Dec 05, 2025 • Recorded Future
The Hidden Cascade: Why Law Firm Breaches Destroy More than Data
Law firms face escalating cyber threats with 20% targeted in the past year and average breach costs reaching $5.08 million. Ransomware groups RansomHub and...
Executive Summary
Law firms face escalating cyber threats with 20% targeted in the past year and average breach costs reaching $5.08 million. Ransomware groups RansomHub and Qilin have emerged as primary threats, specifically targeting legal entities with encryption-resistant payloads. Attackers maintain extended dwell times exceeding weeks to systematically identify high-value intelligence including M&A data during active deals and litigation strategies. The industrial nature of these attacks means adversaries understand exactly what creates maximum leverage. Compounding the risk, courts have eroded attorney-client privilege protections, meaning forensic reports can become discovery evidence, creating additional legal exposure for breached firms. Immediate actions include vendor risk assessment, enhanced network monitoring for C2 communication, and robust backup strategies to counter encryption-resistant ransomware.
Summary
Discover how law firm breaches expose decades of M&A intelligence, client data, and privileged strategy—and how to reduce cascading vendor risk before it hits.
Published Analysis
Law firms face escalating cyber threats with 20% targeted in the past year and average breach costs reaching $5.08 million. Ransomware groups RansomHub and Qilin have emerged as primary threats, specifically targeting legal entities with encryption-resistant payloads. Attackers maintain extended dwell times exceeding weeks to systematically identify high-value intelligence including M&A data during active deals and litigation strategies. The industrial nature of these attacks means adversaries understand exactly what creates maximum leverage. Compounding the risk, courts have eroded attorney-client privilege protections, meaning forensic reports can become discovery evidence, creating additional legal exposure for breached firms. Immediate actions include vendor risk assessment, enhanced network monitoring for C2 communication, and robust backup strategies to counter encryption-resistant ransomware. Discover how law firm breaches expose decades of M&A intelligence, client data, and privileged strategy—and how to reduce cascading vendor risk before it hits. In the wake of the Salesforce/Gainsight breach (kudos to Salesforce for transparently sharing indicators of compromise and updated progress on remediation), third-party cyber and exposure risk is top of mind for many CISOs . Professional services firms are often overlooked in this context, with disastrous consequences. Law firms , specifically, are particularly vulnerable to creating downstream risk impacts given the nature and purpose of legal services, and adversary targeting is on the rise. The Industrial Consolidation of Legal Sector Attacks The numbers paint a stark reality. Twenty % of US law firms were targeted by cyberattacks in the past year , with 56% of breached firms losing sensitive client information. The average breach cost reached $5.08 million, representing a 10% year-over-year increase that excludes long-term reputational damage and client defection. Recorded Future’s AI Insights from 2025 service industry victims RansomHub has emerged as 2025’s dominant threat after absorbing talent from disrupted groups like LockBit and ALPHV/BlackCat . By offering affiliates a 90/10 profit split versus the standard 70/30, they’ve attracted the most capable operators in the underground economy. Qilin’s Rust-based ransomware has specifically targeted legal entities with encryption-resistant payloads, making recovery nearly impossible. Qilin ransomware profile c/o Recorded Future The chart below, derived from Recorded Future analyst notes tracking ransomware extortion sites, illustrates the growth in ransomware targeting by industry, with legal firms remaining the number one target. Ransomware victims industry comparison in 2024 and 2025. These aren’t opportunistic attacks. Threat actors now maintain “dwell times” exceeding weeks inside firm networks, systematically identifying crown jewel intelligence before triggering extortion events. Industrialization means attackers understand exactly what creates maximum leverage: M&A intelligence during active deals, litigation strategies before trial, and decades of retained client data across multiple matters. Recorded Future telemetry from the past quarter indicates that over 20 observed legal or legally adjacent firms have malware communicating with malicious command-and-control (C2) servers. While the observed traffic was 24 hours or less for some firms, other organizations saw persistence above 5 days. Certainly, a malicious implant does not equate to a full breach and exfiltration of client-sensitive data; however, it is a valuable signal to monitor for changes in third-party and fourth-party risk. rxkipoqeu6 Infographic depicting recent malware dwell times in global legal firm victims When Privilege Becomes Your Adversary’s Weapon Courts have systematically eroded attorney-client privilege protection for breach investigations, creating a dangerous trap where forensic reports become ammunition for adversaries. The Capital One decision ordered production of Mandiant’s forensic report because the investigator served “business purposes” rather than pure legal advice. The cascade accelerates through “sword and shield” waiver doctrine. Any use of breach investigation findings, even citing them in discovery responses, can trigger a subject matter waiver, requiring disclosure of all privileged communications related to threat assessment and remediation strategy. The 2024 Samsung Data Breach ruling made this explicit: sharing reports with 15 executives indicated business decision-making use, defeating privilege. Federal Rule of Evidence 502 creates additional exposure when companies share incident reports with regulators. The 2023 Covington & Burling case saw the SEC subpoena the firm for names of 298 publicly-traded clients whose data “may have been exfiltrated,” though a court eventually ruled that only seven clients had to be named, it did establish that law firms cannot completely shield client identity from...
Linked Entities
- Qilin
- ALPHV/BlackCat
- Lockbit
- Qilin
- RansomHub