DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

UnitedLex hit by d0nut ransomware team, 200 GB of corporate files leaked (update4)

Posted on April 4, 2023September 17, 2024 by Dissent

The d0nut ransomware team seems to be ramping up their activity and leaks. Last week, they contacted DataBreaches about Montgomery General Hospital in West Virginia. Today, they reached out to this site about UnitedLex, a firm that describes itself as helping legal teams modernize “with a consultative framework that brings together legal subject matter expertise, data science, and technology to solve operational challenges across multiple legal disciplines.”

According to a statement sent to DataBreaches by the d0nut team, they downloaded over 200GB of data from UnitedLex’s network, including confidential files involving payments, contracts, and other details related to numerous organizations and individuals.

Directories in the data leak from UnitedLex: clients_files/ contracts/, fin/, finance/, hr/, shr/, soft_dev/, lextree1.txt
Directory of folders in the UnitedLex data leak. Image: DataBreaches.net

From their statement to DataBreaches, the threat actors had clearly done some poring through the files to see what was in them so they write something likely to generate interest in the data leak. As one example, they pointed out that they had seen continuing agreement contracts between Computer Science Corporation and AMEX from 1992 until January 2027 with service fees information. They also mentioned merger documents between Hewlett Packard and DXC Technology (formerly known as Computer Science Corporation).

That they found a lot of confidential and proprietary information in files is not surprising, given the nature of UnitedLex’s business. But while the corporate aspects may be of interest to many people, DataBreaches is always more concerned about the human impact and disclosure of personal information. From DataBreaches’ own skimming of the files, there were personnel-related files that would likely require notification under U.S. state laws and EU data protection laws. d0nut also noted that they found files from Australia, Brazil, China, India, Indonesia, Israel, and Korea.

Many of the files DataBreaches skimmed were from 2017, but other files were more recent (2021). How many clients or former clients may need to be notified of this breach is something that may take UnitedLex time to figure out.

DataBreaches asked d0nut for clarification or additional details on a number of points about the incident, but has not received answers as yet. One point that they proactively disclosed to DataBreaches was that UnitedLex had engaged in some negotiations with them. According to d0nut’s spokesperson:

Through negotiation process with United Lex’s top management, we found out that most of their money were stored in Silicon Valley Bank. We also found an insurance with cyber crime coverage, but they refused to use this option. The sum we offered them to pay was 600,000, which is significantly lower than their insurance limit.

So why did negotiations fall apart? Or didn’t UnitedLex ever intend to pay?

DataBreaches also sent some inquiries to UnitedLex, but no reply was immediately received.

This post will be updated when more information becomes available.

Update1: UnitedLex provided DataBreaches with the following statement:

The security and integrity of our systems are of the utmost importance to us. We recently discovered suspicious activity on our network, immediately initiated our incident response protocols, engaged third-party forensic experts to determine the nature and scope of the activity, and notified the FBI.

Our systems are fully operational, and we have been in constant contact with our customers and employees about this incident and our investigation.

Update2:  According to d0nut leaks’ spokesperson, UnitedLex did detect the intrusion on the third day, and the threat actors were able to lock some servers, although they were not specific as to how many. When contacted by the threat actors, UnitedLex reportedly responded immediately by email.

d0nut had demanded a $5 million ransom, a significantly different demand than the $600,000 mentioned in negotiations.

Update3: In an escalation today, d0nut has started UnitedLex’s clients, beginning with DXC.com.  A copy of their email was provided to DataBreaches.  It states, in part:

According to the following statement of data protection from https://dxc.com/
website: “DXC as a “Service Provider” (as defined in the CCPA) confirms that it will process personal information which it retains, uses, or discloses in connection with its performance under any contract: (1) only on behalf of and for the benefit of the “Business” (as defined in the CCPA) from which it has received or on whose behalf it gathered the personal information; (2) only in accordance with the contract and Business’s prior written instructions, if any; unless (3) as otherwise required by the CCPA. DXC confirms that it will not process personal information for any purpose other than for the specific purpose of performing the services specified in the contract.”

So we decided to offer your management to protect your data for a fee. Please, contact us as soon as possible through following email [redacted by DataBreaches]. We will provide samples of documents related to DXC Technology which had been downloaded from United Lex’s network.

In case if you will completely ignore this message and we won’t see any emails from you – such actions will be regarded as an Agreement to further processing
of your data freely. have a good day!

The sample file, uploaded to a file-sharing site, contained 35 files that were mainly .pdf files and a few Excel files.

Update4: UnitedLex has been added to BlackCat’s leak site. DataBreaches is trying to determine if these are the same data D0nut Leaks have been leaking.

Category: Breach IncidentsCommentaries and AnalysesMalware

Post navigation

← “Operation Cookie Monster” takes down Genesis Market
TAFE data breach uncovered by SA Police →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.