While public evidence suggests that the attack did not result in the exposure of sensitive information, the firm sustained a significant business disruption and may have suffered reputational damage.
But how many law firms can withstand three days of technical chaos in a deadline-driven environment? An attack like this can deal a death blow unless the firm has considerable resources to remediate quickly and minimize disruption to operations.
THE RISKS ARE ENORMOUS
Malicious links are often packaged in phishing emails, which trick the reader into revealing login credentials or other confidential information, generally with the intent to create a misfortune the sender can profit from.
The risks are enormous. A successful phishing attack can cost firms precious cash in remediation or ransoms. Computer systems can be paralyzed for days or weeks. Secret, sensitive and personally identifiable information can be exposed — and the reputational risk can be severe.
Phishing attacks are soaring. According to the U.S. Office of the Director of National Intelligence, more than 100 million phishing emails are sent every day. About a third make it past default cybersecurity.
But clever criminals are staying a step ahead of prevention efforts. And law firms are juicy targets, housing a treasure trove of sensitive information while being perceived as lagging in security. Why target a major corporation when their law firm is easier to breach?
“Phishing has been going on a long time, but firms haven’t prepared for it as much as they need to,” says Eli Nussbaum, Managing Director at Keno Kozie Associates, a Chicago-based law firm technology consultancy. “Every day, a firm gets hit and they’re learning the lesson. Eventually all firms will learn, but today, we’re in a learning curve. The more I learn about security, it becomes a function of when, not if, it will happen. You need to be prepared for it.”
LAW FIRMS ARE AT A DISADVANTAGE
Phishing scams continue for one good reason: They’re successful enough for criminals to make huge profits. As protection evolves, so does the threat. “The bad guys are constantly evolving their attacks and are moving more quickly. They are even automating the process of stealing login credentials to start the process of getting into your email system in real time,” says Nussbaum.
Phishing works by sidestepping protection technologies. With 100 million attacks daily, firms are statistically at a disadvantage. And it only takes one successful breach to open a big can of worms.
TAKING THE BAIT: WHAT MODERN PHISHING LOOKS LIKE
Phishing is not new, and many firm employees may think they understand it well enough to not take the bait. The reality is that nearly anyone, under the right circumstances, can be tricked. According to Verizon’s 2017 data breach report, about one-third of phishing emails are opened.
All phishing runs on one simple idea — to trick the user into a response. Phishing is now more likely to be shaped by “social engineering,” which is an approach that plays on people’s good nature and business need to be helpful and responsive in order to trick them into bypassing normal security procedures. It’s a practice designed to deceive the most vigilant users with emails that are generally urgent in nature, requesting immediate information or action. The idea is to get the user to act now and think later.