DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Another small firm suffers a serious ransomware attack: Cadre Services gets mauled by AlphV

Posted on October 19, 2023 by Dissent

There are some data leaks that make you shake your head and wonder about how a firm responded to a ransomware attack. This is one of them. 

Cadre Services (previously known as Premier Staffing) is a Wisconsin-based company providing employment and staffing services for office professionals.  They have been in business since 1994.

In a listing on AlphV’s site, the threat actors claim that they acquired 100 GB of files including:

– job seekers data (contacts, cv’s, id’s, drug screens, etc)
– employees data (contracts, ssn, id’s, drug screens, contacts, payments, etc)
– top management data (contracts, ssn, id’s, drug screens, contacts, payments, etc)
– financial data (payments, transfers, etc)
– ADB Ultrastaff data (all personal files used within this soft)
– Smartsearch data (all I-9 records which could be find within this software files)
– collection of pornography we have found at CFO Vincent Salvia PC which were hidden within HR files

AlphV then leaked what they describe as the first part of the data dump because:

Unfortunately for ordinary people the top management of Cadre Services offered only $35,000 to protect their data. This sum is unacceptable. Since all the time needed for their bosses to make a decision were given and all the evidences were provided, Cadre Services decided to stop at price they have already offered, you can find all the data stolen from Cadre Services for free download now.

In support of that claim, DataBreaches was provided with screenshots of the negotiations between Cadre and the AlphV affiliate.  From the screenshots, it appears they first contacted Cadre on or about September 19 and someone from the firm first responded on September 22.

Early interactions did not go well as the firm’s negotiator did not seem to really grasp that the affiliate had done their homework researching the firm and could see what the employees were doing — including emails to each other about how to communicate to clients about the breach.  The following is a snippet from an early interaction after the negotiator insisted the firm could not afford to pay $300,000. [Note: DataBreaches has no idea if there really was pornography in the files of the CFO and some of the CFO’s files have been locked in the data leak.]

The affiliate responded sharply to the negotiator’s response:

“You dont have to play this games with us. We know your network – VINCE21-HP is the name for the Vincent Salvia’s PC and 10.0.0.41 is an internal IP of his PC. The profile of Mr.Salvia titled with CFO of Cadre Services status at Linkedin, Zoominfo, Crunchbase, and even your own Organisational Chart. So once again, if you will continue to play your games with us will will rise our demands.”

The firm’s negotiator, who would later identify himself as the IT manager, “Jason,” continued to insist that the company could not afford $300,000 and said the bosses were offering $25,000.00.  The affiliate responded by pointing out that they could access the bank account and see that there was $190,000.00 in it.

Cadre’s subsequent attempts to negotiate fared no better, and their highest offer was $35,000.  And that’s where things have remained since October 4.

That is, until yesterday when AlphV emailed the firm again and this time included clients and DataBreaches in the distribution list. To show Cadre’s clients how serious it was, they included sample files from the data leak that would be made today. One file included a screencap of a .csv file with employees’ 401k data with date of birth, date of hire, SSN, name, address, wage information, etc. Another file included an applicant’s data in the form of I-9 records. And to make life even more difficult for Cadre, they showed the clients how Cadre attempted to minimize the severity of the situation by saying that their logs did not indicate any SSN were likely to have been accessed:

“Our firewall logs show that there was normal internet traffic between the time of attack and when we unplugged the system. This suggests that personal information, including demographic data, social security numbers, and other information was likely not compromised,” they would tell a client.

“Likely not compromised? By September 29, when that email exchange took place, Cadre had already had one week to figure out that AlphV had acquired a lot of files with personal information.

Yesterday, DataBreaches emailed Cadre some questions after looking at a preview of the upcoming data leak and noting a lot of concerning files. The questions asked whether the firm had any cyberinsurance or insurance to help them recover from this attack. The second question was whether Cadre had any usable backups for the data AlphV had locked.  The third question asked how many employees and applicants had their personal information accessed or acquired. The fourth question asked whether they had contacted law enforcement and whether they had notified anyone whose personal information was stolen.

No response was received, even though DataBreaches noted that if they were concerned that AlphV was still in their system, they could call this site from a personal mobile number.

So today AlphV uploaded what they say is the first part of the data leak. In one folder alone, there were almost 4,400 files with detailed personal and identity information on people seeking work. Most of these records used the Department of Homeland Security e-verify system. The forms included name, address, date of birth, Social Security number, and other identity information such as driver’s license or passport, etc.  Some of the information may now be inaccurate because many of these 4,400 files are more than a decade old.  Why these files were not encrypted or stored offline is unknown to DataBreaches, but that was just one folder. Many other folders and files also appear to contain varying amounts of personal information.

Cadre appears to have somewhat of an incident response nightmare on their hands. Hopefully, they have usable backups, but they will still have a slew of individual notifications to make to people whose durable personal identity information has not only been compromised but has now been made freely available. And hopefully, they also have cyberinsurance or some policy that may help pay the recovery and incident response costs that will mount up.


Note: DataBreaches notes that it’s always possible that Cadre never intended to pay at all and was just stalling for time by appearing to negotiate.  


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Authorities released free decryptor for Phobos and 8base ransomware
Category: Breach IncidentsBusiness SectorCommentaries and AnalysesMalwareU.S.

Post navigation

← BlackCat threatens to leak data from Morrison Community Hospital (1)
Police employee arrested for computer trespassing and violation of official secrecy →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hackers post stolen St. Paul data online as efforts to reset city employee passwords surge forward
  • Justice Department Announces Coordinated Disruption Actions Against BlackSuit (Royal) Ransomware Operations
  • NL: Hackers breach cancer screening data of almost 500,000 women
  • Violent Crypto Crimes Surge in 2025 Amid Massive Data Leaks
  • Why Ransomware Attacks Are Decreasing in 2025
  • KR: Yes24, the largest Internet bookstore in Korea, suffered its second ransomware attack in two months
  • Korea wins world’s top hacking contest for 4th consecutive year
  • 7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
  • Connex Credit Union notifies 172,000 members of hacking incident
  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks (CORRECTED)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Navigating Privacy Gaps and New Legal Requirements for Companies Processing Genetic Data
  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.