The INC ransomware group has publicly claimed responsibility for cyberattacks against two law firms in the United States, underscoring the legal sector's vulnerability to extortion. The victims, Hawk Law Group and Eisenberg Lowrance Lundell Lofgren, were both listed on the gang's data leak site. The attackers claim to have exfiltrated a trove of confidential information, including client PII, government-issued IDs, and sensitive details pertaining to active civil and criminal court cases. Such breaches pose a severe threat to attorney-client privilege, the integrity of legal proceedings, and the privacy of the firms' clients.
INC Ransomware is a relatively new but active player in the ransomware scene, known for targeting various sectors, including healthcare and education. Their focus on law firms is logical due to the high value and sensitive nature of the data these firms possess. By stealing and threatening to leak case files and client information, the group can exert immense pressure on the victims to pay a ransom to protect their clients' privacy and their own professional reputation.
INC ransomware's TTPs often involve exploiting common vulnerabilities for initial access. They are known to leverage compromised RDP credentials and have been linked to the exploitation of vulnerabilities in remote access software.
Common TTPs:
.inc extension. It also creates a ransom note named [victim]-readme.txt in each encrypted directory.T1021.001 - Remote Desktop Protocol: A common vector for both initial access and lateral movement.T1486 - Data Encrypted for Impact: The primary goal of the ransomware payload.T1048 - Exfiltration Over Alternative Protocol: Stealing sensitive client data before encryption.T1219 - Remote Access Software: Use of tools like AnyDesk for persistence and C2.The consequences of a ransomware attack on a law firm are particularly severe:
D3-PA - Process Analysis.D3-MFA - Multi-factor Authentication.Enforce MFA on all remote access points (RDP, VPN) to prevent credential-based intrusions.
Mapped D3FEND Techniques:
Restrict RDP access to only authorized users and source IP addresses, and disable it if not needed.
Maintain secure, offline backups to ensure recovery in the event of data encryption.
For law firms, which are high-value targets for groups like INC ransomware, the single most impactful defense is mandating MFA across the entire organization. This must be applied to all remote access solutions (VPN, RDP gateways), email accounts (Office 365, Google Workspace), and any cloud-based case management software. Since compromised credentials are a primary entry vector for ransomware, MFA acts as a critical barrier, preventing attackers from gaining initial access even if they have a valid username and password. Given the sensitive nature of legal data, firms should opt for strong MFA methods like authenticator apps over less secure SMS-based codes.
Law firms should implement application control policies to prevent the execution of unauthorized software. This is particularly relevant for blocking legitimate but abused remote access tools like AnyDesk or Splashtop, which INC ransomware has been known to use for persistence. An executable denylisting or allowlisting policy can be configured to block these applications from running on any system unless explicitly approved for administrative use. This prevents attackers from easily establishing a secondary, stealthy command-and-control channel after gaining initial access, frustrating their attempts to maintain persistence and move laterally within the network.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats