Legal15 September, 2025

Cybersecurity made easy for lawyers: phishing and ransomware attacks and how to prevent them

Cybersecurity is no longer just an IT concern for law firms—it has become a vital professional responsibility. With cyberattacks growing more sophisticated and regulatory requirements becoming increasingly stringent, protecting sensitive information and maintaining client trust has never been more crucial.

This article, authored by Lawyer and professor Marco Martorana and Doctor of Law Gaja Nutini, explores the types of cyberattacks targeting law firms, their impacts, and actionable best practices for prevention. From understanding the anatomy of an attack to navigating the complexities of ransomware and regulatory compliance, this comprehensive guide equips lawyers with the tools and knowledge they need to protect their practices effectively.


Table of Content

  1. The rise in cyber risks for law firms
  2. Phishing and ransomware attacks: how cybercriminals operate
  3. Best practices to prevent cyberattacks: an integrated approach
  4. Ransom payment: how it works and its consequences
  5. Key takeaways for cybersecurity for lawyers

The rise in cyberisks for law firms

Over the past few years, the cybersecurity landscape has undergone a dramatic transformation, with a sharp rise in targeted attacks on sectors handling highly sensitive data. Within this context, law firms have become prime targets for cybercriminals. The reasons are clear: law firms are trusted custodians of clients' confidential information, industrial secrets, and strategies often holding immeasurable value.

The financial repercussions of cyberattacks are catastrophic. Affected law firms can face prolonged downtimes and recovery costs exceeding €50,000 per day. Small and medium-sized legal practices are particularly vulnerable, with 70% yet to implement adequate security measures, as confirmed by the European Union Agency for Cybersecurity (ENISA). Globally, the situation is similar. For instance, the American Bar Association in 2023 reported that 29% of U.S. law firms experienced security breaches, and three out of four firms affected by such incidents faced at least three days of complete inactivity.

Phishing and ramsoware attacks: how cybercriminals operate

The methods used to compromise the IT systems of law firms follow well-established patterns, yet they are constantly evolving in terms of sophistication. Phishing remains the preferred entry point, a mechanism through which cybercriminals induce recipients to provide login credentials or download malicious attachments. Particularly insidious is the variant known as "spear phishing", characterised by highly personalised communications that impersonate trusted senders, such as clients, colleagues, or institutions we know and trust.

A prominent example was the "Legalmail Compromised" campaign, documented by Italian postal police in March 2024. Many law firms received fraudulent communications appearing to come from the certified email system widely used by legal professionals in Italy. These messages were so sophisticated that they bypassed spam filters, achieving a success rate of 23%.

Once initial access is gained, the attack generally proceeds in three phases:

  1. Reconnaissance: Mapping the network to identify high-value data.
  2. Privilege Escalation: Gaining admin-level access to obtain administrative credentials.
  3. Exfiltration and Encryption: Extracting and encrypting data, often accompanied by a ransom demand.

Compounding the situation is the evolution towards "double extortion ransomware", where data encryption is accompanied by the threat of its publication, greatly increasing the pressure on victims.

Recently, the cyber risk consultancy S-RM reported a significant increase in Business Email Compromise (BEC) attacks against law firms. Criminal groups have developed sophisticated techniques to bypass multi-factor authentication (MFA) systems, including session cookie theft and manipulation of IP addresses and geolocation data to evade detection.

Best practices to prevent cyberattacks: an integrated approach

In the face of these risks and responsibilities, the need for law firms to adopt a structured approach to cybersecurity, based on the principle of "defence in depth," becomes clear. Imagine cybersecurity as the protection of a medieval castle: a single wall, no matter how thick, is insufficient. Moats, watchtowers, sentinels, and evacuation plans are all necessary. This strategy unfolds across several complementary levels.

If you’re working in small or mid-sized law firms, staff training is the first and most important level of protection. The implementation of phishing simulation programmes proves particularly effective; a study from Bocconi University in Milan found a 62% reduction in incidents in law firms that adopted these measures. In practice, this involves periodically sending simulated phishing emails to staff to test their responsiveness and identify any training gaps.

On the technological front, adopting multi-factor authentication (MFA) solutions is an essential measure, as is the implementation of offline backup systems that allow data restoration in the event of a ransomware attack. It is important to note that, according to Microsoft, MFA can block up to 99% of attacks that compromise accounts. Network segmentation is equally relevant, as it limits the lateral spread of attacks, and the use of Endpoint Detection and Response (EDR) solutions can detect anomalous behaviour before it results in actual compromises.

💡 Building on these essential cybersecurity measures, Kleos provides a comprehensive solution tailored for law firms. With Multi-Factor Authentication (MFA) at its core, Kleos aligns with best practices to block account compromise attacks. In addition, Kleos reinforces data security through automatic encryption, routine backups for ransomware recovery, and ISO 27001-certified data centres with 24/7 monitoring, offering a robust defence to protect sensitive legal data.

Discover more →

Having a well-structured and tested incident response plan is also critical. This is not merely a document to be kept in a drawer, but an operational protocol that clearly defines what to do, who should do it, and how to communicate in the event of a breach.

Periodic drills simulating realistic scenarios allow us to verify its effectiveness and ensure we are ready when the emergency is real. From an organisational perspective, appointing a cybersecurity officer—even in an outsourced capacity for smaller firms—can represent a strategic choice that enables centralised management of security issues and ensures continuous monitoring of the evolving threat landscape.

Don’t wait for a breach to act. Download the free cybersecurity checklist today and take the first step towards securing your legal practice

Get your copy

Ransom payment: how it works and its consequences

“They have all our data. Clients will sue us if it is published. Perhaps we should pay…” This is an understandable thought when under the pressure of a ransomware attack.

However, the issue is more complex than it appears.

According to Europol, paying the ransom contributes to funding further criminal activities and does not necessarily guarantee the recovery of data, with a success rate of around 65%. On the other hand, a categorical refusal to negotiate can result in the permanent loss of critical information if adequate backups are not available.

The costs associated with ransomware attacks can be devastating. An emblematic case involves a law firm that, following an attack, suffered losses of nearly $700,000 in billing to clients, in addition to the undisclosed ransom cost. The firm was forced to initially pay Bitcoin in advance to the hackers, then negotiate further Bitcoin payments later, leaving the firm in difficulty and its employees unproductive for several months.

From a legal perspective, it is important to highlight that in some jurisdictions, paying the ransom may constitute potential violations of anti-money laundering regulations or provisions regarding the financing of terrorism. In the United States, the Office of Foreign Assets Control (OFAC) has issued guidelines explicitly discouraging ransom payments to sanctioned groups, with potential legal consequences for those who violate them. In Europe, while there are currently no explicit bans, the issue is receiving increasing attention from regulators: the Parliament recently adopted a resolution calling for consideration of restrictions on ransom payments in cryptocurrencies.

Therefore, decisions must be made considering not only the immediate costs but also the legal, reputational, and ethical implications. This is a matter worth reflecting on before one finds themselves in an emergency.

Key takeaways about cybersecurity for law firms

The increasing sophistication of attacks and the evolving regulatory framework compel us to significantly elevate our approach to cybersecurity. This is no longer merely a technical issue to be delegated to IT; it has become a professional responsibility that lies at the heart of our practice.

The next phase of regulatory evolution is likely to witness greater interaction among various international legal regimes, with attempts at harmonising security standards and breach notification mechanisms. For law firms with international clients, this means preparing to navigate increasingly complex and interconnected compliance requirements. Additionally, we can expect a further strengthening of security obligations, particularly regarding the implementation of emerging technologies such as artificial intelligence for anomaly detection and blockchain for certifying document integrity.

Concurrently, we are likely to see a legal evolution towards expanding professional liability in the event of incidents. In this context, it is crucial for us, as legal professionals, to foster a culture of security that permeates all organisational levels, moving beyond the traditionally reactive approach to embrace a proactive strategy grounded in continuous risk assessment.

Absolute security does not exist, but resilience does: the capacity to prevent many threats and to respond effectively to those that manage to breach our defences. In a world where data is considered "the new oil," protecting our clients' information is not only a legal or ethical obligation; it is the very foundation of the trust upon which our profession is built. And, as we well know, trust, once lost, is exceedingly difficult to regain.

Lawyer and professor Marco Martorana
Doctor of Law Gaja Nutini

References:

Sito web del Garante per la Protezione dei Dati Personali
Clusit. (2025). Rapporto sulla Sicurezza ICT in Italia. Clusit.
Corte di Giustizia dell'Unione Europea. (2024). Sentenza C-687/21. EUR-Lex.
ENISA Space Threat Landscape 2025
American Bar Association (2024). Tech Survey 2024: ABA Publishing.
European Commission. (2022). Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union (NIS 2 Directive)
Garante per la Protezione dei Dati Personali (2023). Provvedimento n. 273 del 13 luglio 2023.
International Bar Association (IBA). Cybersecurity Guidelines
JdSupra (2025). Cybersecurity, Wire Fraud, and Attorney Liability: The Growing Risk Landscape
Lockton. Why law firms must focus on information security & cyber crime
CShub (2023). BEC attacks on law firms spike as cyber criminals bypass MFA

Back To Top