Register today for Zero Trust World 2026!
BACK TO BLOGS Back to Press Releases
Employee data security lawsuit case hits major U.S. mushroom producer

Employee data security lawsuit case hits major U.S. mushroom producer

Written by:

Sarah Kinbar, Strategic Content Writer

Table of contents

Overview of the Monterey Mushrooms breach

When attackers breached systems at Monterey Mushrooms in August 2025, they went after the people who work there. The ransomware incident exposed personal data that employees had trusted their employer to protect. By early fall, workers had filed three separate class actions, each arguing that Monterey Mushrooms failed to keep their information safe. Those suits have now been combined into a single case in federal court, setting up a new test of how far employer responsibility for data security extends.

The Monterey Mushrooms employee data breach lawsuit centers on claims that the company failed to secure workers’ personal information exposed during an August 2025 ransomware attack. Plaintiffs argue that delayed notifications and weak safeguards violated reasonable security standards defined by the FTC and NIST Cybersecurity Framework.

Allegations presented across the complaints

Court filings in Smith, Hanley, and Sherman describe a ransomware incident that ran from August 2 to August 7, 2025. Plaintiffs claim Monterey Mushrooms waited until September 18 to send notification letters, almost six weeks after discovering the attack. In the Hanley complaint, attorneys argue that this delay prevented workers from acting quickly to secure their data and call the notice’s delay “excessive” for the nature of the breach.

The consolidated case now brings together several causes of action, including negligence, breach of implied contract, and unjust enrichment. All three complaints raise similar claims, alleging that the company had access to reasonable safeguards but did not implement them.  

The filings describe a breakdown in internal data governance, alleging that the company failed to meet the most basic standard of care expected from any employer handling employee Social Security numbers, driver’s license numbers, and passports.

Threat actors identified as INC RANSOM  

The Smith complaint attributes the attack to INC RANSOM, a ransomware group that announced the breach on its dark web leak site on September 5, 2025. The filing claims the group obtained unencrypted employee information stored in an internet-accessible environment. Plaintiffs cite this as evidence of a lack of encryption and network segmentation, arguing that the company made it too easy for attackers to move laterally through its systems.

“These targets often store sensitive data in network-accessible locations without layered defenses. When that happens, attackers don’t need to break- in,; they’re leveraging purchased or reused credentials, your administrative tools, and walking through the front door.” said John Moutos, ThreatLocker Threat Intelligence Team Lead. “If unencrypted files sit on shared systems, it’s an invitation. Once the ransomware operators get remote access, pulling down that information is trivial.”

“The golden ticket into most environments is remote access. These guys don’t rely on custom tooling. They use whatever infrastructure is already there: Remote desktop, VPN, reused admin credentials due to poor password hygiene. Once they’re in, they pivot through the same tools legitimate users depend on,” he said. “Given how basic their encryptor is, lateral movement is probably done with built-in or legitimate Windows tools.” They move through the network quietly until they find the data they want.

According to Moutos, the INC RANSOM group shows little sophistication in its tooling. Its encryptor appears to be borrowed from another ransomware family and even leaves the attached console window open during execution, a basic mistake that points to a reckless rather than refined operation.

He explains that the group leaves debug symbols in its encryptors, literally labeling files “INC encryptor release.” In more sophisticated malware, those identifiers are stripped before deployment, but INC RANSOM’s developers either don’t know how or don’t care enough to hide them.

Legal teams and case strategy in Monterey Mushrooms litigation

Defense counsel: Baker and Hostetler LLP

The attorneys involved in this case represent familiar names in data breach and privacy law.

Monterey Mushrooms is represented by Baker and Hostetler LLP, where Sean P. Killeen appears on the docket as counsel of record. The firm’s privacy and data protection group has defended several large-scale breach cases for clients in manufacturing and healthcare. Public records show that in comparable litigation, Baker and Hostetler lawyers have focused on standing, causation, and discovery scope—issues that often define whether a class action reaches trial. The firm’s experience aligns with the company’s likely defense strategy, which will center on showing compliance with industry norms rather than regulatory guidance from agencies like the FTC or NIST.

Plaintiffs’ counsel: Edelsberg Law and Cole & Van Note

On the plaintiffs’ side, the team combines class action experience and privacy expertise. Scott Edelsberg of Edelsberg Law led the consolidation effort. His firm’s prior cases in federal court include consumer and privacy class actions where he focused on defining “reasonable security” through agency standards. The Monterey pleadings echo that same approach, pointing to FTC and NIST publications as evidence of what any modern organization should have in place.

Scott Cole of Cole and Van Note, joined by Laura Van Note and Mark Freeman, brings decades of class action experience across employment and privacy law. Cole’s firm has recently filed breach cases against health systems and local governments in California, demonstrating its familiarity with both state privacy statutes and employee-related data exposure claims. Their participation strengthens the plaintiffs’ argument that data incidents affecting workers should be judged through the same lens as consumer breaches.

These legal teams bring deep experience in data breach litigation. Their arguments will likely shape how courts interpret employer data responsibilities and how companies demonstrate compliance in the aftermath of an attack.

Judicial and regulatory precedents relevant to employee data breach claims

Dittman v. UPMC and H3: Sackin v. TransPerfect

Several prior rulings give context for the Monterey case. In Dittman v. UPMC (2018), the Pennsylvania Supreme Court held that employers have a duty to exercise reasonable care in protecting employee information stored on internet-connected systems. The court described the employer–employee relationship itself as the source of that duty. While California courts have not ruled on this specific question, the Dittman decision is likely to be cited as persuasive authority.

A similar analysis appeared in Sackin v. TransPerfect Global, Inc. (2017), when the Southern District of New York allowed negligence and breach-of-contract claims to proceed after a phishing incident exposed employee tax data. The court found that the plaintiffs plausibly alleged the employer failed to use reasonable security measures. That decision remains a key reference for federal courts weighing whether employee data deserves the same protections as consumer data.

Large consumer breach cases have also influenced the legal understanding of reasonable security. In In re Target Corp. Customer Data Security Breach Litigation (2014), the District of Minnesota let negligence claims move forward after plaintiffs alleged Target ignored internal warnings about network intrusions. In In re Equifax, Inc. Customer Data Security Breach Litigation (2019), the Northern District of Georgia recognized both negligence and implied contract theories after a breach that affected 147 million individuals. Both opinions describe reasonableness as a process rather than perfection—an important distinction for organizations defending breach claims.

Federal guidance on reasonable security

FTC Enforcement Lessons and H3: NIST Cybersecurity Framework 2.0.

The Federal Trade Commission continues to define “reasonable security” in its enforcement actions. In FTC v. Drizly, LLC, the agency described failures in encryption, patch management, and access control as unreasonable under Section 5 of the FTC Act. The consent order that followed required the company to implement governance oversight, employee training, and incident documentation.

The FTC’s 2023 publication Protecting Personal Information: A Guide for Business outlines similar expectations, identifying encryption, multi-factor authentication, and vulnerability patching as basic security hygiene. The document, while not a regulation, is a frequent reference in data breach complaints and settlements.

NIST’s Cybersecurity Framework 2.0, finalized in 2024, provides another common reference point. Its six functions—Govern, Identify, Protect, Detect, Respond, and Recover—offer organizations a structure for risk management. Although voluntary, the framework appears regularly in both agency guidance and private litigation as evidence of generally accepted security practices.

Lessons drawn from public rulings and federal guidance

Judicial opinions and regulatory materials converge on a few themes that matter for corporate security programs.

Duty of Care, documentation, regulatory Benchmarks and threat awareness

1. Employer duty can extend to data protection.

In Dittman, the court held that employers have an affirmative duty to safeguard employee information. The same reasoning appears in recent state filings, suggesting that courts increasingly treat employee data protection as a core business obligation rather than a discretionary practice.

2. Reasonableness depends on documentation.

Target, Equifax, and Sackin show that courts look for consistency between policy and practice. Risk assessments, patching decisions, and budget records become central evidence of whether a company acted reasonably before an incident occurred.

3. Regulators outline practical benchmarks.

FTC consent orders and NIST outcomes frequently align on four controls: encryption, multi-factor authentication, timely patching, and clear access management. Courts often view the absence of these measures as indicators of negligence.

4. Threat awareness matters.

Federal decisions and FTC materials describe ransomware and phishing as foreseeable threats. When an organization acknowledges these risks in its policies but fails to mitigate them, courts may view that as evidence of negligence.

Practical Controls and Checklists for CISOs

The following checklist summarizes recurring controls found in FTC orders and NIST CSF 2.0 materials. It is presented for informational purposes and does not assess any party’s conduct in the Monterey case.

Govern and identify

• Maintain an inventory of systems that store personal data, with clear ownership and accountability.

• Document periodic risk assessments, review decisions, and acceptance justifications.

• Establish executive oversight for the information security program with reporting to senior leadership.

Protect

• Encrypt sensitive data at rest and in transit and secure encryption keys separately.

• Require multi-factor authentication for remote and administrative access.

• Apply patches promptly and maintain configuration management records.

Detect and respond

• Monitor for anomalies across networks and retain event logs.

• Keep incident response plans that define containment, investigation, notification, and recovery steps.

• Conduct post-incident reviews and feed lessons back into the risk management process.

Third-party oversight

• Evaluate vendors with access to personal data and include breach-notification clauses in contracts.

• Keep records of vendor assessments and follow-up remediation.

Training and awareness

• Provide annual training on phishing and data handling.

• Retain attendance records and program content for audit reference.

Retention and disposal

• Limit retention of personal data to legitimate business or legal needs.

• Dispose of unnecessary records securely and verify destruction.

Procedural transparency as a CISO priority

The public record from previous data breach cases shows that when courts and regulators evaluate a company’s security posture, documentation often carries more weight than technology. Risk assessments, vulnerability reports, and internal communications routinely surface in discovery. For that reason, CISOs benefit from keeping a clear paper trail of how decisions are made and why certain risks are accepted.

Four practical objectives stand out:

• Maintain traceable decisions through written assessments and approvals.

• Align internal controls with NIST CSF 2.0 outcomes and keep testing records.

• Hold vendors accountable with signed attestations and contract enforcement.

• Use audits and incident reviews to verify continuous improvement.

All four objectives appear in public NIST and FTC materials. They reflect how “reasonable security” is judged in practice and how organizations can defend their diligence if litigation follows a breach.

The road ahead for Monterey Mushrooms

As of November 2025, no consolidated complaint has been filed, and discovery has not begun. The next case management conference is scheduled for February 19, 2026. When the combined complaint appears, it will likely expand on the plaintiffs’ negligence claims and test how courts interpret employer data obligations under California law.

Whatever the eventual outcome, Monterey Mushrooms will join a growing list of cases defining the cost of breach in terms of duty, delay, and documentation. For security leaders, it serves as another reminder that protecting employee data is not just an HR function—it is an essential measure of enterprise security maturity.

Frequently Asked Questions

Who filed the Monterey Mushrooms employee data breach lawsuit?
Employees represented by multiple law firms, including Edelsberg Law and Cole & Van Note, filed class actions later consolidated in federal court.

What data was exposed in the Monterey Mushrooms ransomware incident?
Court filings say Social Security numbers, driver’s license details, and passport information belonging to employees were accessed by attackers.

What ransomware group was involved in the breach?
The INC RANSOM group claimed responsibility and published employee data on its dark web leak site in September 2025.

What are the plaintiffs alleging?
They allege negligence and breach of implied contract, arguing that Monterey Mushrooms failed to implement reasonable safeguards like encryption and multi-factor authentication.

Why is this case significant for employers?
It could expand how courts define employer duties in protecting employee data, influencing compliance standards under FTC guidance and NIST CSF 2.0.

start Your path to stronger defenses

Get a trial

Try ThreatLocker free for 30 days and experience full Zero Trust protection in your own environment.

Book a demo

Schedule a demo customized to your environment and explore how ThreatLocker aligns with your security goals.

Ask an expert

Just starting to explore our platform? Find out what ThreatLocker is, how it works, and how it’s different.