DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Law firm discloses ransomware attack

Posted on October 12, 2020 by Dissent

There have been numerous law firms that have been hacked in the past few years, or worse, attacked with the double whammy of having copies of their files exfiltrated before their systems were encrypted. What may surprise the public is how some of the bigger law firms refuse to pay ransom — either for a decryptor key or to get the threat actors to agree to destroy copies of any files they had acquired. As but one example, when Sodinokibi (REvil) threat actors attacked the entertainment and media law firm Grubman Shire Meiselas & Sacks, they demanded $21 million. The law firm’s negotiators made a much lower offer, and the threat actors then doubled the demand to $42 million.  When the law firm still didn’t pay, the threat actors tried auctioning off different celebrities’ files in bundles.  No one seemed to bid on any of them.

Similarly, you can find other law firms listed on dedicated leak sites (DLS) created by different ransomware groups. The fact that they are publicly listed means that they didn’t pay the demanded ransom.

Today, another law firm, Seyfarth Shaw LLP,  disclosed a ransomware attack.  The fact that they disclosed it themselves immediately removed one of the threats these groups make — to make the attack public and harm the entity’s reputation by showing that they failed to secure sensitive information.

Does that mean that the victim will not pay any ransom? That decision, if it has not been made already (and DataBreaches.net does not know if any decision has been made) may depend on a number of factors, including, but not limited to, their view on paying ransom, whether they have cyberinsurance that would cover it, whether they can recover or restore files without a decryption key, whether they can function for any length of time without their email system or other affected systems, and whether the publication of any files that may have been exfiltrated would be so damaging or harmful that they decide to pay ransom in the hopes of the files not being made public.  Here is their notification to date:

On October 10, 2020, Seyfarth was the victim of a sophisticated and aggressive malware attack. At this time, our email system remains down. Our phone system is still functioning but if you are unable to reach your contact at the firm, please fill out this Contact Form.

We will continue to update this page with information as it becomes available. Click below for more information.

On Saturday, October 10, 2020, Seyfarth was the victim of a sophisticated and aggressive malware attack that appears to be ransomware. We understand that a number of other entities were simultaneously hit with this same attack. Our monitoring systems detected the unauthorized activity, and our IT team acted quickly to prevent its spread and protect our systems. We have found no evidence that any of our client or firm data were accessed or removed. However, many of our systems were encrypted, and we have shut them down as a precautionary measure.

Our clients remain our top priority, and we will continue to do everything necessary to protect their confidential information and continue to serve them. We are coordinating with the FBI and are working around the clock to bring our systems back online as quickly and safely as possible.

While our phone system has not been affected, you can get a message to us via this Contact Form  if you are having difficulty reaching us. We will also provide updates on our website and share information as it becomes available.

Category: Business SectorMalware

Post navigation

← 620 applicants file joint case against IT firm which exposed voter data
MI: City of Mt. Pleasant falls victim to remote ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.