Ransomware victim disclosure
← All victimsKäner Personal
listed as Kaener Personal · Claimed by brotherhood · listed 6 months ago
Status timeline
- Listed
Nov 15, 2025
- Data leaked
At a glance
- Group
- brotherhood
- Status
- Data leaked
- Country
- Switzerland
- Sector
- Not Found
- Listed on leak site
- Nov 15, 2025
- Data size
- 139 GB
About the victim
AI dossier — public-source company profileKäner Personal is a Swiss staffing and personnel services company operating since 1967, specialising in temporary staffing, permanent placement, payrolling, and Try & Hire arrangements. The company operates multiple branches across German-speaking Switzerland and other regions including Basel, Bern, Zentralschweiz, and Westschweiz. It serves both job seekers and corporate clients across a wide range of sectors.
- Industry
- Staffing & Recruitment / Personnel Services
- Address
- Offices in Baar, Baden, Basel, Uster, Winterthur and Zürich, Switzerland
- Founded
- 1967
Attack summary
Severity: critical — Käner Personal handles large volumes of sensitive personal data for job candidates and placed workers (PII, employment contracts, payroll records, identification documents) across Switzerland. The confirmed publication of 139 GB of data from a staffing/HR firm constitutes a large-scale regulated PII and financial data breach, meeting the critical threshold.The Brotherhood ransomware group claims to have exfiltrated 139 GB of compressed data from Käner Personal and has published the data, describing the contents as 'Paid Files'. No encryption claim is explicitly stated; the disclosure status indicates data has been published.
Data the group says was taken
AI dossier — extracted from the leak post- Paid files (139 GB compressed)
- Likely employee personal records (PII)
- Likely client/placement records
- Payroll-related documents
What the group claims
Contains: 139 Gb compressed Paid Files
Sources
- Victim sitewww.kaenerpersonal.ch
Source
Indexed 6 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
