"Casepoint Attackers: We Have Meta and Google Comms With Special Services"

The ALPHV/BlackCat ransomware gang claims to have accessed a trove of sensitive data, including the credentials of special agents and how tech giants respond to requests for information from special services. The attackers claim that a recent breach of the legal technology platform Casepoint allowed them access to 2TB of sensitive data, including law enforcement's interactions with tech companies such as Google and Facebook's parent company, Meta. In May, the Russia-linked ALPHV/BlackCat ransomware group allegedly breached Casepoint, which the US Courts, the Security Exchanges Commission (SEC), and the Department of Defense (DOD) use. The ALPHV/BlackCat ransomware gang was first observed in 2021. The group, like many others in the criminal underworld, maintains a Ransomware-as-a-Service (RaaS) business, selling criminals malware subscriptions. The gang's use of the programming language Rust was notable. According to a Microsoft analysis, the threat actors who began deploying it were also associated with other prominent ransomware families, including Conti, LockBit, and REvil. This article continues to discuss the ALPHV/BlackCat ransomware gang claiming to have accessed 2TB of sensitive information through the Casepoint breach as well as the history of this group. 

Cybernews reports "Casepoint Attackers: We Have Meta and Google Comms With Special Services"

Submitted by Anonymous on