Ransomware victim disclosure
← All victimsCannonDesign
Claimed by Avoslocker · listed 3 years ago
Status timeline
- Listed
Feb 11, 2023
- Data leaked
At a glance
- Group
- Avoslocker
- Status
- Data leaked
- Country
- United States
- Sector
- Construction
- Listed on leak site
- Feb 11, 2023
- Data size
- 5.7 TB
- Ransom demanded
- $279.8M
- Estimated revenue
- $279.8M
About the victim
AI dossier — public-source company profileCannonDesign is a US-based integrated architecture, engineering, and design firm operating across multiple offices nationwide. The firm provides services spanning building design, culture and change strategies, immersive experiences, and sustainable futures planning. With approximately 1,100 employees and reported revenue of $279.8M, it serves clients in sectors including healthcare, education, and commercial real estate.
- Industry
- Architecture & Design Consulting
- Employees
- 1100
Attack summary
Severity: critical — Confirmed exfiltration of 5.7 TB of data with data already published; post includes actual Social Security Numbers, home addresses, and dates of birth of identified C-suite executives, constituting regulated PII at high sensitivity; scale of corporate and client data exposure is significant.AvosLocker claims to have exfiltrated 5.7 TB of corporate and client files from CannonDesign, with data already published following non-payment. The post includes personally identifiable information — including full SSNs, home addresses, and dates of birth — for named C-suite and VP-level executives as proof of access.
Data the group says was taken
AI dossier — extracted from the leak post- Corporate files
- Client files
- Executive SSNs
- Executive home addresses
- Executive dates of birth
- Executive full names and personal details
What the group claims
Employees: 1,100 - Revenue: $279.8M - Site: www.cannondesign.com Exfiltrated: 5.7 TB Wasting our time will result in your data being leaked. Over 5 TB corporate and client files will be released CEO: "Entity": "US", "SSN - US": "367725265", "Last Name": "Lukanic", "First Name": "Bradley", "Nickname": "Brad", "Street Address": "6619 Braeburn Pkwy", "City": "Bethesda", "State/Prov": "MD", "Zip Code": "20817", "Birth Date": "02/15/1971", CFO: "Entity": "US", "SSN - US": "078564382", "Last Name": "Carlino", "First Name": "David", "Nickname": "Dave", "Street Address": "5411 Via Del Sole", "City": "Williamsville", "State/Prov": "NY", "Zip Code": "14221", "Birth Date": "07/29/1961", VP: "Entity": "US", "SSN - US": "121683252", "Last Name": "Schopp", "First Name": "Carolyn", "Nickname": "Carolyn", "Street Address": "3621 W River Road", "City": "Grand Island", "State/Prov": "NY", "Zip Code": "14072", "Birth Date": "10/09/1975",
Sources
- Victim sitecannondesign.com
Source
Indexed 3 years agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
