116,666
DocketWise, a provider of cloud-based case management software for immigration law firms, has disclosed a significant data breach affecting 116,666 individuals. The incident stemmed from unauthorized access to a data repository managed by a third-party partner. An unauthorized actor used valid credentials to access and copy files containing extensive and highly sensitive records from DocketWise's law firm customers. The exposed data includes a vast range of Personally Identifiable Information (PII), such as Social Security numbers, passport numbers, financial account details, and medical information. The breach, which was first identified in October 2025, highlights the critical risks associated with supply chain security and the immense sensitivity of data handled by legal tech platforms.
This incident is a classic example of a supply chain data breach, where the compromise of a third-party vendor led to the exposure of a primary organization's data.
T1078 - Valid Accounts). The source of these credentials (e.g., phishing, brute force, info-stealer malware) was not disclosed.T1537 - Transfer Data to Cloud Account).The core failure appears to be in the security posture of a third-party partner. The use of "valid credentials" suggests a potential lack of robust access controls, such as Multi-Factor Authentication (MFA), on the repository. It also raises questions about how these credentials were managed and protected. Once the attacker gained access, they were able to exfiltrate a large volume of data, suggesting insufficient data access monitoring or Data Loss Prevention (DLP) controls on the repository.
The incident underscores the principle that an organization's security is only as strong as its weakest link, which often lies within its supply chain. DocketWise, as the data controller, remains responsible for protecting its clients' data, even when it is stored or processed by a third-party partner.
The impact of this breach is extremely severe for the 116,666 affected individuals. The compromised data is a 'gold mine' for identity thieves and fraudsters. It includes all the necessary elements to perpetrate sophisticated fraud:
For DocketWise and its law firm customers, the breach results in massive reputational damage, regulatory fines (under state data breach laws), and the high cost of incident response and potential class-action lawsuits.
Requiring MFA for access to sensitive data repositories would have likely prevented this breach, as the attacker's stolen credentials alone would have been insufficient.
Mapped D3FEND Techniques:
Applying the principle of least privilege to third-party accounts ensures that even if compromised, they only have access to the minimum data necessary, limiting the breach's impact.
Mapped D3FEND Techniques:
To prevent supply chain breaches like the one at DocketWise, which was caused by compromised credentials at a third-party partner, organizations must contractually mandate the use of MFA for all vendor access to their data. This should be a non-negotiable clause in all vendor contracts. The requirement should specify phishing-resistant MFA, such as FIDO2 hardware keys, where possible. DocketWise should have ensured that any partner repository hosting their client data had MFA enforced for all administrative and data access accounts. This simple control would have rendered the attacker's stolen credentials useless, preventing the breach entirely. Verifying this control through regular vendor security assessments is a critical part of a Third-Party Risk Management (TPRM) program.
To detect a breach in a third-party repository, DocketWise or its partner should have been performing resource access pattern analysis. This involves instrumenting the data repository to log all access events and feeding those logs into a security analytics platform. The platform would then baseline normal access patterns for the vendor's service accounts. A detection rule should have been in place to alert on significant deviations, such as: 1) Access from an IP address or geographic location not associated with the vendor. 2) A massive increase in the volume of data being read or downloaded by a single account. 3) Access to a large number of distinct files or records in a short time frame. Any of these would have indicated the credential compromise and data exfiltration activity, allowing for a much faster response than the months it took to discover this incident.
Access to sensitive third-party data repositories should be strictly controlled via inbound traffic filtering. The repository that hosted DocketWise's data should have been configured to only accept connections from a pre-approved list of IP addresses belonging to the vendor's legitimate operational infrastructure. All other access from the public internet should have been blocked at the network level. This simple network control would have prevented the attacker from using their stolen credentials, unless they also managed to compromise the vendor's internal network. This creates an additional layer of defense and significantly raises the bar for the attacker. This control should be a standard requirement in any organization's TPRM program for vendors handling sensitive data.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats