Ransomware victim disclosure
← All victimsWarren County Sheriff’s Office
Claimed by Ransomhouse · listed 4 months ago
Status timeline
- Listed
Jan 23, 2026
- Data leaked
At a glance
- Group
- Ransomhouse
- Status
- Data leaked
- Country
- United States
- Sector
- Public Sector
- Listed on leak site
- Jan 23, 2026
- Data size
- 743 GB
- Ransom demanded
- $740
About the victim
AI dossier — public-source company profileThe Warren County Sheriff's Office is a law enforcement agency located in Warren County, Kentucky, USA, led by Sheriff Brett Hightower. As a county sheriff's office, it is responsible for public safety, law enforcement, and related government functions serving the residents of Warren County. The agency operates with approximately 120 employees and an estimated annual budget/revenue of $13 million.
- Industry
- Law Enforcement / Public Safety
- Address
- Warren County, Kentucky, USA
- Employees
- 120
Attack summary
Severity: critical — A law enforcement agency breach involving 743 GB of exfiltrated data almost certainly contains sensitive regulated information including criminal records, PII of citizens and personnel, investigative files, and potentially protected law enforcement sensitive data — all constituting critical-severity regulated/government data at scale.RansomHouse claims to have encrypted systems and exfiltrated approximately 743 GB of internal data from the Warren County Sheriff's Office, with the stolen data described as an internal database pack. The data has not yet been published but is listed as evidence status with a ransom demand of $740.
Data the group says was taken
AI dossier — extracted from the leak post- Internal law enforcement databases
- Personnel records
- Criminal justice records
- Operational/investigative files
- Government administrative data
What the group claims
The Warren County Sheriff's Office (Kentucky, USA), led by Sheriff Brett Hightower, is a professional law enforcement agency dedicated to protecting residents and visitors, upholding Kentucky state laws and the U.S. Constitution, and delivering comprehensive public safety services across the county. The office provides a wide range of functions, including proactive crime prevention, rapid incident response, equitable enforcement of ordinances and statutes, civil process execution, tax collection and administration, concealed carry permit issuance, and various community-oriented programs and educational initiatives. Headquartered in Bowling Green, the agency maintains a 24/7 operational commitment to emergency preparedness, integrity-driven community policing, and continuous improvement through citizen engagement and feedback to enhance overall safety and quality of life.
The leak post
captured from the group's site```
{"data":[{"id":"a1894b76b7004c75a3a0845799af49956592e3d9","display":"animated","header":"HOT NEWS","info":" Trellix is a global cybersecurity company.","url":"","sort":1,"views":"436242"},{"id":"336b257f582b17573c97578efd4b22762bf77344","sort":2,"header":"Trellix (McAfee & FireEye)","url":"https://www.trellix.com/","private":"false","revenue":"1.5-2 B$","employees":"5000","info":"Trellix is a global cybersecurity company formed from the October 2021 merger of McAfee Enterprise and FireEye. It provides services to over 50,000 business and government customers worldwide, protecting more than 200 million endpoints. The companys open and native extended detection and response (XDR) platform helps organizations confronted by todays most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through machine learning and automation to empower over 40,000 business and government customers with living security","statusDate":"DEPENDS ON YOU","status":"EVIDENCE","published":"NOT YET","action":"Encrypted","actionDate":"17/04/2026","volume":"~","content":"cybersecurity.html"…Sources
Source
Indexed 4 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
