The wires that disappear from law firms almost never disappear because of malware. They disappear because someone replied to a live closing thread on a Friday morning with new bank details, the paralegal moved the money, and nobody picked up the phone.
Once you have seen the pattern run, you stop arguing about whether it can happen at your firm and start asking what is in place to catch it.
The pattern, in plain terms
There are four mailboxes in any closing or settlement: buyer, seller, agent or lender, and the law firm. The attacker only needs one. They get inside, read the thread, and wait.
They are watching for two things — a closing date and a wire-instructions email. When those land, they have everything they need. They reply to the live thread from inside a real mailbox, against the real matter, same signature, same tone.
"Quick note — our bank is finalizing changes on the old account. For Friday's wire, please use the updated instructions below."
The wire goes. The escrow officer has no reason to suspect anything — real address, real thread, right amount. Nothing looks wrong until the real lender calls Monday. By then the money has been pulled out the back of a receiving bank, layered through downstream accounts, and is on its way out of US jurisdiction.
Why law firms are especially exposed
A law firm is the relay point in money movement almost nobody else sits at — closing escrow, settlement payouts, IOLTA disbursements, estate distributions. Any time a firm sits between two parties moving meaningful money, the firm is the target. Even when the firm's own email is clean, it is still the wire-instruction relay point — which is exactly where the attacker wants to inject.
That structural exposure is why this attack keeps producing six- and seven-figure losses at firms that thought they were too small to be interesting. The number of attorneys does not matter. The dollar amount on a single closing does.
A composite incident
This is a composite — not one specific firm — but every beat has happened at real closing-focused practices over the last two years.
Tuesday. A paralegal at a small real estate firm receives what looks like an Adobe Sign request from a title company the firm closes with every week. The link asks her to authenticate with Microsoft 365. She enters credentials, approves the Authenticator prompt, a generic viewer loads, and she moves on.
She entered credentials on a proxy. An adversary-in-the-middle kit forwarded the password to the real Microsoft login, captured the MFA prompt, forwarded that, and captured the post-authentication session cookie.
Wednesday. The attacker logs in from another country using the stolen cookie. Because the cookie is post-MFA, Microsoft treats them as fully authenticated — no second prompt, no alert. They create an inbox rule that is the real fingerprint of this attack:
- Any message containing "wire", "ACH", "closing", "escrow", or "settlement"
- Forward externally to an attacker-controlled address
- Mark as read and move to RSS Subscriptions or a rarely-used folder
The paralegal never sees the incoming lender wire instructions or the title company replies. The attacker does.
Thursday. The attacker watches a $1.2M residential closing thread come together. The lender sends formal wire instructions. The rule routes a copy to the attacker and hides the original. The attacker now has the closing date, the dollar amount, the lender's wording, and the escrow flow.
Friday, 9 a.m. The attacker, posing as the lender on a reply to the live thread, sends "updated" wire instructions to the firm's escrow officer — in the existing chain, under the real subject line, with the lender's signature block.
Friday, 11 a.m. The escrow officer initiates the wire. $1.2M moves.
Monday. The real lender calls about the unfunded closing. The escrow officer pulls up the thread, reads the "updated instructions" message, and the floor falls out.
Why MFA didn't save anyone
MFA is necessary, but the version most firms have — a push notification or a six-digit code — does not stop adversary-in-the-middle.
Public AiTM phishing kits like EvilProxy, Tycoon, NakedPages, and Mamba 2FA have been widely documented across 2024 and 2025. They are sold as subscription services. They proxy the real Microsoft login and capture the session cookie Microsoft issues after MFA is satisfied. Once that cookie is replayed, the tenant cannot tell the attacker apart from the paralegal whose credentials they stole.
The factors that resist this cleanly are phishing-resistant — FIDO2 security keys, Windows Hello for Business, or certificate-based authentication. Most small firms are not there yet. Treat MFA as one layer and add at least one more.
The technical controls that actually catch this
This is where managed identity threat detection earns its keep. The signal pattern is loud if anyone is watching:
- A sign-in from a country the paralegal has never traveled to, minutes after a successful US-based sign-in (impossible travel).
- A session token used from an IP that does not match the original device fingerprint (token replay).
- A new mailbox rule hiding messages with "wire", "closing", "escrow", or "ACH" — the single most specific BEC indicator in Microsoft 365.
- An OAuth consent grant to a third-party app the firm has never used, often right after the "Adobe Sign" interaction.
Managed ITDR — the Huntress identity product we deploy for law firm clients — catches all four in minutes. The mailbox-rule anomaly is among the highest-confidence detections in identity security, because real users almost never create rules that hide closing or wire keywords from themselves.
The process controls that catch it when the tech doesn't
Every closing-wire-fraud case I have walked through could have been stopped by a phone call. Not a tool. A phone call.
The controls worth more than any technical layer:
- Out-of-band callback verification, no exceptions. Any change in wire instructions — bank, ACH, account number, routing tweak — requires a phone call to the other party on a number from the engagement letter or onboarding record. Not the number in the email signature. Attackers can edit signatures. They cannot edit the number you had on file before this matter opened.
- Dual approval over a threshold. Wires above $10,000 for small firms, $25,000 for larger ones, should require a second person to sign off. The escrow officer initiates, a partner or office manager approves.
- Wire-instruction master-data change protocol. Any new bank account on a matter file requires a second person to verify before it is saved.
- A documented wire procedure, trained to every paralegal and escrow officer. Not a memo — a real procedure with examples of the impersonation pattern, refreshed annually with a tabletop.
- Phishing simulation focused on payment-redirect themes for the people who actually move money. Generic monthly phishing tests do not move the needle. Themed simulations do. That is what Managed SAT is for.
If you implement only the callback rule, you eliminate most of the realistic loss path.
The first four hours after you realize
The next four hours decide how much money you get back and how clean the breach response is.
- Call the bank immediately. Ask for the wire to be recalled and ask them to initiate the Financial Fraud Kill Chain. Domestic wires meeting FFKC criteria can sometimes be clawed back if the request reaches the receiving bank before funds are layered out. IC3 expanded FFKC coverage in 2024-2025 to higher thresholds — do not assume your wire is too large to qualify.
- File at IC3.gov the same day. IC3 is the FBI's front door for BEC and the entry point for FFKC. File even when you are not sure of every detail.
- Notify your cyber insurance carrier. Most policies require notification within 24 to 72 hours. See cyber insurance readiness for what carriers expect.
- Preserve the email evidence — do not delete the malicious inbox rule. Forensics needs the mailbox rule, sign-in logs, audit trail, and OAuth consents before anything is reset. Tell IT explicitly: do not "clean up" the mailbox.
- Force a password reset and revoke all sessions on the compromised mailbox. In Microsoft 365, that is a password change plus "Sign out of all sessions." The sign-out is what kills the stolen session cookie.
- Review the Microsoft 365 audit log. What else did the attacker access — other matters, IOLTA records, shared folders? This is where the ethical and trust-accounting picture starts to form.
- Consult outside ethics counsel. Formal Opinion 483 duties should be assessed by someone not also managing the wire recovery.
A compromised law firm mailbox is almost never just a closing thread. It holds correspondence on other matters, draft documents, client strategy, settlement positions, and anything else the attorney has emailed over the last few years.
If an attacker had access to that mailbox, Formal Opinion 483 imposes a notification duty to the current clients whose information was reasonably likely to have been affected. Wire fraud is the trigger event; client notification flows from there. A defensible analysis requires the audit log evidence — exactly what a rushed "cleanup" reflex destroys in the first hour.
Two insurance buckets, not one
A wire-fraud loss typically pulls from two parts of the insurance stack at once:
- The crime rider or social engineering fraud sublimit pays the actual wire loss. This sublimit is commonly $25,000 to $250,000 — far below the headline cyber limit. Know the number on your renewal before you need it.
- The cyber policy pays forensics, the mailbox investigation, breach counsel, notification costs, and privilege-aware review of what was accessed.
Both should be triggered. Firms sometimes notify one carrier and leave coverage on the table, or notify late and lose it entirely. Call the broker the same day and let them coordinate.
The IOLTA dimension
If the wire moved trust funds, the disciplinary exposure runs alongside the cyber loss. State bars have effectively zero tolerance for IOLTA failures, even unintentional ones. Reconciliation records, the audit trail of who touched the trust ledger, and the bookkeeping treatment of the loss are all about to be examined.
Bar reporting varies by state. The safer posture is to assume reporting is required and involve trust accounting counsel within the first day. Restoring trust account integrity — often by the firm advancing funds while recovery is pursued — is the immediate fiduciary question.
The lesson firms walk away with
The partners who have lived through this say the same thing afterward: it was not really a technical failure. It was a process failure compounded by a credential-theft event. Both ends needed fixing.
The credential theft is what MDR and ITDR are for — Managed Detection and Response on endpoints, Managed ITDR on Microsoft 365 identities. Those catch the AiTM signature, the foreign sign-in, the mailbox rule, and the token replay before the wire goes. The process failure is what the callback policy, dual-approval rule, and Managed SAT program are for. Those catch the wire even when the credential theft slips through.
Where Obsidian Ridge fits
We deploy Huntress Managed ITDR — Protected and Complete tiers — for law firms because the inbox-rule and foreign-sign-in detections are the highest-leverage controls against this attack. A hidden "wire/closing/escrow" forwarding rule fires a detection within minutes — hours or days before the fraudulent wire would otherwise be initiated.
We pair it with Managed SAT focused on payment-redirect and Adobe Sign lure scenarios, and a short tabletop on the callback policy so that when the moment comes, nobody is making it up in real time.
If you are not sure where your firm stands on the controls above, that is the conversation to have before a Friday morning arrives with a seven-figure closing.
Talk to us about Managed ITDR for your firm or review your cyber insurance readiness before renewal.
Last updated: May 14, 2026.