{"id":123113,"date":"2025-06-16T12:41:03","date_gmt":"2025-06-16T20:41:03","guid":{"rendered":"https:\/\/xira.com\/p\/2025\/06\/16\/why-are-cybercriminals-targeting-law-firms-with-voice-phishing\/"},"modified":"2025-06-16T12:41:03","modified_gmt":"2025-06-16T20:41:03","slug":"why-are-cybercriminals-targeting-law-firms-with-voice-phishing","status":"publish","type":"post","link":"https:\/\/xira.com\/p\/2025\/06\/16\/why-are-cybercriminals-targeting-law-firms-with-voice-phishing\/","title":{"rendered":"Why Are Cybercriminals Targeting Law Firms With Voice Phishing?"},"content":{"rendered":"<p>Posing as firm IT departments, hackers are initiating remote sessions and encrypting or exfiltrating client data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" align=\"left\" border=\"0\" height=\"1\" width=\"1\" alt=\"\" hspace=\"0\" src=\"https:\/\/feeds.feedblitz.com\/~\/i\/920314694\/0\/law\/legal-news\" title=\"\"><\/p>\n<div><a title=\"Add to FaceBook\" href=\"https:\/\/feeds.feedblitz.com\/_\/2\/920314694\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/fbshare20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a title=\"Like on Facebook\" href=\"https:\/\/feeds.feedblitz.com\/_\/28\/920314694\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/fblike20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a title=\"Pin it!\" href=\"https:\/\/feeds.feedblitz.com\/_\/29\/920314694\/law\/legal-news,\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/pinterest20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a title=\"Stumble This\" href=\"https:\/\/feeds.feedblitz.com\/_\/12\/920314694\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/stumble20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a title=\"Post to X.com\" href=\"https:\/\/feeds.feedblitz.com\/_\/24\/920314694\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/x.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a title=\"Subscribe by RSS\" href=\"https:\/\/feeds.feedblitz.com\/_\/20\/920314694\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/rss20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0\u00a0<\/div>\n<p>Posing as firm IT departments, hackers are initiating remote sessions and encrypting or exfiltrating client data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" align=\"left\" border=\"0\" height=\"1\" width=\"1\" alt=\"\" hspace=\"0\" src=\"https:\/\/feeds.feedblitz.com\/~\/i\/920314694\/0\/law\/legal-news\" title=\"\"><\/p>\n<div><a title=\"Add to FaceBook\" href=\"https:\/\/feeds.feedblitz.com\/_\/2\/920314694\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/fbshare20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a title=\"Like on Facebook\" href=\"https:\/\/feeds.feedblitz.com\/_\/28\/920314694\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/fblike20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a title=\"Pin it!\" href=\"https:\/\/feeds.feedblitz.com\/_\/29\/920314694\/law\/legal-news,\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/pinterest20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a title=\"Stumble This\" href=\"https:\/\/feeds.feedblitz.com\/_\/12\/920314694\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/stumble20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a title=\"Post to X.com\" href=\"https:\/\/feeds.feedblitz.com\/_\/24\/920314694\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/x.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0<a title=\"Subscribe by RSS\" href=\"https:\/\/feeds.feedblitz.com\/_\/20\/920314694\/law\/legal-news\" rel=\"nofollow noopener\" target=\"_blank\"><img data-recalc-dims=\"1\" width=\"1080\" decoding=\"async\" height=\"20\" src=\"https:\/\/i0.wp.com\/assets.feedblitz.com\/i\/rss20.png?fit=1080%2C20&#038;ssl=1\" alt=\"\" title=\"\"><\/a>\u00a0\u00a0<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Posing as firm IT departments, hackers are initiating remote sessions and encrypting or exfiltrating client data. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Posing as firm IT departments, hackers are initiating remote sessions and encrypting or exfiltrating client data. \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p>\n","protected":false},"author":3,"featured_media":123114,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[23],"tags":[],"class_list":["post-123113","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-law-com"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/xira.com\/p\/wp-content\/uploads\/2025\/06\/legal-news-9uKlcU.jpeg?fit=767%2C505&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts\/123113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/comments?post=123113"}],"version-history":[{"count":0,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts\/123113\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/media\/123114"}],"wp:attachment":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/media?parent=123113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/categories?post=123113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/tags?post=123113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}