U.S. Court System Hack Raises Risk for Sensitive Federal Court Filings

Smith Anderson
Contact

Smith Anderson

Incident Overview

Recently, the federal judiciary’s electronic case management system (CM/ECF) was compromised in a large-scale cyberattack. While the Administrative Office of U.S. Courts has publicly acknowledged the incident, its statement did not identify specifically what was accessed or compromised within the system. The judiciary did acknowledge, however, that the hackers appear to have accessed "highly sensitive non-public documents." The New York Times recently reported that an internal Justice Department memo disclosed that "persistent and sophisticated cyber threat actors have recently compromised sealed records."

Federal courts use the case management system for multiple purposes, including to manage all court filings though the Case Management/Electronic Case Files (CM/ECF) system, as well as to provide the public with limited access to court filings through the Public Access to Court Electronic Records (PACER) system. Although its purpose is to make certain legal records available to the public, PACER also contains materials sealed from public view, such as sensitive intellectual property, trade secrets, pricing information, and other confidential filings.

Recent evidence suggests Russian state-linked threat actors may have been involved in the cyberattack. Sensitive PACER records have long been a target for foreign adversaries, and cyberattacks of this scale are not new. Following a 2021 breach, courts began uploading "highly sensitive court documents" (HSDs) to secure stand-alone systems. In the wake of this latest sophisticated cyberattack, some courts have further restricted sealed filings, implemented multi-factor authentication, and even prohibited overseas access to PACER. Those companies and firms that have submitted sealed filings through CM/ECF containing especially sensitive information should evaluate their risk and, if the level of concern warrants it, consider contacting outside counsel to determine what options may be available to address the incident. 

Key Recommendations

  1. CM/ECF and Sensitive Filings
    1. Review all filings submitted through CM/ECF for sensitive intellectual property, trade secrets, pricing information, or other confidential content.
    2. When possible, request alternative submission methods such as secure offline delivery, encrypted portals, or sealed hard-copy filings.
  2. Incident Response & Cyber Preparedness
    1. Keep your incident response plan current and include court system breach scenarios.
    2. Maintain cyber insurance that covers legal and regulatory costs, and ensure Smith Anderson or your preferred counsel is listed as counsel on your policy.
    3. Train staff to identify and escalate suspected cybersecurity incidents quickly.
    4. If you suspect exposure of court-related data, contact legal counsel immediately to assess obligations, manage communications, and coordinate with authorities.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Smith Anderson

Written by:

Smith Anderson
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Smith Anderson on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide