{"id":148144,"date":"2026-04-07T07:14:39","date_gmt":"2026-04-07T15:14:39","guid":{"rendered":"https:\/\/xira.com\/p\/2026\/04\/07\/cyberattacks-on-law-firms-are-rising-heres-whats-driving-it\/"},"modified":"2026-04-07T07:14:39","modified_gmt":"2026-04-07T15:14:39","slug":"cyberattacks-on-law-firms-are-rising-heres-whats-driving-it","status":"publish","type":"post","link":"https:\/\/xira.com\/p\/2026\/04\/07\/cyberattacks-on-law-firms-are-rising-heres-whats-driving-it\/","title":{"rendered":"Cyberattacks On Law Firms Are Rising. Here\u2019s What\u2019s Driving It."},"content":{"rendered":"<p><em><u>Ed. note<\/u>: This is the latest in the article series,\u00a0<strong>Cybersecurity: Tips From the Trenches<\/strong>,\u00a0by our friends at\u00a0<a href=\"https:\/\/senseient.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Sensei Enterprises<\/a>, a boutique provider of IT, cybersecurity, and digital forensics services.<\/em><\/p>\n<p>Law firms have always been attractive targets for cyberattacks. That part is not new. What is new is the pace, scale, and success rate of those attacks.<\/p>\n<p>According to a recent annual data security report highlighted by FindLaw, attacks on law firms are not only ongoing but also increasing. In some categories, incidents nearly doubled year over year, primarily driven by ransomware campaigns that show no signs of slowing down. The report clearly indicates that law firms are firmly in the crosshairs.<\/p>\n<p>This is no longer solely a concern for the tech department; it has become a business risk and, more recently, a legal ethics issue as well.<\/p>\n<h2 class=\"wp-block-heading\">The Attack Surface Is Expanding<\/h2>\n<p>The FindLaw report explains how attackers gain access, and it\u2019s not usually very clever. Phishing remains one of the main ways breaches happen. Third-party vendors are also a big weak spot, involved in about a quarter of incidents. In other words, attackers aren\u2019t breaking down the front door. They\u2019re walking right in because someone clicked a link or a vendor relationship created a direct way in. This should change how companies view cybersecurity. It\u2019s not about just defending the perimeter. It\u2019s about human behavior, managing vendors, and internal controls.<\/p>\n<h2 class=\"wp-block-heading\">Ransomware Has Become a Business Model<\/h2>\n<p>Once inside, attackers usually act openly by stealing data, encrypting systems, and demanding payment \u2013 sometimes all three. The report highlights how expensive this has become. Average ransom demands have risen above $4 million, a significant jump from the previous year, while actual payments are still averaging in the hundreds of thousands. Add in the costs of forensic investigations, downtime, regulatory notifications, and reputation damage, and the financial impact quickly adds up. This is no longer a random crime; it\u2019s a structured business model, with law firms being prime targets due to the data they hold and the urgency to regain access.<\/p>\n<h2 class=\"wp-block-heading\">The AI Factor Makes It Worse<\/h2>\n<p>The report also notes that attackers are increasingly using artificial intelligence to scale and enhance the effectiveness of their campaigns. Phishing emails are more convincing, social engineering is more targeted, and attacks can be spread across organizations with minimal effort.<\/p>\n<p>At the same time, companies are creating their own risks with what the report calls shadow AI. Employees using unauthorized AI tools might accidentally expose sensitive information or open new vulnerabilities in company systems. This results in a dual-risk environment, where AI is both a tool that attackers can exploit and a liability for the company when used without proper oversight.<\/p>\n<p>As an example, don\u2019t ask AI how to open a port in an XYZ firewall running 123 version of the software. You\u2019ve then potentially exposed a security technology used at your firm.<\/p>\n<h2 class=\"wp-block-heading\">Why This Is a Legal Problem<\/h2>\n<p>Law firms are different from other businesses. They manage confidential client information, data, litigation strategies, and privileged communications. When that data is compromised, the fallout extends beyond just operational issues.<\/p>\n<p>The report emphasizes the downstream implications, including breach-notification obligations, potential contractual breaches, and ethical duties related to confidentiality. Additionally, client expectations are rising. Clients expect their law firms to safeguard sensitive information. When that expectation is not met, the consequences go beyond financial loss. They can damage reputation and, in some cases, pose an existential threat.<\/p>\n<h2 class=\"wp-block-heading\">The Real Issue Is Not Technology<\/h2>\n<p>It\u2019s easy to see this as just a technology problem. Upgrade the firewall. Add another security tool. Run another scan. But that misses the point.<\/p>\n<p>The report emphasizes what many in the industry already understand. Most breaches are not caused by sophisticated attacks but by basic failures. These include unpatched systems, poor credential management, lack of user training, and weak vendor oversight.<\/p>\n<p>These are governance failures, not technical limitations.<\/p>\n<h2 class=\"wp-block-heading\">What Firms Should Actually Be Doing<\/h2>\n<p>If attacks are increasing and becoming more costly, responses cannot be incremental. Firms need to concentrate on fundamentals.<\/p>\n<p>First, strengthen user awareness and phishing defenses. Your greatest vulnerability remains your people.<\/p>\n<p>Second, strengthen vendor risk management. If a third party can access your systems, they are part of your security posture, whether you like it or not.<\/p>\n<p>Third, implement a real incident response plan. Not just a document that sits on a shelf, but a proven process that can be executed under pressure.<\/p>\n<p>Fourth, control the use of AI tools within the organization. Unauthorized experimentation with sensitive data isn\u2019t innovation; it\u2019s a risk.<\/p>\n<h2 class=\"wp-block-heading\">The Bottom Line<\/h2>\n<p>Cyberattacks on law firms are here to stay. The report makes that clear. The real question isn\u2019t whether firms will be targeted, but whether they are prepared. The harsh truth is that many are not.<\/p>\n<p>And when a breach occurs, it won\u2019t be blamed on the hacker. Instead, it will be blamed on the firm that didn\u2019t take the risk seriously enough.<\/p>\n<p>That is no longer a technology failure; it\u2019s a leadership failure.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n<p><em><strong>Michael C. Maschke is the President and Chief Executive Officer of Sensei Enterprises, Inc. Mr. Maschke is an EnCase Certified Examiner (EnCE), a Certified Computer Examiner (CCE #744), an AccessData Certified Examiner (ACE), a Certified Ethical Hacker (CEH), and a Certified Information Systems Security Professional (CISSP). He is a frequent speaker on IT, cybersecurity, and digital forensics, and he has co-authored 14 books published by the American Bar Association. He can be reached at\u00a0mmaschke@senseient.com.<\/strong><\/em><\/p>\n<p><em><strong>Sharon D. Nelson is the co-founder of and consultant to Sensei Enterprises, Inc. She is a past president of the Virginia State Bar, the Fairfax Bar Association, and the Fairfax Law Foundation. She is a co-author of 18 books published by the ABA. She can be reached at\u00a0snelson@senseient.com<\/strong><\/em>.<\/p>\n<p><em><strong>John W. Simek is the co-founder of and consultant to Sensei Enterprises, Inc. He holds multiple technical certifications and is a nationally known digital forensics expert. He is a co-author of 18 books published by the American Bar Association. He can be reached at\u00a0jsimek@senseient.com<\/strong><\/em>.<\/p>\n<p>The post <a href=\"https:\/\/abovethelaw.com\/2026\/04\/cyberattacks-on-law-firms-are-rising-heres-whats-driving-it\/\" rel=\"nofollow noopener\" target=\"_blank\">Cyberattacks On Law Firms Are Rising. Here\u2019s What\u2019s Driving It.<\/a> appeared first on <a href=\"https:\/\/abovethelaw.com\/\" rel=\"nofollow noopener\" target=\"_blank\">Above the Law<\/a>.<\/p>\n<figure class=\"post-single__featured-image post-single__featured-image--medium alignright\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"181\" src=\"https:\/\/i0.wp.com\/abovethelaw.com\/wp-content\/uploads\/sites\/4\/2015\/06\/Hacker-typing-on-a-laptop-Article-201408011552-300x181.jpg?resize=300%2C181&#038;ssl=1\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" title=\"\"><\/figure>\n<p><em><u>Ed. note<\/u>: This is the latest in the article series,\u00a0<strong>Cybersecurity: Tips From the Trenches<\/strong>,\u00a0by our friends at\u00a0<a href=\"https:\/\/senseient.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Sensei Enterprises<\/a>, a boutique provider of IT, cybersecurity, and digital forensics services.<\/em><\/p>\n<p>Law firms have always been attractive targets for cyberattacks. That part is not new. What is new is the pace, scale, and success rate of those attacks.<\/p>\n<p>According to a recent annual data security report highlighted by FindLaw, attacks on law firms are not only ongoing but also increasing. In some categories, incidents nearly doubled year over year, primarily driven by ransomware campaigns that show no signs of slowing down. The report clearly indicates that law firms are firmly in the crosshairs.<\/p>\n<p>This is no longer solely a concern for the tech department; it has become a business risk and, more recently, a legal ethics issue as well.<\/p>\n<p>The FindLaw report explains how attackers gain access, and it\u2019s not usually very clever. Phishing remains one of the main ways breaches happen. Third-party vendors are also a big weak spot, involved in about a quarter of incidents. In other words, attackers aren\u2019t breaking down the front door. They\u2019re walking right in because someone clicked a link or a vendor relationship created a direct way in. This should change how companies view cybersecurity. It\u2019s not about just defending the perimeter. It\u2019s about human behavior, managing vendors, and internal controls.<\/p>\n<p>Once inside, attackers usually act openly by stealing data, encrypting systems, and demanding payment \u2013 sometimes all three. The report highlights how expensive this has become. Average ransom demands have risen above $4 million, a significant jump from the previous year, while actual payments are still averaging in the hundreds of thousands. Add in the costs of forensic investigations, downtime, regulatory notifications, and reputation damage, and the financial impact quickly adds up. This is no longer a random crime; it\u2019s a structured business model, with law firms being prime targets due to the data they hold and the urgency to regain access.<\/p>\n<p>The report also notes that attackers are increasingly using artificial intelligence to scale and enhance the effectiveness of their campaigns. Phishing emails are more convincing, social engineering is more targeted, and attacks can be spread across organizations with minimal effort.<\/p>\n<p>At the same time, companies are creating their own risks with what the report calls shadow AI. Employees using unauthorized AI tools might accidentally expose sensitive information or open new vulnerabilities in company systems. This results in a dual-risk environment, where AI is both a tool that attackers can exploit and a liability for the company when used without proper oversight.<\/p>\n<p>As an example, don\u2019t ask AI how to open a port in an XYZ firewall running 123 version of the software. You\u2019ve then potentially exposed a security technology used at your firm.<\/p>\n<p>Law firms are different from other businesses. They manage confidential client information, data, litigation strategies, and privileged communications. When that data is compromised, the fallout extends beyond just operational issues.<\/p>\n<p>The report emphasizes the downstream implications, including breach-notification obligations, potential contractual breaches, and ethical duties related to confidentiality. Additionally, client expectations are rising. Clients expect their law firms to safeguard sensitive information. When that expectation is not met, the consequences go beyond financial loss. They can damage reputation and, in some cases, pose an existential threat.<\/p>\n<p>It\u2019s easy to see this as just a technology problem. Upgrade the firewall. Add another security tool. Run another scan. But that misses the point.<\/p>\n<p>The report emphasizes what many in the industry already understand. Most breaches are not caused by sophisticated attacks but by basic failures. These include unpatched systems, poor credential management, lack of user training, and weak vendor oversight.<\/p>\n<p>These are governance failures, not technical limitations.<\/p>\n<p>If attacks are increasing and becoming more costly, responses cannot be incremental. Firms need to concentrate on fundamentals.<\/p>\n<p>First, strengthen user awareness and phishing defenses. Your greatest vulnerability remains your people.<\/p>\n<p>Second, strengthen vendor risk management. If a third party can access your systems, they are part of your security posture, whether you like it or not.<\/p>\n<p>Third, implement a real incident response plan. Not just a document that sits on a shelf, but a proven process that can be executed under pressure.<\/p>\n<p>Fourth, control the use of AI tools within the organization. Unauthorized experimentation with sensitive data isn\u2019t innovation; it\u2019s a risk.<\/p>\n<p>Cyberattacks on law firms are here to stay. The report makes that clear. The real question isn\u2019t whether firms will be targeted, but whether they are prepared. The harsh truth is that many are not.<\/p>\n<p>And when a breach occurs, it won\u2019t be blamed on the hacker. Instead, it will be blamed on the firm that didn\u2019t take the risk seriously enough.<\/p>\n<p>That is no longer a technology failure; it\u2019s a leadership failure.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n<p><em><strong>Michael C. Maschke is the President and Chief Executive Officer of Sensei Enterprises, Inc. Mr. Maschke is an EnCase Certified Examiner (EnCE), a Certified Computer Examiner (CCE #744), an AccessData Certified Examiner (ACE), a Certified Ethical Hacker (CEH), and a Certified Information Systems Security Professional (CISSP). He is a frequent speaker on IT, cybersecurity, and digital forensics, and he has co-authored 14 books published by the American Bar Association. He can be reached at\u00a0<a href=\"https:\/\/abovethelaw.com\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"1d70707c6e7e7576785d6e78736e7874787369337e7270\" rel=\"nofollow noopener\" target=\"_blank\">[email\u00a0protected]<\/a>.<\/strong><\/em><\/p>\n<p><em><strong>Sharon D. Nelson is the co-founder of and consultant to Sensei Enterprises, Inc. She is a past president of the Virginia State Bar, the Fairfax Bar Association, and the Fairfax Law Foundation. She is a co-author of 18 books published by the ABA. She can be reached at\u00a0<a href=\"https:\/\/abovethelaw.com\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"80f3eee5ecf3efeec0f3e5eef3e5e9e5eef4aee3efed\" rel=\"nofollow noopener\" target=\"_blank\">[email\u00a0protected]<\/a><\/strong><\/em>.<\/p>\n<p><em><strong>John W. Simek is the co-founder of and consultant to Sensei Enterprises, Inc. He holds multiple technical certifications and is a nationally known digital forensics expert. He is a co-author of 18 books published by the American Bar Association. He can be reached at\u00a0<a href=\"https:\/\/abovethelaw.com\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"83e9f0eaeee6e8c3f0e6edf0e6eae6edf7ade0ecee\" rel=\"nofollow noopener\" target=\"_blank\">[email\u00a0protected]<\/a><\/strong><\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ed. note: This is the latest in the article series,\u00a0Cybersecurity: Tips From the Trenches,\u00a0by our friends at\u00a0Sensei Enterprises, a boutique provider of IT, cybersecurity, and digital forensics services. Law firms have always been attractive targets for cyberattacks. That part is not new. What is new is the pace, scale, and success rate of those attacks. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":148145,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-148144","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-above_the_law"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/xira.com\/p\/wp-content\/uploads\/2026\/04\/Hacker-typing-on-a-laptop-Article-201408011552-LSB7DJ.jpg?fit=616%2C372&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts\/148144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/comments?post=148144"}],"version-history":[{"count":0,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/posts\/148144\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/media\/148145"}],"wp:attachment":[{"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/media?parent=148144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/categories?post=148144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xira.com\/p\/wp-json\/wp\/v2\/tags?post=148144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}