clop attacks ZISSERFAMILYLAW

Incident Date:

March 28, 2022

World map

Overview

Title

clop attacks ZISSERFAMILYLAW

Victim

ZISSERFAMILYLAW

Attacker

Clop

Location

Jacksonville, USA

Florida, USA

First Reported

March 28, 2022

Zisser Family Law Firm Targeted by Ransomware Group Clop

Company Overview

Zisser Family Law, a law firm based in Jacksonville, Florida, has over 40 years of experience in family law. Known for their high standards and personalized representation, they offer both traditional and collaborative legal processes to cater to a diverse clientele. The firm's expertise spans various aspects of family law, including divorce, child custody, asset distribution, and paternity disputes.

Vulnerabilities and Targeting

The specific vulnerabilities exploited in the ransomware attack on Zisser Family Law remain undisclosed. Ransomware attacks typically leverage software vulnerabilities, outdated systems, or human error. Law firms, with their reservoirs of sensitive personal and financial information, have become prime targets for cybercriminals seeking to commit identity theft or extortion.

Impact and Response

The exact impact of the ransomware attack on Zisser Family Law has not been made public. Ransomware attacks generally encrypt the victim's data, demanding a ransom for its release. Attackers may also threaten to publish stolen data if their demands are not met. The firm's response strategy would be contingent on the specific nature of the attack and the resources at their disposal. Best practices suggest having a disaster recovery plan, including regular data backups and a methodology for data restoration. Engaging with cybersecurity professionals to address the attack and bolster defenses against future threats is also advisable.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.