Threat actor 'kittykatkrew' leaked Arkansas State Crime Lab personnel directory and court calendars in 2026
In April 2026, a threat actor calling itself 'kittykatkrew' breached an Arkansas State Crime Lab database and leaked the full personnel directory plus active court calendars. Exposed data included names, emails, phone numbers, job titles, and employing agencies for prosecutors, police, and city officials across Arkansas, alongside defendant names, court dates, forensic-analyst assignments, and prosecutor contacts.
What happened
On April 23, 2026, Dark Web Informer reported that an actor identifying as 'kittykatkrew' posted a breach of an Arkansas State Crime Lab portal on spear.cx, a dark-web forum. The exposed data, per public summary of the leak, includes a full personnel directory of every portal user — prosecutors, police officers, and city officials across Arkansas — with names, work emails, phone numbers, job titles, and employing agency for each. The leak also includes active court calendars naming defendants, court dates, assigned forensic analysts, and prosecutor contact information, plus account-status metadata and last-login timestamps. The full Dark Web Informer article is behind a paywall, but the public summary establishes the scope.
What happened
On April 23, 2026, the dark-web monitoring outlet Dark Web Informer reported that a threat actor calling itself "kittykatkrew" had posted a breach of an Arkansas State Crime Lab portal on spear.cx. The leak's public summary lists exposed data classes that read like a target list for first-responder doxxing.
The personnel directory includes every portal user, meaning prosecutors, police officers, and city officials across Arkansas, with full names, work emails, phone numbers, job titles, and employing agencies. The court-calendar data covers defendant names, scheduled court dates, assigned forensic analysts, and prosecutor contact information. Account metadata, including last-login timestamps, was also leaked.
The full Dark Web Informer article requires a paid subscription. The summary published in the public preview is sufficient to establish the breach's scope and significance for Arkansas law-enforcement personnel.
How it started
State crime labs hold concentrated data tied to active investigations and to the people working them. The Arkansas State Crime Lab portal, like similar systems in other states, is a single-sign-on entry point for prosecutors, police, and analysts. When that portal is breached, the directory of users is itself the prize. Names and roles tied to specific Arkansas LE agencies become trivially searchable, which makes broker-side cross-referencing the next obvious step.
The actor name "kittykatkrew" has surfaced in unrelated leak posts on spear.cx in 2025-2026, suggesting an actor or crew that operates across state-level government targets.
What this means for you
If you're a prosecutor, police officer, forensic analyst, or city official in Arkansas whose name and work email landed in this leak, the immediate exposure is the directory entry itself. The downstream risk is what someone does with that directory: a name + agency lookup, then a broker-side search for the residence tied to that name.
Arkansas has thin officer-specific privacy law. The FOIA personal-contact exemption at Ark. Code §25-19-105(b)(13) covers your contact info as held by your agency. It doesn't reach the leaked directory now circulating on a dark-web forum. There is no Arkansas Daniel's Law. The federal DPPA is the floor for DMV-sourced data.
The practical mitigation: get your home address and unpublished phone off broker pages so the leaked directory entry can't be cross-referenced into a residence. We sweep continuously across 200+ broker sites.
Editorial rules: Only public, already-reported incidents. Never name a non-public victim. Always end with the prevention takeaway tied to our service. Cite at minimum one public source per claim.
What would have prevented this
Arkansas has no Daniel's Law analog. The state's FOIA personal-contact-info exemption (Ark. Code §25-19-105(b)(13)) covers data held by state and local agencies, not data already published on a leak forum. Once a personnel directory like this is in circulation, the names and emails get cross-referenced against broker pages to build target dossiers. The mitigation is upstream: keep your home address and phone off broker pages so the leaked directory entry on its own doesn't connect to a residence. We file opt-outs across 200+ broker sites and re-check every two weeks.