- “Ducktail” Hackers Target Facebook - September 28, 2023
- Okta Breach: Super Admin Hack - September 24, 2023
- Rackspace: $10.8M Cloud Shift - September 23, 2023
The ALPHV/BlackCat ransomware group said that breaking into the Casepoint legal platform confirmed Google and Meta’s involvement with government agencies and exposed top-secret information concerning the unauthorized importation of employees into the United States.
Cybercriminals claim to have stolen 2 TB of private Casepoint data, including business data, legal documents, and other sensitive information, on their leak site.
The attackers also claimed to have knowledge of how the digital forensics software produced by the Israeli company Cellebrite worked. UFED (Universal Forensics Extraction Device) tools from Cellebrite are used by law enforcement to recover data from mobile devices.
BlackCat Hackers Expose Operation Blooming Onion and Insecure Data Practices
Threat intelligence platform FalconFeedsio was the first to discover the message on the hackers’ website, and it posted about it on Twitter.
The hackers assert that they had access to information from Operation Blooming Onion, a human trafficking investigation carried out by numerous U.S. law enforcement agencies that revealed how agricultural firms are bringing in foreign labor illegally.
Analysis of the stolen material, according to ALPHV/BlackCat, also uncovered staff encrypted hard drives. The attackers claimed that Casepoint staff might keep the encrypted disk on a computer for days or even weeks and that the secure device was used insecurely.The organization reportedly received images of transactions connected to Operation Blooming Onion, as well as very sensitive information, including identities of special agents and supervisors.
Concerning whether its workers have ever transferred data using encrypted hard drives, Casepoint did not provide any comments.