clop attacks Dutton Daniels Hines Kalkhoff Cook & Swanson

Incident Date:

March 2, 2022

World map

Overview

Title

clop attacks Dutton Daniels Hines Kalkhoff Cook & Swanson

Victim

Dutton Daniels Hines Kalkhoff Cook & Swanson

Attacker

Clop

Location

Waterloo, USA

Lowa, USA

First Reported

March 2, 2022

Dutton Daniels Hines Kalkhoff Cook & Swanson Targeted by Clop Ransomware Group

The Clop ransomware group has claimed responsibility for an attack on Dutton Daniels Hines Kalkhoff Cook & Swanson, a law firm based in Waterloo, Iowa. The firm operates in the Law Firms & Legal Services sector and has been providing legal services since 1918.

Company Size and Industry Standout

Dutton Daniels Hines Kalkhoff Cook & Swanson is a full-service law firm with a team of experienced attorneys handling various practice areas, including personal injury, financial advisor fraud, and estate disputes. The firm has a strong reputation for representing clients in complex legal matters and has a track record of successful outcomes.

Vulnerabilities and Targeting

The ransomware attack on Dutton Daniels Hines Kalkhoff Cook & Swanson highlights the increasing threat of cyber attacks on law firms. These attacks often target the troves of sensitive information that law firms collect on clients, as well as the small IT staff sizes employed by most firms. The specific vulnerabilities leading to the attack on Dutton Daniels Hines Kalkhoff Cook & Swanson are not publicly disclosed, but the incident serves as a reminder for law firms to prioritize cybersecurity measures to protect their clients' data and maintain their reputation.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.