Logo

Epiq Global Ransomware Attack: Incident Report 2020

Learn about the Epiq Global ransomware attack in 2020: what happened, the damage caused, the response, and key takeaways from the incident report.

Incident Details

On February 29, 2020, the legal services giant Epiq Global found itself ensnared in a cyber nightmare as it fell victim to a sophisticated ransomware attack that crippled its operations across 80 global offices. This incident sent shockwaves through the company, which serves high-profile clients including banks and government agencies, forcing them to take their systems offline to contain the escalating threat. Internal communications revealed a sense of urgency and caution, advising employees to avoid their local offices and disconnect devices from the network to prevent further infiltration. As the company grappled with the fallout, whispers of outdated software and unpatched vulnerabilities emerged, painting a picture of a more profound security lapse that had left Epiq vulnerable to this debilitating breach. With the stakes high and reputations on the line, the response was swift, but the implications of this attack would echo far beyond the confines of their digital infrastructure.

Damage Assessment

  • The ransomware attack impacted Epiq Global's entire fleet of computers across 80 global offices.
  • Many systems were running outdated versions of Windows, which contributed to the vulnerability.
  • Affected assets included:
    • Corrupted data across various operational systems.
    • Systems were locked with ransomware, restricting access to critical files.
  • The organization faced significant operational challenges:
    • Inability to access essential legal counsel and administration services.
    • Staff were instructed to avoid office visits and restrict network connections, hampering workflow.
    • Delays in handling customer inquiries due to system lockdowns.
  • Direct financial costs incurred from the incident remain undisclosed, but the disruption to services and potential loss of client trust could lead to substantial long-term financial repercussions.
  • The company’s response included taking systems offline globally and engaging third-party experts, indicating a proactive but costly recovery effort.

How It Happened

The Epiq Global ransomware attack likely occurred due to several critical vulnerabilities within the organization's IT infrastructure. Reports indicate that many computers were running outdated versions of Windows, leaving them susceptible to known exploits and malware. Such outdated systems often lack essential security patches that protect against ransomware attacks.

Additionally, the attack reportedly impacted the entire fleet of computers across 80 global offices, suggesting a lack of segmented network security. This means that once the ransomware infiltrated one device, it could easily spread throughout the network without adequate barriers.

The internal communication advising staff to avoid connecting devices to the network and to disable Wi-Fi indicates a rapid response to contain the threat. However, the presence of unaddressed vulnerabilities and insufficient cybersecurity measures may have facilitated the initial breach. Without timely software updates and rigorous security protocols, Epiq Global's systems became an easy target for cybercriminals, ultimately leading to the widespread disruption caused by the ransomware attack.

Response

Incident Report Section: Initial Response by Epiq Global

Upon identifying the ransomware attack, Epiq Global implemented its comprehensive response plan, which included taking all systems offline globally to contain the threat. This decisive action aimed to prevent further spread of the malware across the organization’s network, which affected its entire fleet of computers in 80 global offices.

Epiq engaged a third-party forensic firm to conduct an independent investigation, ensuring expert analysis of the incident. Internal communications advised staff to refrain from visiting local offices without managerial approval and instructed them to avoid connecting any devices to the network. Additionally, employees were directed to disable Wi-Fi on their laptops before leaving the office premises to mitigate the risk of the ransomware spreading.

The company acknowledged the vulnerability of its systems, with reports indicating that many computers were running outdated versions of Windows. These initial steps were critical in triaging the situation and preventing further damage while the technical team collaborated with external experts to address the incident.

Key Takeaways

Prioritize Data Protection: Legal consultancies handle sensitive client information. Implement robust encryption and access controls to safeguard data from breaches.

Regular Security Assessments: Conduct frequent vulnerability assessments and penetration testing to identify and address weaknesses in your systems.

Employee Training: Invest in ongoing cybersecurity training for all staff. Human error is a significant factor in breaches; educating employees can mitigate risks.

Incident Response Plan: Develop a comprehensive incident response plan. Being prepared can significantly reduce the impact of a ransomware attack.

Backup Strategies: Regularly back up critical data and ensure that backups are stored securely offline. This can provide a way to restore data without paying a ransom.

Third-Party Risk Management: Evaluate the cybersecurity posture of third-party vendors. Ensure they adhere to strict security practices to prevent supply chain vulnerabilities.

Investing in Cybersecurity Services: Engaging cybersecurity experts like HackersHub can provide tailored solutions and proactive measures that help prevent incidents, ensuring your firm’s reputation and client trust remain intact.

Got hacked?

Don't panic. We're here to help.