Ransomware victim disclosure
← All victimsSiegel Lewitter Malkani
Claimed by pear · listed 1 month ago
Status timeline
- Listed
Apr 9, 2026
- Data leaked
At a glance
- Group
- pear
- Status
- Data leaked
- Country
- US
- Sector
- Business Services
- Listed on leak site
- Apr 9, 2026
About the victim
AI dossier — public-source company profileSiegel LeWitter Malkani is a plaintiffs-side employment and labor law firm headquartered in Oakland, California, where it has operated since 1998. The firm represents employees and labor organizations in individual and class action employment litigation, including wrongful termination, discrimination, harassment, and wage-and-hour cases. It has three named partners and three associates, and has been recognized as one of the top ten plaintiffs-side employment law practices in the San Francisco Bay Area.
- Industry
- Employment & Labor Law
- Address
- Oakland, California, USA
- Employees
- 11-50
Attack summary
Severity: critical — This is an employment law firm whose files almost certainly contain sensitive PII, attorney-client privileged communications, confidential employee records, and potentially medical and financial information pertaining to hundreds or thousands of clients. Data has been published (confirmed exfiltration), making exposure of regulated and highly sensitive personal data at scale highly probable.The ransomware group 'pear' claims to have attacked Siegel LeWitter Malkani, with the disclosure status indicating data has been published. No ransom amount or specific data volume was stated in the leak post.
Data the group says was taken
AI dossier — extracted from the leak post- Client legal files
- Employee personal information
- Case records and litigation documents
- Attorney-client communications
- Financial records
What the group claims
A highly respected law firm in the San Francisco Bay Area, specializing in employment law
Sources
Source
Indexed 1 month agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
