑enforcement tip‑collection workflows, affecting service continuity.

Who Is Affected – Law‑enforcement agencies, schools, federal‑government programs, and any organization that uses Crime Stoppers or P3’s tip‑management SaaS.

Recommended Actions

  • Review contracts and data‑protection clauses with Navigate360/P3 Global Intel.
  • Verify whether your organization submits tips through the platform; if so, assess the exposure of any submitted data.
  • Request evidence of remediation, encryption, and incident‑response plans from the vendor.
  • Consider temporary alternative channels for anonymous tip collection until the investigation concludes.

Technical Notes – The attack vector has not been publicly disclosed; investigators suspect a compromise of the vendor’s cloud environment or a third‑party dependency. The data set includes unencrypted personal identifiers, user‑account details, and internal law‑enforcement bulletins. Source: Malwarebytes Labs

📰 Original Source
https://www.malwarebytes.com/blog/news/2026/03/hackers-claim-to-have-accessed-data-tied-to-millions-of-crime-tipsters

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.