Ransomware victim disclosure
← All victimsSaunders & Saunders, LLP
listed as www.saundersandsaunders.com · Claimed by devman · listed 4 months ago
Status timeline
- Listed
Jan 21, 2026
- Data leaked
At a glance
- Group
- devman
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Jan 21, 2026
About the victim
AI dossier — public-source company profileSaunders & Saunders, LLP is a family law firm located in Mattapoisett, Massachusetts, serving Bristol and Plymouth Counties. The firm, led by attorney Sandra G. Saunders, has approximately 30 years of experience in divorce mediation, divorce litigation, child custody, alimony, modification actions, and contempt actions. The practice emphasizes compassionate, client-focused representation for families navigating divorce and related legal proceedings.
- Industry
- Family Law Legal Services
- Address
- 26 County Road, Mattapoisett, MA 02739
Attack summary
Severity: critical — This is a family law firm whose files would contain highly sensitive regulated PII including divorce proceedings, child custody details, financial disclosures, and personal family information for potentially vulnerable clients. Data_published status indicates exfiltration has occurred, making exposure of this sensitive category of data a critical-severity incident.The ransomware group 'devman' claims to have compromised Saunders & Saunders, LLP and the disclosure status is listed as 'data_published,' indicating exfiltration and publication of data. No specific data size or ransom demand was stated, and the group's leak post contains no substantive detail.
Data the group says was taken
AI dossier — extracted from the leak post- Client legal records
- Family law case files
- Personally identifiable information (PII)
- Divorce and custody documentation
- Contact and communication records
Original description
AI-summarised, not from the leak postN/A
Sources
Source
Indexed 4 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
