All News

Russian Hack Allegedly Breaches US PACER Court System

Sources tell The New York Times that Russian-linked hackers are at least partly responsible for a cyberattack on PACER, the U.S. federal court filing system. Stolen data may include sealed dockets, indictments, arrest warrants and identities of confidential informants — raising risks to public safety, ongoing prosecutions, and judicial integrity.

Published August 12, 2025 at 05:08 PM EDT in Cybersecurity

Alleged Russian Hack Compromises PACER

The New York Times reports that Russian government actors are “at least in part responsible” for a cyberattack on PACER, the U.S. federal court electronic filing system. Anonymous sources say the intruders searched for midlevel criminal cases in New York and other jurisdictions, including matters tied to Russian and Eastern European surnames.

Earlier reporting from Politico detailed the potential scope: hackers may have accessed sealed dockets, indictments, arrest warrants, and — critically — identities of confidential informants that are redacted from public records. Exposure of those identities could place informants at immediate physical risk and compromise ongoing investigations.

The Administrative Office of the U.S. Courts confirmed a cyberattack on August 7 and characterized the compromise of sealed records as stemming from “persistent and sophisticated cyber threat actors.” A memo to Justice Department officials and court staff labeled the incident an “URGENT MATTER” requiring immediate action.

This is not without precedent. In the 2020 SolarWinds campaign, Russian-linked intruders used a tainted software update to gain backdoor access to multiple U.S. agencies. That breach reportedly allowed theft of sealed court documents previously, showing how supply-chain and sophisticated persistent threats can reach sensitive judicial systems.

Immediate operational risks are clear: informant safety, jeopardized prosecutions, leaks of non-public investigative steps, and erosion of public trust in court data security. For prosecutors and defense counsel alike, the exposure of sealed materials can change case strategy and evidence integrity.

Key emergency actions court systems should take now include:

  • Isolate and preserve forensic evidence to establish attacker scope and timeline.
  • Prioritize review of sealed dockets and any documents tied to ongoing prosecutions or informant identities.
  • Notify potentially affected individuals and coordinate protective measures with law enforcement.
  • Harden access controls, segment sensitive systems, and accelerate vulnerability patching.

Longer term, the incident highlights systemic needs: tighter supply-chain security, zero-trust architectures for judicial platforms, granular logging, and cross-agency incident playbooks that include witness protection protocols tied to cyber events.

For organizations facing such a breach, rapid impact mapping matters more than checklist compliance. Understanding which sealed files are exposed, which cases are at risk, and what intelligence adversaries can use lets decision-makers prioritize protective steps that reduce harm quickly.

QuarkyByte’s analytic-first approach would focus on reconstructing attacker activity, mapping data exposure to real-world prosecutorial impact, and sequencing mitigations so courts can protect informants and evidence while restoring services. Agencies should prepare for follow-on disclosures and geopolitical fallout as investigations continue.

As officials investigate attribution and scope, the case is a reminder that no single system is an island. Judicial trust depends on resilient platforms, clear incident response, and rapid coordination between courts, law enforcement, and security partners to protect people whose lives may now be in danger.

Keep Reading

View All
The Future of Business is AI

AI Tools Built for Agencies That Move Fast.

QuarkyByte can help courts, agencies, and legal firms map exposed records, triage risks to sealed dockets and informants, and prioritize defenses that reduce attacker dwell time. Contact us to run an impact assessment, simulate threat scenarios, and build a rapid remediation plan tailored to judicial systems.