Ransomware victim disclosure
← All victimsSherman, Silverstein, Kohl, Rose & Podolsky, P.A.
Claimed by cephalus · listed 9 months ago
Status timeline
- Listed
Aug 26, 2025
- Data leaked
At a glance
- Group
- cephalus
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Aug 26, 2025
- Data size
- 5 GB
About the victim
AI dossier — public-source company profileSherman, Silverstein, Kohl, Rose & Podolsky, P.A. is a multi-practice law firm located in Moorestown, New Jersey. The firm provides legal services across a broad range of practice areas including bankruptcy, family law, estate planning, personal injury, healthcare and insurance law, tax planning, and commercial real estate. It serves clients in the Cherry Hill and broader South Jersey region.
- Industry
- Legal Services – Multi-Practice Law Firm
- Address
- Moorestown, NJ, United States
Attack summary
Severity: critical — A law firm handling family law, healthcare, estate planning, bankruptcy, and personal injury matters almost certainly holds large volumes of regulated PII, privileged client communications, medical records, and financial data. The 5 GB archive has been confirmed published, meaning sensitive client data is actively exposed at scale.The Cephalus ransomware group claims to have exfiltrated approximately 5 GB of data from the firm and has published it as a ZIP archive on their leak site. No ransom amount was stated, and the disclosure status indicates the data has been fully published.
Data the group says was taken
AI dossier — extracted from the leak post- Client legal files
- Case documents
- Personally identifiable information (PII)
- Financial records
- Healthcare and insurance-related legal documents
- Family law case materials
- Estate planning documents
What the group claims
SSKRPLAW DATA LEAK | (5GB+ ZIP)
Sources
- Victim sitesskrplaw.com
- Leak posthttps://darkforums.st/Thread-Document-SSKRPLAW-DATA-LEAK-5GB-ZIP
Source
Indexed 9 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
