Jones Day Phishing Breach Exposes 10 Clients' Files to Silent Ransom Group

Published
Score
6

Why it matters

Jones Day, a prominent U.S. law firm, confirmed on April 6, 2026, that hackers conducted a phishing attack, allowing an unauthorized party to access a limited number of dated files for 10 unnamed clients. The Silent Ransom Group (SRG) claimed responsibility, posting a file directory, screenshots of negotiations demanding $13 million, and leaked data on their dark web site starting March 30, 2026. The firm notified all affected clients and stated the breach was contained, with no indication of further attacks or data publication beyond the initial leak.[2][3][5]

Key individuals targeted include Greg Castanias, a senior Washington-based partner leading the firm's Federal Circuit practice, as SRG's threats referenced him and past Epstein files ties. Involved parties are Jones Day, SRG (a cybercrime group targeting law firms), and affected clients (undisclosed). No agencies or legislation are mentioned in reports.[2][4][5]

The incident follows Jones Day's 2021 breach via Clop ransomware exploiting Accellion file transfer software, amid a pattern of attacks on major law firms. Timeline: Attack likely March 20-28 (negotiation chats); data posted March 30; firm confirmed publicly April 6.[2][3][5]

Newsworthy due to Jones Day's high-profile clients (e.g., Trump campaigns, White House placements), SRG's law firm focus, escalating cyber risks to legal sector handling sensitive data, and failed $13M ransom talks leading to leaks—highlighting persistent vulnerabilities two days after confirmation.[1][2][4][5]

Sources

mail

Get notified about new Privacy developments

Primary sources. No fluff. Straight to your inbox.

See more entries tagged Privacy.