An investigation by Proton and Constella Intelligence has uncovered that the majority of U.S. state legislators (67%) have had their personal information exposed in data breaches. The data, linked to their official government email addresses, was found in breach compilations circulating on the dark web. The exposures are not the result of direct attacks on government systems but rather stem from legislators using their work emails for personal services. The investigation found over 16,000 breach instances across 49 states, including more than 12,000 cases of exposed Personally Identifiable Information (PII) and, most critically, 560 passwords in plaintext. This widespread exposure represents a significant counterintelligence and security risk, providing adversaries with ample material for targeted phishing, account takeover, and blackmail operations against American policymakers.
The threat is not a single, coordinated attack but a systemic issue of poor operational security and the inevitable fallout from countless third-party data breaches over many years. When legislators use their official email addresses (e.g., legislator@statesenate.gov) to register for commercial services like LinkedIn, Adobe, or Dropbox, that email becomes tied to the security of that third-party service. When the third party is breached, the legislator's email, password hash (or plaintext password), and other PII become part of the breach data that is sold or shared on the dark web.
This creates a massive risk profile:
T1110.003 - Password Spraying).T1566.002 - Spearphishing Link).The research involved correlating publicly available email addresses of 7,377 state legislators with massive datasets of breached information. The findings were stark:
This is a classic example of how a compromised identity on one platform can create a cascading risk across a person's entire digital life. For a public official, this personal risk translates directly into a risk for their government institution and constituents.
Detection in this context is about identifying when leaked credentials are being used, not detecting the original third-party breach.
Authentication LogsPassword SprayingHaveIBeenPwnedProton has notified the affected politicians. For government IT departments, the response should be:
M1032 - Multi-factor Authentication).M1017 - User Training).Train officials on the importance of operational security, including not using work emails for personal services and the dangers of password reuse.
Enforce phishing-resistant MFA on all government accounts to mitigate the risk of compromised passwords.
Mapped D3FEND Techniques:
Enforce strong, unique passwords for all accounts and encourage the use of password managers.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.