DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Company that sells software for monitoring sex offenders, terrorists, and hackers was hacked (1)

Posted on September 27, 2025October 2, 2025 by Dissent

Mikael Thalen reports:

A company that sells spyware that monitors individuals on parole and probation had its data leaked to a cybercrime forum this week. The leak, according to an analysis by Straight Arrow News, exposed highly sensitive information regarding employees of the corrections system and those under court-ordered supervision.

The affected company, RemoteCOM, describes itself as “the premier computer, smartphone and tablet monitoring service for the management of pretrial, probation and parole clients.” The data indicates that RemoteCOM’s services are used by parole and probation officers in 49 states.

A training manual in the leaked data for RemoteCOM’s software, known as SCOUT, says the spyware can be used to track everyone from sex offenders, sex traffickers and stalkers to terrorists, hackers and gang members.

In terms of the types of information involved in the leak, SANS reported:

A file titled “officers” in the leak contains 6,896 entries for people who work in the criminal-justice system and who currently or have previously used RemoteCOM’s services. Each entry shows the person’s name, phone number, work address, email addresses, unique ID and job title.

Another file titled “clients” contains identifying information on nearly 14,000 individuals who have been monitored by SCOUT. The offenders’ names, email addresses, IP addresses, home addresses and phone numbers are listed next to the names and email addresses of their probation officers.

Read more at SAN.

RemoteCom told SAN that they were investigating.

Attempts to contact them today, however, revealed that connections to their site were timing out, so they may have taken it offline while they investigate. DataBreaches chatted with Thalen yesterday afternoon and asked whether he had attempted to verify the data in the leak. Thalen informed DataBreaches that he had called the phone number of a person charged with terrorism. “His sister picked up, confirmed her brother had previously had remotecom on his phone etc.,” Thalen told DataBreaches.

This post was corrected post-publication due to an error in the name of the source site.

Update: DataBreaches was subsequently able to reach RemoteCom via email. They provided the following statement:

We recently identified unauthorized access to one of our servers, affecting contact information only. No financial data or government IDs were involved. The issue has been secured, and we will be working with law enforcement and the FBI. Protecting client information is our top priority.

But when DataBreaches followed up by asking them if they will be notifying the individuals who were being monitored and/or their relatives whose personal information was leaked, they did not reply.

In response to this site’s post, someone who was being monitored by RemoteCom sent this site a copy of an email he had sent to RemoteCom Support in February of this year:

I am reaching out to formally request clarification regarding the usage requirements and data security policies associated with Remote-Com.net, which has been installed on my devices as part of my probation monitoring.

Specifically, I seek written confirmation on the following:

  1. Device Usage Duration – There is no clear policy stating how many days I am required to actively use a monitored device. Please provide explicit guidelines or contractual terms outlining any mandatory usage periods.
  2. Data Security and Privacy – I require assurances that my personal data is securely stored, transmitted, and protected in compliance with applicable data protection laws. Please provide details on:
    • Encryption standards and security protocols in place to safeguard my data.
    • Retention policies specifying how long my data is stored before being deleted.
    • Third-party access policies, including whether my data is shared with or accessible by any external entities.
  3. Compliance with Legal and Regulatory Standards – Please confirm whether Remote-Com.net adheres to relevant privacy laws, such as [applicable data protection regulations in your jurisdiction, e.g., GDPR, CCPA, etc.], and what recourse is available in the event of a data breach or misuse of my personal information.

I would appreciate a prompt response clarifying these matters, along with any supporting documentation outlining the legal framework governing Remote-Com.net usage. If any agreements or policies explicitly define these terms, please provide copies for my reference.

Thank you for your time and assistance. I look forward to your response.

He informs DataBreaches that they never replied.

Category: Business SectorHack

Post navigation

← London nurseries hit by hackers, data on 8,000 children stolen
Georgia Tech Research Corporation Agrees to Pay $875,000 to Resolve Civil Cyber-Fraud Litigation →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says
  • The Case for Making EdTech Companies Liable Under FERPA
  • NHS providers reviewing stolen Synnovis data published by cyber criminals

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.