FBI Warns Law Firms of Silent Ransom Group's Evolving Vishing Attacks

Published
Score
7

Why it matters

The Silent Ransom Group, a threat actor active since 2022 and tracked under multiple aliases including Luna Moth and UNC3753, has escalated attacks on U.S. law firms through social engineering and callback phishing. The group gains remote access by impersonating IT staff via phone calls, then exfiltrates client data using tools like WinSCP and Rclone before demanding ransom payments with threats of dark web publication. Recent confirmed compromises include Orrick Herrington & Sutcliffe in January 2026 and Jones Day, with stolen data already leaked publicly.

The FBI Cyber Division has issued warnings since spring 2023 documenting the group's evolving tactics. As of March 2025, SRG shifted to direct vishing calls impersonating legitimate IT personnel. By April 2025, the group began conducting in-person visits to target locations to physically insert storage devices for data theft. The group's origin remains unconfirmed, though analysts assess likely Russian affiliation. Law firms remain the primary target, though healthcare and insurance sectors have also been hit.

Law firms should treat this as an active operational threat. The malware-free approach means traditional endpoint detection will miss initial compromise. Immediate steps include enforcing multi-factor authentication across all remote access tools, restricting or eliminating consumer remote desktop software like Zoho Assist and AnyDesk, and conducting security awareness training focused on vishing tactics. Any unauthorized remote access attempts or suspicious in-person requests for device access should be reported immediately to the FBI Cyber Division.

mail

Get notified about new Privacy developments

Primary sources. No fluff. Straight to your inbox.

See more entries tagged Privacy.

Also on LawSnap