FRONTLINEPRIVACY
Address exposure

Warren County, Kentucky Sheriff disclosed a December 2025 data breach that leaked SSNs

2025-12-01·Warren County, Kentucky

Warren County Sheriff's Office in Kentucky notified residents of a December 2025 data breach in which Social Security numbers and other personal information were compromised. Ransomware group RansomHouse claimed credit.

What happened

According to Comparitech, Warren County Sheriff's Office in Kentucky disclosed a December 2025 data breach that exposed Social Security numbers and other personal information for residents and county personnel. The ransomware group RansomHouse publicly took credit for the intrusion. The Sheriff's Office sent notification letters and recommended affected individuals enroll in credit monitoring.

What happened

In December 2025, Warren County Sheriff's Office in Kentucky began sending breach notification letters to residents. According to Comparitech, the breach exposed Social Security numbers and other personal information. The ransomware group RansomHouse publicly claimed credit for the attack.

The Sheriff's Office is the lead law enforcement agency for Warren County, which includes Bowling Green. The exposure included data tied to the office's own operations, meaning deputies and civilian staff records were potentially involved alongside resident data.

How it started

Ransomware groups have increasingly targeted county sheriff's offices. The data they take, names, dates of birth, SSNs, sometimes home addresses, is the same data that fuels broker pages. RansomHouse is one of several groups operating leak sites where stolen data is published or sold.

A sheriff's office is a high-value target because the data spans both employees and residents tied to the agency. Deputies' HR records, civilian staff payroll, and case-related data are all in scope.

What this means for you

If you're a Kentucky deputy or sheriff's office staffer, the state's Safe at Home program (KRS 14.300 to 14.318) is built around domestic violence and stalking victims, not officer protection. Kentucky's general public-records exemption (KRS 61.878) gives you a privacy argument case-by-case but no proactive removal right.

There is no Kentucky Daniel's Law analog. Continuous broker removal is the layer you control. We do that work and re-do it when the listings come back.


Editorial rules: Only public, already-reported incidents. Never name a non-public victim. Always end with the prevention takeaway tied to our service. Cite at minimum one public source per claim.

What would have prevented this

Kentucky has no Daniel's Law analog and no broker removal mechanism. The Safe at Home address confidentiality program (KRS 14.300 to 14.318) doesn't cover officers as a class. The general public-records exemption (KRS 61.878) is reactive. When a sheriff's office gets ransomwared, deputies and their families end up in the same exposed dataset as the residents they serve. The only durable mitigation is removing the data from broker pages before someone cross-references the exposed names with the published addresses.

Public sources