Casepoint, a U.S.-based legal technology platform catering to government agencies, corporations, and law firms, is currently investigating a potential cybersecurity incident after hackers claimed to have compromised their system and stolen terabytes of sensitive data.
The ALPHV ransomware gang, also known as BlackCat, is believed to be responsible for the attack, which targeted Casepoint and exposed data from high-profile clients such as the U.S. Courts, SEC, DoD, Marriott, and Mayo Clinic.
Casepoint’s co-founder and CTO, Vishal Rajpara, confirmed the activation of their incident response protocols and the engagement of an external forensic firm to aid in the investigation.
Although Rajpara did not disclose the exact nature of the incident, the ALPHV gang has listed the stolen data on their dark web leak site, claiming to have acquired two terabytes of sensitive information, including data from the U.S. government.
TechCrunch obtained samples of the exfiltrated data, which include sensitive health information, legal documents, government-issued IDs, and an internal document allegedly from the FBI.
While Casepoint remains fully operational and unaffected, the company is closely working with the forensic firm to detect any signs of suspicious activity and ensure the security of their systems.
The ALPHV gang has previously targeted notable organizations like Ring and NextGen Healthcare. Their leak site has also been used to host data stolen from Western Digital.
As Casepoint continues its investigation, clients and industry observers are eager to learn more about the extent of the breach and the potential implications for the security of sensitive legal information entrusted to the platform.