DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Law firm discloses ransomware attack

Posted on October 12, 2020 by Dissent

There have been numerous law firms that have been hacked in the past few years, or worse, attacked with the double whammy of having copies of their files exfiltrated before their systems were encrypted. What may surprise the public is how some of the bigger law firms refuse to pay ransom — either for a decryptor key or to get the threat actors to agree to destroy copies of any files they had acquired. As but one example, when Sodinokibi (REvil) threat actors attacked the entertainment and media law firm Grubman Shire Meiselas & Sacks, they demanded $21 million. The law firm’s negotiators made a much lower offer, and the threat actors then doubled the demand to $42 million.  When the law firm still didn’t pay, the threat actors tried auctioning off different celebrities’ files in bundles.  No one seemed to bid on any of them.

Similarly, you can find other law firms listed on dedicated leak sites (DLS) created by different ransomware groups. The fact that they are publicly listed means that they didn’t pay the demanded ransom.

Today, another law firm, Seyfarth Shaw LLP,  disclosed a ransomware attack.  The fact that they disclosed it themselves immediately removed one of the threats these groups make — to make the attack public and harm the entity’s reputation by showing that they failed to secure sensitive information.

Does that mean that the victim will not pay any ransom? That decision, if it has not been made already (and DataBreaches.net does not know if any decision has been made) may depend on a number of factors, including, but not limited to, their view on paying ransom, whether they have cyberinsurance that would cover it, whether they can recover or restore files without a decryption key, whether they can function for any length of time without their email system or other affected systems, and whether the publication of any files that may have been exfiltrated would be so damaging or harmful that they decide to pay ransom in the hopes of the files not being made public.  Here is their notification to date:

On October 10, 2020, Seyfarth was the victim of a sophisticated and aggressive malware attack. At this time, our email system remains down. Our phone system is still functioning but if you are unable to reach your contact at the firm, please fill out this Contact Form.

We will continue to update this page with information as it becomes available. Click below for more information.

On Saturday, October 10, 2020, Seyfarth was the victim of a sophisticated and aggressive malware attack that appears to be ransomware. We understand that a number of other entities were simultaneously hit with this same attack. Our monitoring systems detected the unauthorized activity, and our IT team acted quickly to prevent its spread and protect our systems. We have found no evidence that any of our client or firm data were accessed or removed. However, many of our systems were encrypted, and we have shut them down as a precautionary measure.

Our clients remain our top priority, and we will continue to do everything necessary to protect their confidential information and continue to serve them. We are coordinating with the FBI and are working around the clock to bring our systems back online as quickly and safely as possible.

While our phone system has not been affected, you can get a message to us via this Contact Form  if you are having difficulty reaching us. We will also provide updates on our website and share information as it becomes available.

Category: Business SectorMalware

Post navigation

← 620 applicants file joint case against IT firm which exposed voter data
MI: City of Mt. Pleasant falls victim to remote ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.