Ransomware victim disclosure
← All victimsLangenberg, Strubberg, Arand & King, LLC
Claimed by pear · listed 11 days ago
Status timeline
- Listed
May 10, 2026
- Data leaked
At a glance
- Group
- pear
- Status
- Data leaked
- Country
- US
- Sector
- Business Services
- Listed on leak site
- May 10, 2026
About the victim
AI dossier — public-source company profileLangenberg, Strubberg, Arand & King, LLC is a CPA firm based in Union, Missouri, offering accounting, tax preparation, tax planning, payroll, bookkeeping, and QuickBooks services to business owners, executives, and independent professionals. The firm serves both individual and business clients with a broad range of financial and advisory services. It operates from a single office location in Union, MO.
- Industry
- Accounting & Tax Services
- Address
- 1345 Union Avenue, Suite 1, Union, MO 63084
Attack summary
Severity: critical — The attacker claims exfiltration of regulated sensitive data at scale, including PHI and PII belonging to the firm's clients, as well as financial and HR records. As an accounting firm, client data likely includes highly sensitive tax and financial records for numerous individuals and businesses, meeting the threshold for critical severity.The group 'pear' claims to have exfiltrated data from the firm including clients' and firm financials, HR records, PII, PHI, partners' and vendors' data, and the QuickBooks database, with the disclosure status marked as data_published.
Data the group says was taken
AI dossier — extracted from the leak post- Firm financial records
- Client financial records
- HR records
- Personally Identifiable Information (PII)
- Protected Health Information (PHI)
- Partners' data
- Vendors' data
- QuickBooks database
What the group claims
Firm that specializes in providing accounting, tax, and advisory services
The leak post
captured from the group's site| | | | | | **Langenberg, Strubberg, Arand & King, LLC ** Firm's and Clients’ Financials, HR, PII & PHI Records, Partners’ and Vendors’ Data, QuickBooks Database, etc. | | --- | | | | | |
Screenshot of the leak post

Sources
Source
Indexed 11 days agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
