Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
DAEMON Tools Hacked: Supply Chain Attack Software Deliver
May 5, 2026
AiTM Attack: Code of Conduct Phishing Emails Target
May 5, 2026
Attackers Abuse Amazon SES for Authenticated Ph Send Phishing
May 5, 2026
Home/CyberSecurity News/CISA Chief Uploaded Sensitive Docs to Public ChatGPT
CyberSecurity News

CISA Chief Uploaded Sensitive Docs to Public ChatGPT

The acting director of the Cybersecurity and Infrastructure Security Agency (CISA) uploaded sensitive contracting documents, marked “for official use only,” to the public version of ChatGPT last...

Sarah simpson
Sarah simpson
January 29, 2026 2 Min Read
0 0

The acting director of the Cybersecurity and Infrastructure Security Agency (CISA) uploaded sensitive contracting documents, marked “for official use only,” to the public version of ChatGPT last summer. This action triggered multiple automated security alerts designed to prevent data exfiltration from federal networks, according to four Department of Homeland Security (DHS) officials who spoke with Politico.

Madhu Gottumukkala, CISA’s interim head since May 2025, had secured special permission from the agency’s Chief Information Officer to use the AI tool shortly after joining.

At the time, ChatGPT remained blocked for other DHS staff. The uploads occurred in early August 2025, with cybersecurity sensors repeatedly flagging them with multiple warnings in the first week alone. None of the files were classified, but they contained sensitive contracting information not meant for public release.

CISA’s defenses detected the activity, prompting senior DHS officials to launch an internal review to evaluate potential harm to national security.

Gottumukkala discussed the uploads with DHS leaders, including then-acting general counsel Joseph Mazzara and Chief Information Officer Antoine McCord. He also met with CISA’s CIO Robert Costello and chief counsel Spencer Fisher in August to address the handling of “for official use only” (FOUO) material.

DHS policy mandates investigating such exposures, assessing causes, and considering actions from retraining to security clearance revocation. One anonymous official criticized Gottumukkala harshly: “He forced CISA’s hand into making them give him ChatGPT, and then he abused it.” The review’s outcome remains undisclosed.

Public ChatGPT shares user inputs with OpenAI, which boasts over 700 million active users. This risks sensitive data training models accessible to adversaries, including state-backed hackers from Russia and China, precisely the threats CISA counters.

CISA spokesperson Marci McCarthy stated Gottumukkala used ChatGPT “with DHS controls in place” under a “short-term and limited” exception, last accessing it in mid-July 2025. She emphasized the agency’s AI commitment per President Trump’s executive order.

In contrast, approved DHS tools, such as the internal DHSChat, store data on federal networks. All federal employees receive training on handling sensitive documents.

Gottumukkala’s tenure has drawn scrutiny. Six career staff members were placed on leave after his unsanctioned counterintelligence polygraph failure.

In testimony, he denied the “failed test” premise. Last week, he attempted to oust Costello, but was blocked by appointees, as reported by Politico.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

CybersecurityHackerSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Critical Gemini MCP Tool 0-Day Allows Remote Vulnerability Attackers

Next Post

Swarmer Tool Evades EDR via Stealthy Windows Evading With

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Instagram Ending Encrypted Direct Messages Encryption
May 5, 2026
Beware Fake Notepad++ for Mac Site Can Harm Your Machine
May 5, 2026
Critical Android Zero-Click Flaw Grants Remote Shell Access
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us