The Top User-Driven Cyber Threats Targeting Law Firms
Law firms sit on some of the most sensitive and valuable data in the enterprise, and attackers have built an entire playbook around exploiting the users who handle it. Learn how four dominant threat vectors are targeting legal sector workflows in 2026 and what it takes to stop attacks at the User Layer.


Law firms have become among the most prized targets for cybercriminals, and the reason has little to do with technical vulnerabilities. Attorneys and staff hold corporate trade secrets, unreleased M&A intelligence, intellectual property, and private client records – a combination of data that commands exceptional value on criminal markets. Attackers have recognized that the fastest path into a law firm is not through its perimeter defenses; it is through the users who manage, share, and act on that data every day.
Trusted with some of the most sensitive data imaginable, it is no surprise that 36% of law firms reported experiencing a security incident in 2024 and the FBI has issued active warnings about organized threat groups specifically targeting the sector. The average cost of a law firm data breach has reached $5.08 million, and the consequences extend well beyond the financial loss.
High-profile incidents demonstrate what a single User Layer failure can trigger inside firm environments. The Grubman Shire Meiselas & Sacks breach triggered a $42 million ransom demand after attackers accessed celebrity contracts and NDAs. The Orrick, Herrington & Sutcliffe compromise exposed the personal information of over 630,000 individuals and resulted in an $8 million settlement. The Gunster Yoakley & Stewart breach allowed attackers to move undetected through the firm's document management system for weeks, ultimately compromising the personal information of 746,000 individuals and resulting in an $8.5 million settlement.
Law firms operate on trust, and that trust has become the primary attack surface. Social engineering attacks, which exploit human behavior rather than technical weaknesses, are the dominant threat vector facing the legal industry today – and the four vectors below highlight where that risk is most concentrated in 2026.

How Attackers Target Law Firm Users
Legal professionals face a distinct set of user-driven threats that exploit the industry’s core dynamics: high-trust client relationships, time-sensitive financial workflows, and a concentration of privileged data that carries far-reaching consequences when exposed. The four vectors below represent the leading attack types targeting law firms today.
Business Email Compromise and Wire Fraud
Business email compromise (BEC) is a cyberattack in which an attacker impersonates a trusted party, such as a client, managing partner, or transaction counterparty, via email to fraudulently redirect payments or extract sensitive information. Attackers typically gain visibility into a firm's email environment through credential theft, dark web markets, or OSINT reconnaissance, then monitor internal communications to identify high-value financial events – retainer payments, settlement disbursements, M&A closings, or escrow releases – before sending fraudulent payment instructions. In account takeover cases, attackers lurk inside compromised inboxes for weeks, familiarizing themselves with vendor relationships, payment processes, and key personnel before acting.
Law firms are structurally ideal BEC targets. They concentrate high-value financial activity inside authorization workflows driven almost entirely by email, and attorneys and paralegals routinely act on last-minute instructions under time pressure – court deadlines, closing dates, client urgency – with little opportunity for independent verification. The FBI's IC3 has documented over $55 billion in global exposed BEC losses over the last decade, including nearly $2.8 billion in 2024 alone. For law firms, where a single fraudulent wire can trigger fiduciary liability and bar disciplinary action on top of the financial loss, the stakes go far beyond the dollar amount.
Spear Phishing and Document Workflow Exploitation
Phishing remains the single most common entry point for cyberattacks against law firms, but the threat has evolved well beyond generic credential harvesting. Inside Access, Dune’s 2025 Insider Threat Intelligence Report found that AI-personalized phishing emails drive three times more user interaction than traditional, templated variants, and in the legal sector, that personalization is devastatingly effective. Using the same OSINT and reconnaissance techniques described above, adversaries craft messages impersonating clients, opposing counsel, court officials, or e-discovery platforms with enough contextual accuracy to bypass scrutiny. A paralegal receiving what appears to be a document review request from a known client, or an associate clicking a link appearing to originate from a court filing system, is acting within entirely normal professional routines. That is precisely what makes the attack effective.
The document-centric nature of legal work creates a heightened phishing surface that does not exist in most other industries. Law firms exchange contracts, NDAs, court filings, due diligence packages, and settlement agreements at high volume, often with external parties not subject to the firm’s own security controls. Attackers exploit this by inserting malicious documents into review workflows, spoofing e-discovery platforms, and embedding credential harvesting links inside routine signature requests. The FBI has also warned of active fake prospective client schemes targeting law firm intake teams with fraudulent engagement documents that appear legitimate until credentials are compromised.
GootLoader, a malware delivery framework that has been actively targeting legal professionals since 2020 and continues to evolve through 2026, has seeded malicious content linked to 3.5 million search terms – a high percentage of which are legal terms. Document exploitation here requires no email, no phone call, and no direct contact whatsoever. An attorney or paralegal searching for a specific contract template or legal filing may find a GootLoader-infected file sitting at the top of their search results, indistinguishable from a legitimate source, exploiting only the reasonable assumption that a top search result can be trusted.

Vishing and AI-Powered Voice Impersonation
Voice phishing (vishing) attacks surged 442% in 2025 as AI voice cloning lowered the barrier to high-quality impersonation, with global losses from deepfake-enabled voice fraud exceeding $200 million in the first quarter of 2025 alone. Law firms are particularly susceptible: attorney names, titles, client relationships, and even communication styles are often publicly accessible through firm websites, LinkedIn, and court records, giving attackers everything they need to build a credible pretext before making a single call.
Luna Moth, also tracked as Silent Ransom Group, is among the most active threat groups targeting the legal sector through this vector. In March 2025, the FBI's Cyber Division issued a warning to U.S. law firms about a targeted campaign in which the group evolved from callback phishing to direct vishing calls, impersonating IT personnel to convince employees to establish remote access sessions under the pretext of a fabricated technical issue. Between April 2024 and April 2025, the legal sector accounted for more than 40% of Luna Moth documented victims, with ransom demands ranging from $1 million to $8 million per incident. Once access is granted, the group exfiltrates data silently using legitimate tools like WinSCP and Rclone, rarely triggering security alerts.
Broader vishing campaigns extend well beyond Luna Moth, with AI-generated voice calls impersonating judges, opposing counsel, regulatory bodies, and senior firm leadership becoming an increasingly documented threat across the legal sector. As the cost of a convincing impersonation approaches zero, vishing will only become more frequent and harder to distinguish from legitimate contact. For law firms, where a single call can authorize a wire transfer or expose privileged case strategy, the consequences of a moment's misplaced trust are exceptionally high.
Insider Threats and Lateral Data Exfiltration
Malicious insider attacks are the most expensive breach type to remediate across industries, averaging $4.92 million per incident. Negligent insiders who misconfigure cloud repositories, forward privileged documents to personal accounts, or approve access without verification do not intend harm – but the legal consequences of their decisions are the same. High attrition, lateral movement across systems, and fluid client portability all create persistent data exfiltration risk for the legal industry that legacy tools cannot address.
Once internal access is exploited – whether through malicious intent, negligence, or a compromised credential – lateral movement expands across case management systems, shared drives, and client portals, compounding the scope of exposure well beyond the initial point of compromise. The Proskauer Rose cloud misconfiguration incident, in which 184,000 privileged client files were accessible via a public URL for six months without detection, reflects how consequential routine access and workflow decisions can be when made without security awareness. In a law firm context, that data is not just sensitive; it is legally protected, subject to bar association obligations, and deeply consequential to ongoing litigation or deal processes if compromised.

Building Resilient Defenses for the Modern Law Firm
The legal sector’s threat landscape has fundamentally changed, and the defense model has to change with it. Annual courses and periodic phishing simulations do not address BEC attacks engineered around the firm’s own wire approval workflows, AI-generated impersonation of known clients, active FBI-warned vishing campaigns, or the behavioral signals that precede insider-driven data exfiltration. A firm whose security posture relies on annual training for a workforce that changes continuously through lateral hires, departures, and secondments is not managing user risk. It is checking compliance boxes.
Every user inside a law firm carries a different risk profile. A first-year associate processing routine correspondence, a senior partner approving client fund transfers, a billing coordinator managing vendor invoices, and an IT administrator with elevated system access are not the same target, and cannot be given the same risk remediation pathways. The real attack surface has always been the User Layer: the judgment calls made under pressure, the approvals given to external parties, the access held by someone who submitted their resignation last week. As AI expands both the attack surface and the sophistication of threats, static defenses are not just insufficient – they are obsolete.
Dune Security stops social engineering and insider threat across every channel. Our platform calculates a dynamic risk score for every human and agentic user based on role, behavior, and exposure across five core pillars: business impact, agentic attack simulations, training activity, external security integrations, and historical risk data. Legal security and compliance teams use that score to focus effort on the people who actually drive risk, while targeted interventions protect attorneys, paralegals, and staff without adding friction. High-risk users face escalations including increased User Adaptive Training, access restrictions, and dynamic enforcement. The old playbook is irrelevant. Dune is what’s next for law firm defense.
Key Takeaways
Featured Speakers
Never Miss a Human Risk Insights
Subscribe to the Dune Risk Brief - weekly trends, threat models,and strategies for enterprise CISOs.
FAQs
Complete the form below to get started.
The leading threats targeting law firms include business email compromise (BEC) and wire fraud, spear phishing and document workflow exploitation, AI-powered vishing and voice impersonation, and insider-driven data exfiltration. All four exploit the legal industry’s core dynamics: high-trust client relationships, time-sensitive financial workflows, and the concentration of privileged data that makes a single lapse exceptionally costly.
Law firms are structurally ideal BEC targets because they routinely process large wire transfers on behalf of clients, with authorization workflows driven almost entirely by email. Attackers typically gain access through credential theft or OSINT reconnaissance, monitor compromised inboxes for weeks to map financial workflows and key personnel, then send fraudulent wire instructions timed to high-value events like M&A closings, settlement disbursements, or escrow releases. The FBI Internet Crime Complaint Center reported nearly $2.8 billion in BEC losses in 2024, with law firms highly exposed given the volume of high-value transactions attorneys process on behalf of clients. When a fraudulent instruction succeeds, the consequences extend beyond the financial loss: a single approved wire fraud can trigger fiduciary liability, malpractice claims, and bar disciplinary action.
Luna Moth, also tracked as Silent Ransom Group, is an organized threat group that the FBI has specifically warned U.S. law firms about. The group evolved from callback phishing campaigns – in which attackers posed as IT support to convince employees to install remote access tools – to direct AI-assisted vishing calls impersonating IT personnel. Between April 2024 and April 2025, the legal sector accounted for more than 40% of Luna Moth’s documented victims, with ransom demands ranging from $1 million to $8 million per incident. Once access is established, the group exfiltrates data silently using legitimate tools like WinSCP and Rclone, rarely triggering security alerts, meaning the attack surface is entirely the user’s judgment under pressure.
AI has removed the quality ceiling that once constrained social engineering at scale. AI-generated phishing emails now replicate managing partner tone, reference active matters by name, and mirror established client communication styles, removing the linguistic signals that even trained users historically relied on to flag suspicious messages. Voice cloning enables convincing audio impersonation from seconds of publicly available audio, a particular risk in an industry where attorney names, communication styles, and professional relationships are extensively documented in public court records and firm websites. Dune’s 2025 Insider Threat Intelligence Report found that AI-personalized phishing emails drive three times more user interaction than templated variants. As generation quality continues to improve, the gap between a legitimate communication and a synthetic one will continue to narrow, making behavioral visibility at the User Layer the only reliable early warning.
Dune stops social engineering and insider threat across every channel by treating user risk the way a bank treats credit: calculating a dynamic risk score for every attorney, paralegal, and staff member based on five pillars: business impact, agentic attack simulations, training activity, external security integrations, and historical risk data. Instead of chasing vanity metrics like completion rates, that score drives real decisions. Security teams use it to focus effort on the users who actually drive risk. Leaders see it in automated executive reporting. And employees experience targeted interventions that protect them without adding friction. In a law firm environment, that means the senior partner approving a wire transfer, the associate clicking a document request, and the IT administrator with elevated access are each scored and protected differently, all in real-time.




The Top User-Driven Cyber Threats Targeting Law Firms
Law firms sit on some of the most sensitive and valuable data in the enterprise, and attackers have built an entire playbook around exploiting the users who handle it. Learn how four dominant threat vectors are targeting legal sector workflows in 2026 and what it takes to stop attacks at the User Layer.




The Workforce Has Expanded: How Attackers Are Targeting Enterprise AI Agents
AI agents are being deployed across the enterprise at scale, and attackers have already started engineering against them. Learn how agentic AI expands the enterprise attack surface in ways legacy security programs were never designed to defend.
.avif)
.avif)


Making Cyber Risk Board Ready: Strategies for Winning Boardroom Confidence
Winning board confidence on cyber risk requires more than technical reporting. Security leaders need to support better governance decisions and communicate exposure in a way directors can act on.
