Article Details

Scrape Timestamp (UTC): 2026-02-02 19:18:43.089

Source: https://www.theregister.com/2026/02/02/stopice_alerts_hacked/

Original Article Text

Click to Toggle View

StopICE hacked to send alarming text messages, admins accuse border patrol agent of sabotage. The ICE-tracking service says it doesn't store usernames or addresses. ICE-reporting service StopICE has blamed a US Customs and Border Protection (CBP) agent for attacking its app and website and sending users text messages warning them that their information had been "sent to the authorities." On Friday, users reported receiving text messages from a phone number linked to the anti-ICE alert app, telling them their "information has been compromised and sent to the authorities." The text message also said that the anti-ICE service's developer, Sherman Austin, "is not to be trusted and is a terrible coder." Meanwhile X users claimed the hackers sent users' names and login information "to a bunch of government agencies." We have reached out to CPB for comment and will update this story if we hear back. However, we were able to get in touch with Austin, and he told The Register that none of the attackers' claims are true. "There are a lot of rumors circulating that were put out by racist pro-Trump accounts on social media," he said in an email. "Specifically rumors about users names, addresses and locations being revealed when this information does not exist on the site." On Saturday, StopICE admins downplayed the breach, said it doesn't store subscribers' personal information, and added that it receives more than 500 distributed-denial-of-service (DDoS) attacks daily: On Jan 30, a server attack attempted to target stopice.net and queue false text alerts from our downstream carrier to our platform. The attack was quickly isolated and neutralized. We've also traced the source of this attack back to a personal server associated with a CBP agent here in SoCal.  (he did not do a good job covering his tracks, nor did his associates.) According to the alert, StopICE – which claims it has more than half a million subscribers – does not request or store users' names and addresses, and anyone claiming to have stolen these details is "attempting to spread rumors in attempt to gain social media fame and clout."  Admins also said that the app does not store GPS tracking details. It does, however, have an optional "location assist" feature for people who want to share their location.  The app's maintainers said that they traced the source by throwing the attackers "bait," such as phony data and fake API keys, which allegedly revealed the intruders' locations, names, phone numbers, and network information, and StopICE has since provided a list of IP addresses and network details belonging to "several attackers." "We will also be including phone numbers, names and profiles of those who've attempted to attack and flood our system, along with those who have attempted to send multiple death threats to the developer," the admins wrote. The alert also reminded users to be careful about posting information on platforms including Meta and Google share users' geolocation and other data to law enforcement upon request - or sometimes if they simply ask nicely -  noted that end-to-end encrypted email providers and messaging apps such as Signal can help secure communications.

Daily Brief Summary

CYBERCRIME // StopICE App Sabotaged, Blames CBP Agent for Text Message Attack

StopICE, an ICE-tracking service, experienced a cyberattack resulting in alarming text messages falsely claiming user data was compromised and shared with authorities.

The attack allegedly originated from a personal server linked to a U.S. Customs and Border Protection agent in Southern California.

StopICE maintains it does not store user names or addresses, countering claims that such data was leaked during the breach.

Administrators quickly isolated and neutralized the attack, which involved sending false alerts through their platform's downstream carrier.

The app's maintainers used decoy data to trace the attackers, identifying their locations, names, phone numbers, and network information.

StopICE has over half a million subscribers and routinely faces over 500 DDoS attacks daily, highlighting ongoing threats to its operations.

Users are advised to use secure communication methods, such as end-to-end encrypted email and messaging apps, to protect their privacy.