Mako Logics

Resources / Law Firm Ransomware Playbook

Law firm ransomware playbook.

Law firms are in the top three targeted industries for ransomware — and the consequences are worse: privileged matter content gets encrypted mid-trial, ethics rules require notification, and clients expect their matters to survive the event. This is the playbook.

Law Firms services →

Published April 21, 2026.

This is a technical playbook. Ethics obligations (ABA Model Rule 1.6, state-bar opinions on cloud and AI) and legal obligations (state breach-notification laws, client contracts) are your firm’s risk counsel’s call — this playbook handles the technical side and flags the triggers that matter for the legal side.

First 60 minutes

Contain

  • Isolate every confirmed-infected endpoint from the network — unplug Ethernet, disable Wi-Fi
  • Do NOT power off — volatile memory may hold encryption keys a forensic team can recover
  • Preserve the ransom note — screenshot, don't click, don't reply
  • Disable compromised user accounts and force sign-out across all tenant sessions
  • Isolate backup systems if they share credentials with production — the #1 attacker move is to destroy backups before encrypting production

Notify

  • Managing Partner and your ethics/risk counsel
  • Your cyber-insurance carrier (most policies require notification within 24-72 hours)
  • Your MSP / incident-response team
  • Named IR contact from your policy's breach-response panel (if applicable)

First 24 hours

Scope

  • Confirm which matters / clients are affected — which files, which mailboxes
  • Determine whether privileged or client-confidential content was exfiltrated (many ransomware groups steal before encrypting)
  • Check for persistence — attackers often maintain access even after the ransomware note
  • Review authentication logs for the 30 days preceding the event

Preserve

  • Forensic preservation of affected systems (disk images, memory captures) before any remediation
  • Preserve email, voicemail, messaging content relevant to affected matters
  • Document the IR timeline in a running log — every decision, every communication, with timestamps
  • Document any litigation-hold implications for affected matters

Communicate

  • Internal-only holding statement to staff — factual, brief, what to do / not do
  • Do not engage publicly or with the attacker without counsel sign-off
  • Court continuances (if applicable) coordinated with matter lead

First week

Recover

  • Restore from verified-clean immutable backup — not a local backup attackers could have touched
  • Rebuild workstations from clean images rather than decrypting / cleaning in place
  • Rotate every privileged credential: domain admin, tenant admin, VPN, practice-management, e-billing
  • Re-issue MFA tokens and reset conditional-access baselines
  • Validate that persistence mechanisms are removed (malicious scheduled tasks, service accounts, OAuth grants)

Notify clients / regulators as required

  • Ethics consultation on client notification — ABA Model Rule 1.6 triggers for some firms / some incidents
  • State breach-notification law triggers (TX: 60 days for SSNs and similar PII; other states vary)
  • Client-contract-specific obligations
  • If any HIPAA-covered client data was affected: HHS 60-day clock is running

Ransom decision

  • Do not pay without sanctions-screening of the wallet / group (OFAC concerns — paying certain groups is a federal violation)
  • Cyber-insurance carrier typically leads or strongly recommends here
  • Most firms restore from backup rather than pay — if you can't, the gap is in your backup strategy, not your decision-making

Post-incident

  • Written post-incident report for leadership, insurance, and your ethics file
  • Lessons-learned session with IR team, MSP, and counsel
  • Gap remediation: closed loops on what enabled the event
  • Updated IR plan incorporating what you learned
  • Tabletop exercise within 6 months to validate changes

What would have made this less bad

  • EDR / MXDR that caught initial access before encryption began
  • Immutable backups with credential separation
  • MFA on every account including service accounts
  • Phishing training + simulation program (most ransomware starts with a click)
  • Documented IR plan with an annual tabletop
  • Cyber insurance with a known IR-panel response partner