DragonForce Ransomware Strikes Zimmerman & Walsh Law Firm

Incident Date:

September 26, 2024

World map

Overview

Title

DragonForce Ransomware Strikes Zimmerman & Walsh Law Firm

Victim

Zimmerman & Walsh

Attacker

Dragonforce

Location

Rockford, USA

Illinois, USA

First Reported

September 26, 2024

DragonForce Ransomware Group Targets Zimmerman & Walsh, LLP

The ransomware group DragonForce has claimed responsibility for a cyberattack on Zimmerman & Walsh, LLP, a law firm based in Rockford, Illinois. This attack highlights the growing threat of ransomware to small and medium-sized enterprises, particularly those in the legal sector.

Victim Profile: Zimmerman & Walsh, LLP

Zimmerman & Walsh, LLP is a small law firm employing between 2 to 10 individuals. The firm specializes in family law, estate planning, business law, and real estate law. Their client-centered approach and personalized service distinguish them in the Rockford community. However, their small size and lack of Better Business Bureau accreditation may have made them vulnerable to cyber threats. The firm's focus on sensitive legal matters, such as divorce negotiations and estate planning, means they handle a significant amount of confidential client data, making them an attractive target for ransomware groups.

Attack Overview

DragonForce claims to have infiltrated Zimmerman & Walsh's systems, exfiltrating 98.91 GB of sensitive data. The group has threatened to release this data publicly within three days if their ransom demands are not met. This attack underscores the double extortion tactics employed by DragonForce, where they not only encrypt data but also threaten to leak it to increase pressure on victims.

DragonForce Ransomware Group

Emerging in late 2023, DragonForce has quickly gained notoriety for its sophisticated double extortion tactics. The group is believed to have leveraged leaked code from the LockBit ransomware group, allowing them to rapidly develop their own ransomware. DragonForce has targeted various industries across multiple countries, including high-profile victims like the Ohio Lottery and Coca-Cola Singapore. Their use of a dark web leak site, "DragonLeaks," to publish stolen data distinguishes them from other ransomware groups.

Potential Vulnerabilities

While the exact method of infiltration remains unclear, DragonForce may have exploited common vulnerabilities such as outdated software, weak passwords, or insufficient network security measures. The firm's small size could mean limited resources for cybersecurity defenses, making them susceptible to sophisticated attacks. The legal sector's reliance on sensitive data further amplifies the impact of such breaches, as the potential release of confidential information can have severe legal and reputational consequences.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.