Epiq Global Legal Services Firm Hit by Ransomware

Ransomware

Ransomware hit legal services company Epiq Group. This attack was verified by the business, which provides legal counsel and administration to banks, credit giants and governments.

“As part of our comprehensive response plan, we immediately took our systems offline globally to contain the threat and began working with a third-party forensic firm to conduct an independent investigation,” Epiq said in a statement.

“Our technical team is working closely with world class third-party experts to address this matter, and bring our systems back online in a secure manner, as quickly as possible,” it added. “Federal law enforcement authorities have also been informed and are involved in the investigation.”

Which Ransomware was used in the attack and how many devices of Epiq were compromised remains unknown.

TechCrunch heard from an Epiq employee that Ransomware affects the entire fleet of machines of the organisation throughout its 80 regional offices. Employees have been advised that they do not have administrative permission in their local offices and that they stop linking computers to the network.

Now, epiq global is offline; the company website consists of a data security segment where the company claims it has a full-time information security team and highly secure, widely dispersed data centres to reduce the risk of data leakage.

Ransomware attack causes a severe problem for large corporations, and many companies have been affected in the past year, including Norwegian Norsk Hydro, Austrian shipping giant Toll, aircraft parts supplier ASCO, Mexican oil company Pemex and Eurofins Scientific testing service provider.

The DHS has recently revealed that a piece of Ransomware has interrupted operations in some of Massachusetts ‘ natural gas plants and that consumers last month have been told that a ransomware attack has disrupted business operations.

Mark Funk
Mark Funk is an experienced information security specialist who works with enterprises to mature and improve their enterprise security programs. Previously, he worked as a security news reporter.