Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
By now, every managing partner has heard the warning: Law firms and their clients' sensitive information are a treasure trove for hackers.
But the ransomware attack on June 27 on DLA Piper sounded a different type of alarm for Big Law. See, “DLA Piper Hit By Cyber Attack,” in our sister newsletter Cybersecurity Law & Strategy. The world's biggest firms are just as prone to ransomware attacks as any other company, and the potential ramifications of a network-crippling malware infection are wide-ranging for a service industry that holds the legal fate of corporations in its palm. See, “Are Lawyers Easy Marks for Hackers?,” American Lawyer.
Consider litigators unable to access motions on a deadline. Trial lawyers preparing for arguments without key documents. Transactional lawyers unable to communicate with clients attempting to close multibillion-dollar deals.
And of course, anxious and possibly angry clients.
“The domino effect of doing something like this to a law firm permeates so many different parts of business,” says John Sweeney, president of LogicForce, a startup cybersecurity consulting firm. “Suffice it to say, it's going to touch hundreds if not thousands of different points of business, and not only in the U.S. It's a nightmare, there's no doubt about it.”
Phone lines at DLA Piper were down on the day of the attack across Europe and the U.S. According to media reports and a photo tweeted by Politico reporter Eric Geller in Washington, DC, employees were instructed not to turn on their computers and to unplug their laptops from the network.
“All network services are down,” a whiteboard read in what appeared to be the firm's Washington lobby.
A DLA Piper spokesman confirmed the firm had been the target of a possible malware attack that had affected a large number of organizations across the globe, including pharmaceutical giant Merck & Co. Inc. See, “DLA Piper Statement on Malware Attack.”
“The firm, like many other reported companies, has experienced issues with some of its systems due to suspected malware,” said the statement. “We are taking steps to remedy the issue as quickly as possible.”
Much like the WannaCry ransomware attack that spread throughout the globe in mid-May (see, “Will Ransomware Attack Make Law Firms 'Wannacry'?,” in our June issue, the new round of attacks uses the Petya virus and reportedly requests a payment of $300 in Bitcoin in order to obtain a “decryption code” that may unlock an organization's files. See, “WannaCry Some More? Petya Bitcoin Ransomware Attacks,” The Cointelegraph.
While security experts were still scrambling to determine the extent of the encryption or any other damage levied by the newest batch of ransomware, at least 27 organizations appeared to have paid the ransom as of early June 27, according to a blockchain transaction record.
In response to being hit by ransomware, Sweeney says firms should perform a detailed investigation of their systems involving forensics professionals to determine how the ransomware attack entered their network. Part of that investigation should include attempting to mitigate any more damage that could occur.
The best-case scenario in some ransomware attacks would be having an incident response plan in place that involves an off-site server back-up that could potentially restore the systems' computers, says Robert Rosenzweig, another cybersecurity expert and national leader of the cyber practice at insurance brokerage Risk Strategies Co.
LogicForce's Sweeney commended DLA Piper for issuing a public statement about the ransomware attack, something few law firms have done or been forced to do.
“Can they circumvent whatever's been done to their systems and get back online? I don't know. That would be the best option,” Sweeney says.
One bit of fallout from the attack may be a renewed interest from law firms in purchasing cybersecurity insurance. See, “Amid Hacking Threats, Law Firms Turn to Cyber Insurance,” The American Lawyer (March 21, 2016). A study by LogicForce released on the same day as the DLA Piper attack (see, “Law Firm Cyber Security Scorecard“) shows the ubiquitous risk of hacking for law firms states that 23% of firms polled had cybersecurity insurance policies. (The company surveyed more than 200 firms and found that all had been subjected to hacking attempts, while 40% of those attempts were successful. What's more, the 40% of firms who had been hacked were unaware of it, according to the report. Sweeney said DLA Piper was not included in his company's survey.) Those cybersecurity insurance policies will pay for direct expenses associated with a hack, such as the cost of the ransom; hiring forensic investigators; and bringing on a legal team to advise the firm of its potential risk.
For damage done to clients as a result of a firm losing its ability to service them or their confidential data getting into the wrong hands, it is possible a firm would have coverage under a more traditional legal malpractice insurance policy, Rosenzweig says. He says a “business interruption” component in a cybersecurity policy may also provide some relief, but added that a loss of a law firm's ability to service its clients due to a cyber breach could have long-tailed repercussions.
“The risk and the potential for a complex and expensive loss is a lot more significant,” Rosenzweig says.
The increased risk of ransomware attacks may also cause more law firm clients to perform cybersecurity audits as part of their hiring process, says LogicForce's Sweeney. His firm's report states that 34% of firms reported undergoing a cyber audit from a client, and LogicForce expects that number to grow to 65% by 2018.
“More and more clients are demanding these audits,” Sweeney says. “And quite frankly we're seeing some law firms losing business because they can't comply with the audit.”
***** Roy Strom, based in Chicago, covers the business of law for ALM, with a focus on how the Big Law business model is changing. He can be reached at [email protected]. On Twitter: @RoyWStrom.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.