Jones Day said hackers breached the firm and accessed files tied to 10 clients.
The cybercrime group Silent claimed responsibility and listed Jones Day on its extortion site. The group has built a name around attacks on US law firms, with a focus on stealing sensitive data and pressing victims for payment.
The attack quickly drew wider attention after the cybercrime group Silent claimed responsibility and added Jones Day to its extortion site.
That matters because Silent has built its operation around US law firms, where the value of stolen material runs high. Legal files carry corporate strategy, internal disputes, deal terms, regulatory exposure, and privileged communications. For attackers, it’s a rich target.
Jones Day spokesperson Dave Petrou said an unauthorized third party accessed a limited number of dated files through the phishing incident.
The firm framed the breach as contained, though the statement still leaves open obvious questions around file content, client sensitivity, and how long the intruders had access before detection. Those details were not immediately available.
The affected clients were not named. That gap is likely to keep pressure on the firm until more facts emerge, especially given Jones Day’s client base.
The firm has represented many large US companies, including Goldman Sachs, McDonald’s, and General Motors.
It was also hired in February to defend JPMorgan Chase in litigation brought by President Donald Trump over the closure of his bank accounts in 2021. No public statement tied any of those matters to the breach. Still, the scale and profile of the firm’s work raise the stakes fast.
This is not Jones Day’s first run-in with a data theft incident. Hackers also stole firm data in 2021, which gives the latest breach extra weight. Repeat incidents tend to sharpen scrutiny from clients and regulators, even when a firm says the latest exposure was limited.
Silent’s methods fit a pattern already flagged by US authorities. According to a 2025 FBI alert, the group targets American law firms by exploiting the sensitivity of legal-sector data.
The attackers use phishing campaigns and impersonate legitimate businesses to get victims to download malicious software.
That approach isn’t flashy. It works because law firms sit at the center of deals, disputes, and confidential negotiations, and one wrong click opens the door.
The bigger issue here isn’t only the number of clients affected. It’s the type of institution hit, the sort of data law firms hold, and the fact that a known extortion group says it got in.
Jones Day described the breach as limited. Even so, breaches involving legal files rarely stay narrow in their impact once clients start asking what was taken, what was exposed, and what turns up next.









