FRONTLINEPRIVACY
Address exposure

Rhysida ransomware group claimed a 2025 attack on Maryland Transit Administration, exposing addresses and IDs

2025-08-01·Maryland

The Rhysida ransomware group claimed a 2025 attack on the Maryland Transit Administration, alleging it had stolen Social Security numbers, driver's license details, home addresses, and passport data tied to Maryland residents.

What happened

According to Government Technology, the Maryland Transit Administration disclosed a cyberattack in August 2025 that disrupted bus tracking systems. The Rhysida ransomware group publicly took credit and claimed to have exfiltrated personal data including Social Security numbers, driver's license details, home addresses, passport information, and other legal documents tied to Maryland residents. Some of the data was posted to the group's leak site as proof. State and federal investigators were notified.

What happened

In August 2025, Government Technology reported that the Maryland Transit Administration had been hit by a cyberattack that interrupted bus tracking and other systems. The Rhysida ransomware group publicly claimed responsibility and listed the agency on its data-leak site. Rhysida claimed to have stolen Social Security numbers, driver's license details, home addresses, passport data, and other legal documents tied to Maryland residents.

The agency confirmed the disruption and engaged state and federal investigators. The exposed dataset, if Rhysida's claims hold up, includes the high-quality identifiers that fuel doxxing campaigns and identity theft.

How it started

Rhysida has hit transit and government targets in multiple states. The MTA breach fits the group's pattern of exfiltrating data first, then announcing the attack publicly to pressure ransom payment. When ransom isn't paid, the data ends up on the leak site.

For Maryland residents, including officers, judges, and EMTs whose data flowed through MTA systems for any reason, the leaked dataset adds new addresses and identifiers to the pool brokers and aggregators eventually pick up.

What this means for you

If you're a Maryland judge or magistrate, you have one of the country's strongest Daniel's Law analogs at your back. The statute requires brokers to remove your data within 72 hours of notice, with $1,000 in statutory damages per violation and punitive damages on willful refusal.

If you're an officer, EMT, or corrections worker, that statute does not cover you. Your option is the public-records exemption for what the state holds, plus continuous broker removal for what brokers republish. We handle the second part.


Editorial rules: Only public, already-reported incidents. Never name a non-public victim. Always end with the prevention takeaway tied to our service. Cite at minimum one public source per claim.

What would have prevented this

Maryland already has one of the strongest [Daniel's Law](/laws/daniels-law)-style protections in the country for judges and magistrates, with $1,000 statutory damages and a 72-hour compliance window written into Md. Code Cts. & Jud. Proc. §§ 3-2301 to 3-2304. Officers and other first responders aren't covered by that statute. They rely on the public-records exemption (Md. Code Gen. Prov. § 4-355) and the ACP, which is not designed for them. Continuous broker removal closes the gap that the judicial statute leaves open for everyone else.

Public sources