Immigration Law Platform DocketWise Discloses Breach Affecting Over 116,000 People

DocketWise Data Breach Exposes Sensitive Personal Information of 116,666 Individuals

HIGH
April 3, 2026
5m read
Data BreachSupply Chain AttackPolicy and Compliance

Impact Scope

People Affected

116,666

Industries Affected

Legal Services

Geographic Impact

United States (national)

Related Entities

Other

DocketWise

Full Report

Executive Summary

DocketWise, a provider of cloud-based case management software for immigration law firms, has disclosed a significant data breach affecting 116,666 individuals. The incident stemmed from unauthorized access to a data repository managed by a third-party partner. An unauthorized actor used valid credentials to access and copy files containing extensive and highly sensitive records from DocketWise's law firm customers. The exposed data includes a vast range of Personally Identifiable Information (PII), such as Social Security numbers, passport numbers, financial account details, and medical information. The breach, which was first identified in October 2025, highlights the critical risks associated with supply chain security and the immense sensitivity of data handled by legal tech platforms.

Threat Overview

This incident is a classic example of a supply chain data breach, where the compromise of a third-party vendor led to the exposure of a primary organization's data.

  • Attack Vector: Unauthorized access to a third-party repository using valid credentials (T1078 - Valid Accounts). The source of these credentials (e.g., phishing, brute force, info-stealer malware) was not disclosed.
  • Targeted Data: The attackers specifically targeted and copied files containing law firm records. This indicates a deliberate effort to obtain high-value, sensitive data.
  • Data Exfiltration: The actor copied data from the repository, constituting a confirmed data exfiltration event (T1537 - Transfer Data to Cloud Account).

Technical Analysis

The core failure appears to be in the security posture of a third-party partner. The use of "valid credentials" suggests a potential lack of robust access controls, such as Multi-Factor Authentication (MFA), on the repository. It also raises questions about how these credentials were managed and protected. Once the attacker gained access, they were able to exfiltrate a large volume of data, suggesting insufficient data access monitoring or Data Loss Prevention (DLP) controls on the repository.

The incident underscores the principle that an organization's security is only as strong as its weakest link, which often lies within its supply chain. DocketWise, as the data controller, remains responsible for protecting its clients' data, even when it is stored or processed by a third-party partner.

Impact Assessment

The impact of this breach is extremely severe for the 116,666 affected individuals. The compromised data is a 'gold mine' for identity thieves and fraudsters. It includes all the necessary elements to perpetrate sophisticated fraud:

  • Identity Theft: Names, dates of birth, SSNs, and passport numbers can be used to open fraudulent accounts, file fake tax returns, or create synthetic identities.
  • Financial Fraud: Exposed financial account and payment card information can be used for direct theft.
  • Targeted Scams: The data pertains to immigration clients, a particularly vulnerable population. Attackers could use the information to create highly convincing phishing or extortion scams, such as demanding payment to avoid deportation or to expedite a non-existent case.
  • Medical Identity Theft: Exposed health insurance and medical information can be used to obtain medical services or prescription drugs fraudulently.

For DocketWise and its law firm customers, the breach results in massive reputational damage, regulatory fines (under state data breach laws), and the high cost of incident response and potential class-action lawsuits.

Cyber Observables for Detection

  • Cloud Repository Access Logs: Monitor access logs for third-party storage repositories (e.g., AWS S3, Azure Blob Storage) for anomalous access patterns, such as logins from unrecognized IP addresses or unusually large data downloads.
  • Credential Exposure: Continuously scan dark web forums and code repositories for leaked credentials belonging to the organization or its third-party vendors.

Detection & Response

  • Third-Party Risk Management (TPRM): Implement a robust TPRM program that includes thorough security assessments of all vendors before they are onboarded. This should include reviewing their security policies, certifications (e.g., SOC 2, ISO 27001), and incident response plans.
  • Data Access Monitoring: Enforce logging and monitoring on all data repositories, whether internal or third-party. Use UEBA and data access monitoring tools to alert on anomalous behavior, such as a user account accessing an unusual volume of data.
  • Incident Response Planning: Ensure that incident response plans explicitly cover scenarios involving third-party breaches. This includes clear communication channels and contractual obligations for timely notification from the vendor.

Mitigation

  • Enforce MFA on Third Parties: Contractually require all third-party partners who handle sensitive data to enforce MFA on all administrative and data access accounts. This is a non-negotiable control.
  • Principle of Least Privilege: Ensure that third-party vendors are only granted the absolute minimum level of access required for their function. They should not have standing access to large datasets unless it is operationally essential.
  • Data Encryption: All sensitive data, both at rest in the repository and in transit, must be encrypted. While this would not have prevented this specific breach (as the attacker had valid credentials), it is a foundational security control.
  • Data Minimization: Only store the data that is absolutely necessary. Regularly purge old records that are no longer required for legal or business reasons to reduce the potential impact of a future breach.

Timeline of Events

1
October 1, 2025
DocketWise discovers unauthorized access to a third-party partner repository.
2
April 3, 2026
DocketWise begins sending data breach notification letters to affected individuals.
3
April 3, 2026
This article was published

MITRE ATT&CK Mitigations

Requiring MFA for access to sensitive data repositories would have likely prevented this breach, as the attacker's stolen credentials alone would have been insufficient.

Mapped D3FEND Techniques:

Applying the principle of least privilege to third-party accounts ensures that even if compromised, they only have access to the minimum data necessary, limiting the breach's impact.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Continuously auditing and monitoring access logs for data repositories can help detect anomalous activity, such as large-scale data downloads, indicative of a breach.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To prevent supply chain breaches like the one at DocketWise, which was caused by compromised credentials at a third-party partner, organizations must contractually mandate the use of MFA for all vendor access to their data. This should be a non-negotiable clause in all vendor contracts. The requirement should specify phishing-resistant MFA, such as FIDO2 hardware keys, where possible. DocketWise should have ensured that any partner repository hosting their client data had MFA enforced for all administrative and data access accounts. This simple control would have rendered the attacker's stolen credentials useless, preventing the breach entirely. Verifying this control through regular vendor security assessments is a critical part of a Third-Party Risk Management (TPRM) program.

To detect a breach in a third-party repository, DocketWise or its partner should have been performing resource access pattern analysis. This involves instrumenting the data repository to log all access events and feeding those logs into a security analytics platform. The platform would then baseline normal access patterns for the vendor's service accounts. A detection rule should have been in place to alert on significant deviations, such as: 1) Access from an IP address or geographic location not associated with the vendor. 2) A massive increase in the volume of data being read or downloaded by a single account. 3) Access to a large number of distinct files or records in a short time frame. Any of these would have indicated the credential compromise and data exfiltration activity, allowing for a much faster response than the months it took to discover this incident.

Access to sensitive third-party data repositories should be strictly controlled via inbound traffic filtering. The repository that hosted DocketWise's data should have been configured to only accept connections from a pre-approved list of IP addresses belonging to the vendor's legitimate operational infrastructure. All other access from the public internet should have been blocked at the network level. This simple network control would have prevented the attacker from using their stolen credentials, unless they also managed to compromise the vendor's internal network. This creates an additional layer of defense and significantly raises the bar for the attacker. This control should be a standard requirement in any organization's TPRM program for vendors handling sensitive data.

Sources & References

DocketWise Data Breach Affects 116K, Lawsuit Possible - Class Action
ClassAction.org (classaction.org) April 6, 2026
250,000 Affected by Data Breach at Nacogdoches Memorial Hospital
SecurityWeek (securityweek.com) April 3, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

PIIsupply chainthird-party risklegal techGDPRidentity theft

📢 Share This Article

Help others stay informed about cybersecurity threats