They also revealed top-secret data on the smuggling of workers into the United States.
The ALPHV/BlackCat ransomware gang said the Casepoint hack proved Google and Meta* to be collaborating with intelligence agencies and revealed top-secret information about workers being smuggled into the US.
On their leak site, the cybercriminals claim to have stolen 2TB of Casepoint's sensitive data, including company data, attorney documents, and other sensitive information.
The attackers also mentioned that they have access to the inner workings of products from Cellebrite, an Israeli digital forensics company. Law enforcement uses the Cellebrite Universal Forensics Extraction Device (UFED) tools to extract data from mobile devices.
The message on the hacker site was first noticed by the threat intelligence platform FalconFeedsio, as it reported on its Twitter.
Cybercriminals claim to have gained access to data on Operation Blooming Onion, a human trafficking investigation conducted by a number of US law enforcement agencies that revealed how agricultural organizations smuggled foreign workers into the US.
ALPHV/BlackCat claims that analysis of the stolen data also revealed encrypted hard drives used by employees. According to the attackers, the secure device was used insecurely, and Casepoint employees could leave the decrypted disk on the computer for several days or even weeks. Allegedly, the group received extremely sensitive data, such as the names of special agents and supervisors, as well as photographs of transactions related to Operation Blossoming onion".
Casepoint did not respond to requests for comment on whether Casepoint employees ever used encrypted hard drives to transfer data.