• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech Guide
  • Home Improvement
  • Gadget & Apps
  • News

Hackers targeting large legal firms for insider trading purposes

Updated on Mar 31, 2016 by Guest Authors

Big law firms in Wall Street have become the latest target of hackers in what law enforcement authorities see as an insider trading-related attack.

The data breach affected some of the bigwigs in New York City’s legal circle such as Cravath Swaine & Moore LLP and Weil Gotshal & Manges LLP, whose computer systems were accessed illegally, though there is no conclusive evidence at present that indicates some sensitive pieces of information were used with malicious intent. The only certain thing about the data breach, therefore, is that the networks of these law firms were simply hacked.

hacker

The companies described the breach as limited in its scope, meaning the attack did not affect the entire information technology systems of the law firms. But that does not degrade the level of alarm that the attack creates in the aftermath, especially because these law firms hold sensitive data about business transactions.

It’s a good thing the companies were quick to roll out patches to their computer networks immediately after the discovery of the data breach incidents. Some security experts were of the common opinion that the attacks were meant to steal information in order to aid in insider trading activities.

The Wall Street law firms targeted by the hackers are in possession of different information related to patents pending approval from the U.S. Patent and Trademark Office. Some other law firms specialize in mergers and acquisitions deals. By stealing information from the computer networks of these companies, hackers will be able to manipulate the stock market or take advantage of patent data t to their gains.

Some hackers will engage in identity theft, with a particular focus on c-suite executives whose email addresses are contained in the computer systems of high-profile law firms, as well as financial fraud. It has happened in the past, and there’s no reason why it could not happen now. The rise in cyber attacks that target corporate law firms that deal with patents must serve as a wake-up call for corporate IT security departments to beef up their security posture.

It would help to assume that attackers behind these data breaches are not just keen on stealing email addresses. It could be well beyond that. It is highly recommended for law firms to revamp their security practices, according to some industry experts. In fact, it would help a lot to completely overhaul security protocols in place.

Employees must also be trained, as we keep saying again and again, since humans are the weakest link in the security chain.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Transparent Shaving: The yoose ICE Electric Shaver Review

Makeblock mBot Ranger Review – Learn Scratch Coding with the Robot Kit

LISEN MagSafe CD Phone Holder for Car Review

EPOMAKER CIDOO V65 V2 Wireless Mechanical Keyboard Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Transparent Shaving: The yoose ICE Electric Shaver Review
  • The Hidden Cost of Cryptocurrency: Bitcoin’s Energy and Water Footprint
  • Free Places To Sleep Inside Hong Kong Airport During Long Transits
  • Exploring the WAINLUX K8: A User-Friendly, Fully Enclosed Laser Engraver

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}