The REvil ransomware operators add another breach to their list. In this instance, they struck Patten & Prentice Patten and downloaded their sensitive and highly confidential documents from the company’s database.
The Pattern and Prentice Solicitors was being established in the year 1872. Since the opening of their business, they have established a record of delivery. They are a Greenock based firm of solicitors providing advice to clients across Scotland and beyond. Over 140 years of experience tells us that legal advice delivered properly adds value to our clients. They are certified to give legal advice for various cases such as Property, Court, Tax, Commercial, Family, and many more.
The ransomware operators have posted a list of files highly sensitive and confidential files and data of the company. As per the Cyble Research Team, these files include the financial data and legal documents such as cash statements, user’s HFC claims account details, Letterheads, legal forms, many more.
Below is the snapshot of list of files and data being leaked by the REvil ransomware operators-:

Snapshot of list of files being leaked

Snapshot of list of files being leaked

Snapshot of a Legal Court Document
About Cyble:
Cyble Inc.’s mission is to provide organizations with a real-time view of their supply chain cyber threats and risks. Their SaaS-based solution powered by machine learning and human analysis provides organizations’ insights to cyber threats introduced by suppliers and enables them to respond to them faster and more efficiently.
Cyble strives to be a reliable partner/facilitator to its clients allowing them with unprecedented security scoring of suppliers through cyber intelligence sourced from open and closed channels such as OSINT, the dark web and deep web monitoring and passive scanning of internet presence. Furthermore, the intelligence clubbed with machine learning capabilities fused with human analysis also allows clients to gain real-time cyber threat intel and help build better and stronger resilience to cyber breaches and hacks. Due to the nature of the collected data, the company also offer threat intelligence capabilities out-of-box to their subscribers.