Ransomware victim disclosure
← All victimsJones, Haber & Rollings
listed as Jones Haber Law · Claimed by securotrop · listed 2 months ago
Status timeline
- Listed
Mar 30, 2026
- Data leaked
At a glance
- Group
- securotrop
- Status
- Data leaked
- Country
- United States
- Sector
- Not Found
- Listed on leak site
- Mar 30, 2026
- Data size
- 524 GB
About the victim
AI dossier — public-source company profileJones, Haber & Rollings is a full-service law firm and Florida Limited Liability Partnership founded in 1988 and based in Cape Coral, Florida. The firm operates as a multi-practice legal practice serving clients throughout the entire State of Florida, drawing on over 75 years of combined attorney expertise across diverse legal areas. It operates with a small team of named attorneys and positions itself as a community-focused firm in Southwest Florida.
- Industry
- Legal Services (General Practice Law Firm)
- Address
- 1633 Southeast 47th Terrace, Cape Coral, FL 33904
- Employees
- 1-10
- Founded
- 1988
Attack summary
Severity: critical — 524 GB of data from a law firm almost certainly contains attorney-client privileged communications, PII of clients at scale, financial records, and sensitive case materials — all constituting regulated or highly sensitive data whose exposure poses serious legal and personal harm to clients.The ransomware group Securotrop claims to have exfiltrated 524 GB of data from Jones, Haber & Rollings, with the disclosure status listed as 'data_published.' The leak post itself is minimal, marked 'AWAITING,' suggesting the data may be staged for release or partially published.
Data the group says was taken
AI dossier — extracted from the leak post- Client legal files
- Attorney correspondence
- Case documents
- Personally identifiable information (PII)
- Potentially privileged legal communications
- Financial records
What the group claims
Status: AWAITING Size: 524 GB
Sources
Source
Indexed 2 months agoThis page surfaces a public ransomware disclosure indexed by Darkfield. Original posts come from the operator's own leak site; we cross-check against ransomware.live, RansomLook and RansomWatch where applicable. Share this URL freely.
