CDML Computer Services - We make sure your BITS don't BYTE!       CALL: +1 718-393-5343

Law Firms Under Attack: FBI Issues Cybersecurity Warning to Legal Industry

lawyers running away from a flying hacker

Click here to view/listen to our blogcast.

In a recent alert, the FBI has warned that a cybercrime group known as the Silent Ransom Group (SRG)—also referred to as Luna Moth—is actively targeting law firms across the United States in a series of highly organized data extortion attacks. These attacks are part of a growing trend where traditional ransomware is replaced with stealthier, fileless operations that rely on social engineering, remote access, and psychological pressure.

Law firms are prime targets due to the volume of sensitive, confidential, and high-value data they store—including case files, financial records, and privileged communications. The Luna Moth group exploits this vulnerability through carefully crafted phishing campaigns and IT support impersonation tactics.


What We Know About Luna Moth’s Strategy

The FBI’s Private Industry Notification (PIN) provides critical insight into the group’s methods. Instead of encrypting data, Luna Moth operators gain access, exfiltrate files, and then extort the victims by threatening to publish or sell the data.

Attack Methodology:

  • Phishing Campaigns: Employees receive emails impersonating IT support, often referencing antivirus renewals or account access issues.
  • Callback Scams: Victims are tricked into calling fake support numbers where attackers walk them through giving remote access to their systems.
  • Data Exfiltration: Tools like WinSCP and Rclone are used to quietly transfer files out of the network—without triggering ransomware alerts.
  • Extortion: Victims are pressured to pay a ransom (often in cryptocurrency), or risk public exposure of stolen legal documents.

Why Law Firms Should Be Concerned

Legal organizations are increasingly attractive to cybercriminals for several reasons:

  • Low Tolerance for Data Leaks: Legal confidentiality is paramount, making victims more likely to pay quickly.
  • Valuable Target Data: Intellectual property, merger and acquisition data, and litigation strategy are all high-value to competitors or the dark web.
  • Often Under-Protected: Many small-to-mid-sized firms lack dedicated cybersecurity staff or incident response plans.

FBI Recommendations for Law Firms

The FBI strongly encourages proactive defense. At CDML, we align our cybersecurity services with these federal recommendations:

Actionable Steps:

  • Train Employees to Recognize Social Engineering
    Simulate phishing attacks and educate staff on callback scam techniques.
  • Implement Multi-Factor Authentication (MFA)
    Especially on email, remote access, and file-sharing platforms.
  • Review Remote Access Protocols
    Ensure only authorized personnel can use remote desktop tools. Disable unnecessary services.
  • Log and Monitor Activity
    Use SIEM tools to detect unauthorized file transfers or unusual login behavior.
  • Backup Data Regularly
    Secure, offline backups ensure you can recover without paying ransoms.

Final Thoughts

The Silent Ransom Group’s tactics are evolving fast, and law firms—especially those without robust cybersecurity policies—are at risk. The FBI’s alert is a call to action: firms must move from reactive to proactive when it comes to data security.

CDML Computer Services offers tailored cybersecurity solutions, employee security training, and managed threat response services that help law firms stay ahead of extortion-driven cyber threats.

If you’re unsure whether your law firm is adequately protected, we can help.


Referenced FBI Bulletin:
FBI Private Industry Notification – “Silent Ransom Group Uses Callback Phishing and Data Theft for Extortion” (May 2024) [Downloadable PDF from IC3.gov]

Stay safe. Stay informed.

Empowering business growth through innovation using secure, sustainable solutions.

📞 Contact us here: https://cdml.com/contact/
📚 Read more on our blog: https://cdml.com/blog – 2
📺 Listen to our blogcasts: https://www.youtube.com/@CDMLComputerServices

Comments are closed.