Office

Derwent Point, Clasper Way
Swalwell, Newcastle Upon Tyne
NE16 3BE

Microsoft PartnerCyber Essentials PlusISO 27001CHAS
Case Studies/Protect

Law firm recovers from ransomware attack in under 24 hours

Legal Services|35 users|Crisis response

Systems recovered within 24 hours with zero data loss and zero ransom paid.

On a Friday evening, a 35-person law firm discovered that a ransomware attack had encrypted files across their server, workstations, and network drives. The attackers were demanding a cryptocurrency ransom and threatening to publish stolen client data.

The firm's previous IT provider was unresponsive. Active case files, client communications, legal documents, and financial records were all at risk. With SRA compliance obligations and client confidentiality at stake, they needed help immediately.

Legal Services

Industry

35 users

Company size

Crisis response

Engagement

The challenge

What we were dealing with when we arrived.

Active ransomware attack

Files across the server, workstations, and network drives were encrypted. The attackers were demanding payment in cryptocurrency and had set a deadline for data publication.

Previous provider unresponsive

The firm's existing IT provider could not be reached on a Friday evening. With every hour increasing the risk of data exfiltration, the firm needed immediate expert help.

Critical data at risk

Active case files, client communications, legal documents, and financial records were all encrypted. The firm handles sensitive client matters where confidentiality is paramount.

Regulatory obligations

As an SRA-regulated firm, they had obligations around data protection and client confidentiality. A data breach would require notification to both the regulator and affected clients.

“When we realised what had happened, I thought we were finished. Client data, case files, everything encrypted. Bigfoot had us back up and running before the weekend was over. They have now made sure it can never happen again.”

Senior Partner

Our response

How we contained, assessed, recovered, and verified in under 24 hours.

01

Hour 0 to 2: Containment

We arrived on site within 90 minutes. Immediately isolated all affected systems from the network to prevent further spread. Identified the ransomware strain and assessed which systems were compromised and which remained clean.

02

Hour 2 to 6: Assessment

Traced the entry point to a phishing email clicked by an employee earlier that day. Assessed the full extent of the encryption and discovered that cloud-hosted backups had not been compromised by the attack.

03

Hour 6 to 18: Recovery

Rebuilt the file server from a clean backup taken four hours before the attack began. Restored workstations, rebuilt email access, and recovered the case management system. All data was verified against the backup for integrity.

04

Hour 18 to 24: Verification

Confirmed data integrity across all recovered systems. Verified that no client data had been exfiltrated. Brought the firm fully operational with all staff able to work normally by Saturday evening.

24

Hours to full recovery

0

Data loss

0

Ransom paid

0

Client data exposed

Preventing recurrence

The controls we put in place to make sure this never happens again.

Multi-factor authentication

Enabled for all email and remote access. Even if credentials are compromised through phishing, an attacker cannot access accounts without the second factor.

Endpoint detection and response

Deployed across all devices to detect and automatically contain threats before they can spread. Would have detected and blocked the ransomware before it encrypted any files.

Advanced email security

Implemented advanced email filtering that would have caught the initial phishing email before it reached the employee's inbox. Includes link scanning and attachment sandboxing.

Immutable backups

Configured backups that cannot be deleted or encrypted by an attacker, even if they gain admin access. Ensures recovery is always possible regardless of the attack type.

Security awareness training

Regular phishing simulation and security training for all staff. Building a human firewall so employees can recognise and report suspicious emails before clicking.

24/7 monitoring

Continuous security monitoring across all systems. Threats are detected and responded to around the clock, not just during business hours when IT staff are available.

Want results like these?

Every business starts somewhere. Whether you need incident response, want to strengthen your security, or simply need confidence that you are properly protected, we can help.