Stephen New & Associates Hit by Hunters International Ransomware

Incident Date: Nov 07, 2024

Attack Overview
VICTIM
Stephen New & Associates
INDUSTRY
Law Firms & Legal Services
LOCATION
USA
ATTACKER
FIRST REPORTED
November 7, 2024

Ransomware Attack on Stephen New & Associates: A Detailed Analysis

Stephen New & Associates, a prominent law firm based in Beckley, West Virginia, has recently fallen victim to a ransomware attack orchestrated by the notorious group Hunters International. This incident underscores the growing threat of ransomware attacks on legal firms, which often handle sensitive client data.

About Stephen New & Associates

Founded in 2004 by Stephen P. New, the firm specializes in personal injury and employment law, boasting a strong track record with over $48 million recovered in personal injury cases and $33 million in employment-related cases. The firm is well-regarded for its commitment to justice and community involvement, emphasizing personalized service and local roots. Despite its reliance on sensitive client data, the firm’s legal team makes it a prime target for cybercriminals.

Attack Overview

Hunters International claims to have infiltrated Stephen New & Associates' systems, exfiltrating 158.5 GB of sensitive data. This breach poses significant risks to client confidentiality and the firm’s operational integrity. The attack highlights vulnerabilities in the firm’s cybersecurity framework, which may have been exploited through phishing campaigns or other sophisticated methods employed by the attackers.

About Hunters International

Emerging in October 2023, Hunters International is a Ransomware-as-a-Service group known for its sophisticated double extortion tactics. The group utilizes code from the defunct Hive ransomware, allowing it to execute complex attacks across various industries. Their malware, developed in Rust, targets both Windows and Linux environments, making it highly adaptable and effective.

Penetration Tactics

Hunters International likely gained access to the firm’s systems through phishing emails or exploiting remote services. Their use of the SharpRhino Remote Access Trojan and advanced encryption techniques, such as ChaCha20-poly1305 and RSA OAEP, makes their attacks particularly challenging to defend against. The group’s ability to bypass advanced security measures, as seen in previous attacks, suggests a high level of sophistication.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.