Service provider hack sees 100GB of data stolen from top law firm

Trump: High-profile client

Global law firm Jones Day has reportedly had 100 gigabytes of data stolen, with some of it appearing on the dark web, after a third party that provides it with file transfer software was hacked.

The firm has had a particularly high profile of late for its work for former president Donald Trump challenging last November’s election, and some of the data taken has appeared on ‘Cl0p Leaks’, a dark web site where other stolen data has been shared.

Screenshots of a few individual documents have been published there, including a memo to a judge marked “confidential mediation brief”, a cover letter enclosing “confidential documents”.

According to Vice, someone in control of an email address listed on the site, and purporting to be the hackers, said in an email to the publication: “We hacked their server where they stored data, on attempts to ‘settle’ they responded with silence and we had to upload the data.

“We emailed them and they ignored us for over a week. We did not encrypt their network [ie, it was not a ransomware attack], we only stole the data.”

Asked what their motivation was, the reply said: “And what do you think? 😉 financial of course.”

Jones Day – which has an active cybersecurity, privacy and data protection practice – has not posted anything about the hack on its website or social media channels and did not respond to a request for comment.

However, it told the Wall Street Journal that Accellion, a file-sharing company it has used, was recently compromised and had information taken. Jones Day said it continued to investigate the breach and was in discussion with affected clients and the appropriate authorities.

Accellion first revealed last month it had suffered a breach in mid-December; one of the affected clients was another major US law firm, Goodwin Proctor, which said at the time that a “small percentage” of its clients “may have experienced unauthorized access to or acquisition of confidential information”.

In a statement earlier this month, Accellion said the “sophisticated cyberattack” was on FTA, its “legacy large file transfer product” that was “nearing end-of-life”. Security patches were deployed, along with new monitoring and alerting capabilities.

Stephen Kapp, chief technology officer and founder of cybersecurity business Cortex Insight, said the breach highlighted the importance of ensuring that services used by an organisation were “properly secured and that vendor security is taken seriously, as when you use their services you are still responsible for the data they handle for you”.

He continued: “In order to manage and identify any risks introduced by third parties, it is best practice to include them in security assessments of your organisation.

“When doing this make sure that contracts with vendors allow for this and also stipulate to vendor their security obligations and your security requirements.”

Mitch Mallard, threat intelligence analyst at cybersecurity firm Talion, said: “The Accellion breach highlights one of the key weaknesses of external file transfer systems, but also the over-arching issue of security versus convenience.

“When uploading any kind of sensitive file to an online repository, document transfer service, or even attaching it to an email, it is best practice to the encrypt the file, and then provide your intended recipient with the decryption key through alternate means.

“This ensures that, should a breach occur, your files are not in plaintext for the taking. It may be tempting and convenient to trust reputable external services, but when it comes to sensitive files, such as the legal documents affected in this case, there is no substitute for robust encryption and keeping unprotected instances local only.”

Sam Curry, chief security officer at Cybereason, added that the size of the leak was not as important as the substance.

“For instance, image files can be very large compared to text files. The same is true of audio or video for depositions. The big concern here is where did the data go and how will it be used, not how much of it there is.”

Leave a Comment

By clicking Submit you consent to Legal Futures storing your personal data and confirm you have read our Privacy Policy and section 5 of our Terms & Conditions which deals with user-generated content. All comments will be moderated before posting.

Required fields are marked *
Email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.


Buyers beware

Some 12 years on from its first published research, the Society of Trust & Estate Practitioners has published a new report: Wills and Trusts – Buyers Beware.

European invasion – firms flood into the EU’s legal markets

The long march of lawyers across Europe continues apace more than 50 years after US law firms, together with their City counterparts, first opened offices in Paris and Brussels.

Legal project management – a mindset lawyers can easily apply

Where budgets are tight, lawyers will be considering what’s in their existing arsenal to still improve productivity. One effective, accessible and cheap tool is legal project management.

Loading animation