Donut Leaks attacks Jacklyn Dawson Solicitors

Incident Date:

July 9, 2023

World map

Overview

Title

Donut Leaks attacks Jacklyn Dawson Solicitors

Victim

Jacklyn Dawson Solicitors

Attacker

Donut

Location

Newport, United Kingdom

, United Kingdom

First Reported

July 9, 2023

Donut Leaks Ransomware Gang Targets Jacklyn Dawson Solicitors

The Donut Leaks ransomware gang has attacked Jacklyn Dawson Solicitors. Jacklyn Dawson Solicitors is a law firm headquartered in Newport, Wales. Donut Leaks posted Jacklyn Dawson Solicitors to its data leak site on May 23rd, claiming to have stolen 400GB of data. Jacklyn Dawson Solicitors has neither confirmed nor denied the incident.

Origins of Donut Leaks

Researchers first identified the Donut Leaks extortion group when an employee of one of the victims revealed that the corporate network had been breached by threat actors seeking to steal data. After successfully pilfering the data, the threat actors proceeded to email the victims' business partners and employees with URLs to their Tor extortion sites.

How Donut Leaks Operates

These Tor sites consist of two components: a shaming blog and a data storage site. Visitors to these sites can freely browse and download all the stolen and leaked data. The stolen data storage server operates using the File Browser application, enabling visitors to navigate through the stolen data categorized by victim. It remains unclear whether the threat actors deploy ransomware during their network breaches or if they solely operate as a data extortion group.

Connections to Other Ransomware Gangs

However, Sheppard Robson, a victim, did disclose that their recent attack involved ransomware. Researchers also believe that Donut Leaks could be an offshoot of the Ragnor Locker and Hive ransomware gangs.

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.