Your clients trust your firm with their most sensitive information. Confidential case strategy. M&A documents. Privileged communications. Financial disclosures. Intellectual property. Regulatory filings.

So what happens when cybercriminals target that trust?

That is exactly the question legal leaders should be asking after global law firm Jones Day disclosed that hackers gained access to client files affecting multiple clients following what the firm described as a phishing incident. According to reporting from Reuters and other legal industry coverage, the attackers accessed dated client files tied to 10 clients, and the incident has been linked to a criminal group known for specifically targeting law firms.

For managing partners, firm administrators, legal operations leaders, and executive committees, this is not just another cyber headline.

It is a warning.

Because when a law firm gets breached, the real damage often begins long before anyone sees an alert.


So what exactly happened?

According to reports, attackers used a phishing campaign to gain unauthorized access to systems at Jones Day, one of the largest law firms in the world. The firm stated that a limited number of client files were accessed, and impacted clients were notified.

At first glance, that may sound contained.

But for law firms, "limited access" can still mean exposure of:

  • Attorney-client privileged communications
  • Active litigation strategy
  • M&A due diligence materials
  • Regulatory filings
  • Intellectual property documentation
  • Internal billing records
  • Settlement negotiations
  • eDiscovery repositories

Even a small amount of unauthorized access can create significant operational, ethical, and legal consequences.


Why are law firms being targeted?

Because few industries hold more concentrated, high-value data than legal organizations.

Law firms routinely manage:

  • Confidential client records
  • Litigation support systems
  • Time and billing platforms
  • Remote attorney access portals
  • Deal room documentation
  • Board communications
  • Third-party eDiscovery data
  • Regulatory compliance archives

The attackers behind this incident reportedly specialize in targeting law firms because of the highly sensitive nature of legal data.

That should concern every leadership team.

A cybercriminal does not need to encrypt your network to create damage.

They only need access.

And in legal environments, access often equals leverage.


What would an attack like this mean for client confidentiality?

For a law firm, a cyberattack is not just an IT problem.

It can become:

  • An attorney-client privilege issue
  • An ethics compliance issue
  • A malpractice exposure issue
  • A client retention issue
  • A reputational issue
  • A business continuity issue

Imagine an attacker accessing:

  • Active trial strategy during litigation
  • M&A diligence files before closing
  • Patent documentation before filing
  • Internal investigative materials
  • Compliance communications
  • Financial discovery documents

The damage may never appear on a balance sheet, but clients remember when trust is broken.

And some never come back.


What would downtime cost a law firm?

When endpoints go down, the ripple effects hit every part of firm operations:

  • Attorneys cannot access document management systems
  • Billing teams cannot process invoices
  • Matter management stalls
  • Remote lawyers lose secure access
  • Discovery deadlines become harder to meet
  • Administrative staff lose productivity
  • Client communications are delayed

According to the IBM 2025 Cost of a Data Breach Report, the global average cost of a breach reached $4.4 million.

The same report found the average breach lifecycle was approximately 241 days from identification through containment and recovery.

For a law firm billing by the hour, 241 days of disruption, investigation, and recovery can create enormous downstream financial impact.


Are attacks becoming more aggressive?

Yes.

According to the 2025 Data Breach Investigations Report from Verizon Communications:

  • Credential abuse accounted for 22% of initial attack vectors
  • Exploitation of vulnerabilities accounted for 20%
  • Third-party involvement in breaches doubled to 30%
  • Vulnerability exploitation increased by 34% year over year

For firms relying on external litigation vendors, cloud repositories, remote access providers, and eDiscovery partners, those numbers should get immediate leadership attention.


Could this happen even if our firm already has EDR?

Yes.

And this is where many legal organizations need to rethink endpoint strategy.

Traditional "Detect and Respond" security assumes:

  • Malicious code will execute
  • Tools will detect suspicious behavior
  • Alerts will be reviewed in time
  • Analysts will contain the threat before damage spreads

But modern attackers increasingly bypass that model using:

  • Credential abuse
  • Living off the land techniques
  • Native administrative tools
  • Security tool tampering
  • Delayed payload execution
  • Phishing-driven malware delivery

By the time an alert appears, privileged documents may already be copied.

Matter files may already be exfiltrated.

Client trust may already be compromised.


Why are traditional defenses struggling?

Because attackers move faster than detection.

In legal environments, one compromised attorney endpoint can become the pathway to:

  • Document management systems
  • Litigation repositories
  • Shared client folders
  • Time and billing systems
  • Email archives
  • Deal rooms
  • Compliance records

Detecting malicious behavior after execution often means the attacker already touched the data that matters most.

And in law, exposure is often the breach.

Not encryption.

Not ransom.

Exposure.


What is changing in endpoint security for legal organizations?

Forward-looking firms are shifting toward Isolation and Containment.

Instead of waiting for malware to execute and then trying to respond, prevention-first security focuses on:

  • Preventing unauthorized applications before execution
  • Restricting script abuse
  • Limiting credential misuse
  • Containing suspicious processes
  • Preventing lateral movement
  • Protecting privileged legal data
  • Reducing blast radius
  • Preserving operational continuity during active matters

One example is AppGuard, a proven endpoint protection solution with a 10-year track record focused on prevention through Isolation and Containment.

This model aligns closely with how law firms already think about risk.

Protect sensitive assets before exposure happens.


What about ethical obligations and ABA guidance?

Law firm leadership also has professional obligations.

American Bar Association cybersecurity guidance continues to emphasize:

  • Competence in technology risk
  • Reasonable safeguards for client data
  • Vendor oversight
  • Incident response planning
  • Confidentiality preservation

A breach involving privileged materials can quickly become more than an IT event.

It may trigger:

  • Client disclosure obligations
  • Regulatory reporting
  • Insurance notifications
  • Ethics reviews
  • Potential malpractice scrutiny

For leadership teams, cyber resilience is now governance.

Not just technology.


What Should Law Firms Do Next?

Leadership teams should act as if detection will eventually fail.

Practical next steps include:

  • Assume detection alone is not enough
  • Add prevention-focused endpoint layers
  • Reduce endpoint execution freedom
  • Review attorney and staff endpoint privileges
  • Audit third-party vendor access
  • Test failure scenarios during active matters
  • Segment document management systems
  • Protect remote attorneys and hybrid workers
  • Review time and billing platform dependencies
  • Prepare incident response plans for privilege exposure
  • Review cyber liability coverage
  • Validate backup integrity regularly
  • Conduct tabletop exercises involving active litigation scenarios
  • Review access to M&A data rooms and intellectual property repositories

The goal is not simply recovery.

The goal is preventing client exposure in the first place.


Managing partners, firm administrators, and legal leaders who want to better understand how prevention-first security can stop attacks before client data, privileged communications, or firm operations are compromised should talk with CHIPS about how AppGuard can help prevent incidents like this through Isolation and Containment.

Like this article? Please share it with others!

Tony Chiappetta
Post by Tony Chiappetta
May 20, 2026