DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Another small firm suffers a serious ransomware attack: Cadre Services gets mauled by AlphV

Posted on October 19, 2023 by Dissent

There are some data leaks that make you shake your head and wonder about how a firm responded to a ransomware attack. This is one of them. 

Cadre Services (previously known as Premier Staffing) is a Wisconsin-based company providing employment and staffing services for office professionals.  They have been in business since 1994.

In a listing on AlphV’s site, the threat actors claim that they acquired 100 GB of files including:

– job seekers data (contacts, cv’s, id’s, drug screens, etc)
– employees data (contracts, ssn, id’s, drug screens, contacts, payments, etc)
– top management data (contracts, ssn, id’s, drug screens, contacts, payments, etc)
– financial data (payments, transfers, etc)
– ADB Ultrastaff data (all personal files used within this soft)
– Smartsearch data (all I-9 records which could be find within this software files)
– collection of pornography we have found at CFO Vincent Salvia PC which were hidden within HR files

AlphV then leaked what they describe as the first part of the data dump because:

Unfortunately for ordinary people the top management of Cadre Services offered only $35,000 to protect their data. This sum is unacceptable. Since all the time needed for their bosses to make a decision were given and all the evidences were provided, Cadre Services decided to stop at price they have already offered, you can find all the data stolen from Cadre Services for free download now.

In support of that claim, DataBreaches was provided with screenshots of the negotiations between Cadre and the AlphV affiliate.  From the screenshots, it appears they first contacted Cadre on or about September 19 and someone from the firm first responded on September 22.

Early interactions did not go well as the firm’s negotiator did not seem to really grasp that the affiliate had done their homework researching the firm and could see what the employees were doing — including emails to each other about how to communicate to clients about the breach.  The following is a snippet from an early interaction after the negotiator insisted the firm could not afford to pay $300,000. [Note: DataBreaches has no idea if there really was pornography in the files of the CFO and some of the CFO’s files have been locked in the data leak.]

The affiliate responded sharply to the negotiator’s response:

“You dont have to play this games with us. We know your network – VINCE21-HP is the name for the Vincent Salvia’s PC and 10.0.0.41 is an internal IP of his PC. The profile of Mr.Salvia titled with CFO of Cadre Services status at Linkedin, Zoominfo, Crunchbase, and even your own Organisational Chart. So once again, if you will continue to play your games with us will will rise our demands.”

The firm’s negotiator, who would later identify himself as the IT manager, “Jason,” continued to insist that the company could not afford $300,000 and said the bosses were offering $25,000.00.  The affiliate responded by pointing out that they could access the bank account and see that there was $190,000.00 in it.

Cadre’s subsequent attempts to negotiate fared no better, and their highest offer was $35,000.  And that’s where things have remained since October 4.

That is, until yesterday when AlphV emailed the firm again and this time included clients and DataBreaches in the distribution list. To show Cadre’s clients how serious it was, they included sample files from the data leak that would be made today. One file included a screencap of a .csv file with employees’ 401k data with date of birth, date of hire, SSN, name, address, wage information, etc. Another file included an applicant’s data in the form of I-9 records. And to make life even more difficult for Cadre, they showed the clients how Cadre attempted to minimize the severity of the situation by saying that their logs did not indicate any SSN were likely to have been accessed:

“Our firewall logs show that there was normal internet traffic between the time of attack and when we unplugged the system. This suggests that personal information, including demographic data, social security numbers, and other information was likely not compromised,” they would tell a client.

“Likely not compromised? By September 29, when that email exchange took place, Cadre had already had one week to figure out that AlphV had acquired a lot of files with personal information.

Yesterday, DataBreaches emailed Cadre some questions after looking at a preview of the upcoming data leak and noting a lot of concerning files. The questions asked whether the firm had any cyberinsurance or insurance to help them recover from this attack. The second question was whether Cadre had any usable backups for the data AlphV had locked.  The third question asked how many employees and applicants had their personal information accessed or acquired. The fourth question asked whether they had contacted law enforcement and whether they had notified anyone whose personal information was stolen.

No response was received, even though DataBreaches noted that if they were concerned that AlphV was still in their system, they could call this site from a personal mobile number.

So today AlphV uploaded what they say is the first part of the data leak. In one folder alone, there were almost 4,400 files with detailed personal and identity information on people seeking work. Most of these records used the Department of Homeland Security e-verify system. The forms included name, address, date of birth, Social Security number, and other identity information such as driver’s license or passport, etc.  Some of the information may now be inaccurate because many of these 4,400 files are more than a decade old.  Why these files were not encrypted or stored offline is unknown to DataBreaches, but that was just one folder. Many other folders and files also appear to contain varying amounts of personal information.

Cadre appears to have somewhat of an incident response nightmare on their hands. Hopefully, they have usable backups, but they will still have a slew of individual notifications to make to people whose durable personal identity information has not only been compromised but has now been made freely available. And hopefully, they also have cyberinsurance or some policy that may help pay the recovery and incident response costs that will mount up.


Note: DataBreaches notes that it’s always possible that Cadre never intended to pay at all and was just stalling for time by appearing to negotiate.  


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Authorities released free decryptor for Phobos and 8base ransomware
Category: Breach IncidentsBusiness SectorCommentaries and AnalysesMalwareU.S.

Post navigation

← BlackCat threatens to leak data from Morrison Community Hospital (1)
Police employee arrested for computer trespassing and violation of official secrecy →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Hungarian police arrest suspect in cyberattacks on independent media
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • UK sanctions Russian cyber spies accused of facilitating murders
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling
  • Meta investors, Zuckerberg reach settlement to end $8 billion trial over Facebook privacy violations
  • ICE is gaining access to trove of Medicaid records, adding new peril for immigrants
  • Microsoft can’t protect French data from US government access

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.