A wave of data extortion attacks is targeting law firms of all sizes, with attackers stealing privileged client communications, litigation strategy documents, and confidential settlement agreements, then threatening to publish them unless a ransom is paid. Several Texas law firms have been targeted in Q1 2026.
Law firms are uniquely vulnerable to data extortion because the value of their data is not in its operational importance — it is in its confidentiality. Privileged client communications, litigation strategy documents, confidential settlement agreements, and sensitive client financial information are extraordinarily valuable to attackers because the threat of publication is devastating. Publishing privileged communications could expose clients to legal liability, destroy ongoing litigation strategies, violate court orders, and trigger state bar disciplinary proceedings against the attorneys involved. Attackers understand this leverage and are exploiting it.
The most common initial access vectors for law firm attacks are phishing emails targeting attorneys and staff, exploitation of unpatched vulnerabilities in remote access systems (VPN, RDP), and credential stuffing attacks against client portal and document management system logins. Once inside, attackers move quietly through the network, identifying and exfiltrating the most sensitive documents before making any ransom demand. In several confirmed incidents, attackers maintained access to law firm networks for 60-90 days before the extortion demand was made, giving them time to thoroughly map and exfiltrate the most valuable data.
Law firms that experience a data breach involving client information have obligations under both state bar rules and state data breach notification laws. The Texas Disciplinary Rules of Professional Conduct require attorneys to take reasonable measures to prevent unauthorized disclosure of client information. Following a breach, attorneys must assess whether client confidentiality has been compromised, notify affected clients, and take steps to prevent further disclosure. The Texas State Bar has published guidance on attorney obligations following a cybersecurity incident. Failure to properly respond to a breach can result in disciplinary action in addition to the direct costs of the incident.
Law firms should implement the following security controls as a priority. Enable MFA on all email accounts, document management systems, and client portals — this is the single most effective control against unauthorized access. Implement Data Loss Prevention (DLP) tools that can detect and alert on large-scale document downloads or exports, which is often the first sign of a data exfiltration attack. Classify your most sensitive client documents and apply additional access controls. Conduct regular security awareness training for all attorneys and staff. Develop a breach response plan that includes procedures for notifying clients, the state bar, and law enforcement. Segler.Net has experience working with law firms on security programs that meet both technical and professional responsibility requirements.
Our San Antonio security team can assess your exposure, apply patches, and protect your business before attackers strike.
Get weekly security alerts — breaches, patch updates, compliance news, and threat intel — delivered free to your inbox every week.