Live Threats
[CVE-2026-1234]Windows CLFS Driver zero-day — privilege escalation to SYSTEM, CISA KEV confirmed, patch immediately|
[CVE-2026-0891]Fortinet FortiOS authentication bypass — unauthenticated admin access, active exploitation in the wild|
[CVE-2026-2201]Palo Alto PAN-OS command injection — remote code execution on firewall management plane, CISA KEV listed|
[PATCH]Microsoft April 2026 Patch Tuesday — 147 CVEs addressed including 3 zero-days, deploy immediately|
[BREACH]Healthcare sector breach — 2.3M patient records exposed, PHI including SSNs and medical histories compromised|
[CVE-2026-1887]Chrome V8 type confusion RCE — remote code execution via malicious web page, update Chrome immediately|
[COMPLIANCE]PCI DSS 4.0.1 MFA deadline — mandatory multi-factor authentication enforcement now in effect for all merchants|
[CVE-2026-3310]Cisco IOS XE privilege escalation — authenticated users gain root on affected switches and routers, patch now|
[RANSOMWARE]LockBit 4.0 SMB campaign — RDP brute-force targeting small businesses, double-extortion, 72-hour ransom window|
[ADVISORY]Adobe Acrobat PDF phishing wave — malicious PDFs bypassing email filters, credential harvesting at scale|
[CVE-2026-1234]Windows CLFS Driver zero-day — privilege escalation to SYSTEM, CISA KEV confirmed, patch immediately|
[CVE-2026-0891]Fortinet FortiOS authentication bypass — unauthenticated admin access, active exploitation in the wild|
[CVE-2026-2201]Palo Alto PAN-OS command injection — remote code execution on firewall management plane, CISA KEV listed|
[PATCH]Microsoft April 2026 Patch Tuesday — 147 CVEs addressed including 3 zero-days, deploy immediately|
[BREACH]Healthcare sector breach — 2.3M patient records exposed, PHI including SSNs and medical histories compromised|
[CVE-2026-1887]Chrome V8 type confusion RCE — remote code execution via malicious web page, update Chrome immediately|
[COMPLIANCE]PCI DSS 4.0.1 MFA deadline — mandatory multi-factor authentication enforcement now in effect for all merchants|
[CVE-2026-3310]Cisco IOS XE privilege escalation — authenticated users gain root on affected switches and routers, patch now|
[RANSOMWARE]LockBit 4.0 SMB campaign — RDP brute-force targeting small businesses, double-extortion, 72-hour ransom window|
[ADVISORY]Adobe Acrobat PDF phishing wave — malicious PDFs bypassing email filters, credential harvesting at scale|
View All
Law Firm Data Breach: Ransomware via Phishing Email Exposes Client Records
BREACHHIGH

Law Firm Data Breach: Ransomware via Phishing Email Exposes Client Records

Published April 3, 2026
4 min read
Source: Krebs on Security
SHARE:
Executive Summary

A mid-sized law firm suffered a ransomware attack that encrypted client files and exfiltrated sensitive legal documents. The attack originated from a phishing email that bypassed legacy email filters.

What Happened

A mid-sized law firm with approximately 45 attorneys suffered a ransomware attack that resulted in the encryption of client files and the exfiltration of sensitive legal documents including privileged communications, contracts, and litigation strategy documents. The attack began when a paralegal opened a phishing email that appeared to come from a court filing system, containing a link to a malicious document. The firm's legacy email filtering system failed to detect the sophisticated phishing email. Within 48 hours of the initial compromise, the ransomware group had moved laterally through the network, exfiltrated approximately 2TB of data, and deployed ransomware across all systems.

The Consequences

The firm faced multiple simultaneous crises following the attack. Client files were inaccessible for over two weeks, disrupting active litigation and causing missed deadlines. The ransomware group published a sample of stolen documents on their dark web leak site and demanded a $750,000 ransom. The firm faced regulatory scrutiny from state bar associations regarding their duty to protect client confidential information. Multiple clients filed complaints and at least three initiated malpractice claims. The firm's cyber insurance covered a portion of the costs, but the total financial impact including legal fees, forensic investigation, client notification, and business interruption exceeded $2 million.

Lessons for Professional Services Firms

This incident highlights several critical lessons for law firms and other professional services organizations. First, legacy email filtering is no longer sufficient — modern phishing attacks use sophisticated techniques that bypass traditional signature-based filters. AI-powered email security solutions that analyze email behavior and content are now essential. Second, immutable backups are non-negotiable — the firm's backups were connected to the network and were encrypted along with everything else. Air-gapped or immutable cloud backups would have dramatically reduced the recovery time and eliminated the need to consider paying the ransom. Third, incident response planning must happen before an incident — the firm had no documented incident response plan, which significantly extended the time to contain the attack.

Key Takeaways & Action Items
  • Upgrade from legacy email filtering to AI-powered email security that can detect sophisticated phishing
  • Implement immutable, air-gapped backups that cannot be encrypted by ransomware
  • Conduct regular phishing simulation training for all employees
  • Develop and test an incident response plan before you need it
  • Review your cyber insurance policy to ensure it covers ransomware and data exfiltration
Share This

Need Help With This Threat?

Our San Antonio security team can assess your exposure, apply patches, and protect your business before attackers strike.

Stay ahead of the next threat

Get weekly security alerts — breaches, patch updates, compliance news, and threat intel — delivered free to your inbox every week.

Breach alerts
Patch roundups
Compliance news
No spam, ever
Talk with Us