WannaCry Scenario: Morrison & Associates Case Crisis

Morrison & Associates Law Firm: 150 attorneys across 3 offices, specialized litigation
Worm • WannaCry
STAKES
Client case files + Attorney-client privilege + Court deadline compliance
HOOK
Morrison & Associates is 72 hours from filing critical motions in their biggest class-action lawsuit ever, representing 10,000 plaintiffs against a major corporation. The legal team has been working around the clock to meet court deadlines when ransomware begins encrypting case files, depositions, and expert witness reports that cannot be recreated before the filing deadline.
PRESSURE
Court filing deadline Monday 5 PM - missing deadline dismisses $500M class-action case
FRONT • 120 minutes • Advanced
Morrison & Associates Law Firm: 150 attorneys across 3 offices, specialized litigation
Worm • WannaCry
NPCs
  • Patricia Morrison (Managing Partner): Leading $500M class-action case with Monday filing deadline, watching years of legal work encrypt in real-time, must balance case preservation with security response
  • James Liu (IT Director): Discovering that law firm's case management systems lack proper network segmentation, watching worm spread through client files and legal databases
  • Dr. Sarah Kim (Expert Witness): Critical economic analysis stored on law firm servers, report needed for Monday filing cannot be reconstructed in time, represents years of specialized research
  • Michael Rodriguez (Opposing Counsel): Will argue for case dismissal if filing deadline is missed, represents corporate defendant with billions at stake
SECRETS
  • Law firm delayed security updates on case management systems to avoid disrupting ongoing litigation
  • Client files, depositions, and expert reports stored on interconnected systems without proper access controls
  • Network designed for attorney convenience with minimal security segmentation between practice areas

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

WannaCry Law Firm Case Crisis Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

WannaCry Law Firm Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Opening Presentation

“It’s Friday morning at Morrison & Associates, and the law firm is in the final sprint toward Monday’s critical court filing deadline. The $500M class-action case represents two years of work by 20 attorneys, and the case management systems contain irreplaceable depositions, expert witness reports, and legal research. But since Thursday evening, computers throughout the firm have been displaying ransom messages, and critical case files are being encrypted faster than they can be backed up. In the legal profession, missing a court deadline can mean losing a case entirely.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Case management systems displaying ransom demands instead of legal documents”
  • “Attorney workstations losing access to client files and litigation materials”
  • “Document servers encrypting depositions and expert witness reports”
  • “New systems failing across different practice areas and client matters”

Key Discovery Paths:

Detective Investigation Leads:

  • Network forensics reveal worm spreading through document management and case file systems
  • File analysis shows systematic encryption of legal documents, depositions, and client communications
  • Timeline analysis reveals attack began during late-night document preparation for Monday deadline

Protector System Analysis:

  • Real-time monitoring shows ransomware spreading through attorney work files and client databases
  • System integrity analysis reveals potential compromise of attorney-client privileged communications
  • Network architecture assessment shows inadequate segmentation between client matters and practice areas

Tracker Network Investigation:

  • Traffic analysis reveals worm exploiting shared network infrastructure across law firm offices
  • Propagation patterns show movement toward email servers containing client communications
  • Network scanning shows potential spread to cloud-based legal research and e-filing systems

Communicator Stakeholder Interviews:

  • Attorneys report loss of access to critical case documents needed for Monday filing
  • IT staff explain security update delays due to concerns about disrupting ongoing litigation
  • Expert witnesses describe irreplaceable research data stored on compromised systems

Mid-Scenario Pressure Points:

  • Hour 1: Senior associate reports inability to access key depositions needed for motion drafting
  • Hour 2: Expert witness calls reporting economic analysis files are inaccessible
  • Hour 3: Opposing counsel files motion requesting dismissal due to “plaintiff preparation failures”
  • Hour 4: Court clerk confirms no extensions available - Monday 5 PM deadline is absolute

Evolution Triggers:

  • If document recovery fails, two years of legal work becomes inaccessible before deadline
  • If network isolation affects e-filing systems, court submissions cannot be completed
  • If attorney-client communications are compromised, ethical violations and malpractice claims arise

Resolution Pathways:

Technical Success Indicators:

  • Team implements emergency document recovery protecting critical case files
  • Worm containment prevents spread to email servers and attorney-client communications
  • Network segmentation preserves legal research and court filing capabilities

Business Success Indicators:

  • Critical case documents recovered enabling Monday court filing deadline compliance
  • Attorney-client privilege maintained throughout cybersecurity incident response
  • Law firm operations continue without malpractice exposure or ethical violations

Learning Success Indicators:

  • Team understands worm propagation through professional service networks and shared file systems
  • Participants recognize unique cybersecurity challenges in legal profession and privileged communications
  • Group demonstrates coordination between IT security, legal operations, and professional compliance

Common IM Facilitation Challenges:

If Attorney-Client Privilege Is Ignored:

“While you’re containing the worm, James just realized that encrypted systems may contain privileged attorney-client communications. How do you ensure professional ethical compliance during incident response?”

If Professional Service Context Is Missed:

“Dr. Kim’s expert economic analysis represents two years of specialized research that cannot be recreated by Monday. What’s your strategy for protecting irreplaceable professional work product?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish law firm deadline crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and professional service deadline vulnerabilities.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of legal profession cybersecurity challenges. Use the full set of NPCs to create realistic court deadline pressures. The two rounds allow WannaCry to spread toward attorney-client communications, raising stakes. Debrief can explore balance between case preservation and security controls.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing court filing deadlines, attorney-client privilege, case file recovery, and professional ethical obligations. The three rounds allow for full narrative arc including worm’s legal-profession-specific propagation and impact.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate case management system updates causing unrelated access issues). Make containment ambiguous, requiring players to justify legal-deadline-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and professional service security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Network forensics reveal WannaCry ransomware worm exploiting unpatched Windows SMB vulnerability (MS17-010) in document management systems. The worm is spreading autonomously through shared case file repositories across all three law firm offices, encrypting legal documents faster than manual containment efforts.”

Clue 2 (Minute 10): “File analysis shows systematic encryption of case files, depositions, and expert witness reports for Monday’s filing. Timeline analysis reveals the attack began Thursday evening during late-night document preparation, and approximately 60% of critical case materials are already encrypted with military-grade encryption.”

Clue 3 (Minute 15): “Real-time monitoring shows WannaCry propagating toward email servers containing attorney-client privileged communications and cloud-based e-filing systems. Network architecture assessment reveals the law firm delayed security patches to avoid disrupting ongoing litigation, creating the vulnerability that enabled worm entry and rapid propagation.”


Pre-Defined Response Options

Option A: Emergency Network Isolation & Document Recovery Priority

  • Action: Immediately isolate all networked systems to stop worm propagation, implement emergency document recovery from offline backups for Monday filing, establish isolated e-filing system for court submission.
  • Pros: Completely stops worm spread and enables recovery of critical case documents; protects attorney-client privileged communications from compromise.
  • Cons: Requires complete network shutdown affecting all legal operations; backup recovery may not include Thursday evening’s final document revisions.
  • Type Effectiveness: Super effective against Worm type malmons like WannaCry; prevents autonomous propagation through network isolation.

Option B: Selective Quarantine & Case File Triage

  • Action: Quarantine confirmed infected systems, implement network segmentation to protect e-filing and communication systems, prioritize recovery of Monday filing documents from partially encrypted systems.
  • Pros: Allows continued access to unencrypted legal research and filing systems; enables selective document recovery for critical deadline.
  • Cons: Risks continued worm propagation in segmented network areas; may not recover all case materials needed for comprehensive Monday filing.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate autonomous spread risk.

Option C: Ransom Payment & Rapid Decryption

  • Action: Pay ransomware demand to obtain decryption key, attempt rapid document recovery to meet Monday deadline while implementing network security improvements.
  • Pros: Potentially fastest path to document recovery for court deadline; maintains law firm operations and case file access.
  • Cons: No guarantee decryption will work or complete before Monday; funds criminal enterprise and may violate professional responsibility standards; doesn’t address underlying worm propagation.
  • Type Effectiveness: Not effective against Worm malmon type; addresses encryption symptom but not worm propagation; ethically problematic for legal profession.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Critical Document Protection & Worm Containment (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Network monitoring shows unprecedented SMB traffic surge across law firm systems. IT Director James Liu reports, “We’re seeing automated port 445 scanning from infected document management servers spreading to attorney workstations and case file repositories - this is autonomous worm propagation through our entire legal document infrastructure.”
  • Clue 2 (Minute 10): Security logs reveal successful exploitation of EternalBlue vulnerability (MS17-010) on unpatched Windows systems throughout the firm. The worm spreads without user interaction - every unpatched system containing legal documents is vulnerable.
  • Clue 3 (Minute 15): Managing Partner Patricia Morrison reports critical case deadline impact: “Our $500M class-action filing is due Monday at 5 PM. The case files, depositions, and expert witness reports are encrypting. Two years of legal work representing 10,000 plaintiffs is at risk. Missing this deadline means automatic case dismissal.”
  • Clue 4 (Minute 20): Expert Witness Dr. Sarah Kim discovers her economic analysis is inaccessible: “My specialized research took two years to complete and is essential for the Monday filing. The data cannot be recreated in this timeline. It’s stored on the law firm’s encrypted servers.”

Response Options:

  • Option A: Emergency Network Isolation with Document Recovery Priority - Immediately isolate all networked systems to stop worm spread, disconnect case management infrastructure, prioritize emergency recovery of Monday filing documents from offline backups, establish air-gapped system for court submission.
    • Pros: Halts worm propagation to all legal systems; enables focused recovery of critical case files; protects attorney-client privileged communications from further compromise.
    • Cons: Complete network shutdown affects all legal operations; backup may not include Thursday evening’s final document revisions; inter-office communication severely disrupted.
    • Type Effectiveness: Super effective against Worm - prevents autonomous spread to remaining legal systems but creates significant operational challenges.
  • Option B: Deploy Kill Switch with Selective Document Triage - Register or access the domain found in WannaCry malware code to activate kill switch, halt encryption while maintaining network connectivity for case file assessment and selective recovery of Monday deadline materials.
    • Pros: Immediately stops encryption without network disruption; allows continued access to unencrypted legal documents; elegant technical solution enabling deadline-focused recovery.
    • Cons: Only effective against this specific WannaCry variant; doesn’t remove existing infections; requires rapid execution during case crisis; already-encrypted documents remain inaccessible.
    • Type Effectiveness: Highly effective against WannaCry Ransomware specifically; stops further encryption but doesn’t recover encrypted case files.
  • Option C: Case File Priority with Rapid Selective Recovery - Focus all resources on recovering specific documents needed for Monday filing, attempt selective decryption or backup restoration of critical case materials, accept worm propagation in lower-priority practice areas temporarily.
    • Pros: Ensures court deadline compliance through targeted document recovery; addresses immediate legal obligation to clients; demonstrates case-first legal practice values.
    • Cons: Worm continues propagating to other client files and attorney communications; may compromise attorney-client privilege in other matters; creates differential security across cases.
    • Type Effectiveness: Partially effective - addresses deadline impact but allows continued worm propagation threatening broader legal practice.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether Morrison & Associates faces complete network isolation challenges (segmentation approach), dependency on kill switch effectiveness (domain-based solution), or continued worm propagation with ethical implications (selective approach). Regardless of choice, the situation evolves when opposing counsel Michael Rodriguez files a motion for dismissal citing plaintiff preparation failures, and legal ethics counsel confirms that compromised attorney-client communications create mandatory disclosure obligations to affected clients. The court clerk reiterates that Monday 5 PM deadline is absolute with no extensions available. Backup integrity assessment reveals potential compromise complicating recovery strategies. The team discovers that this is not just a technical incident but a test of legal professional responsibility, client representation obligations, court deadline compliance, and attorney-client privilege protection - all while containing a rapidly spreading worm that threatens the firm’s ability to practice law and serve clients effectively.

Debrief Focus:

  • Recognition of worm propagation mechanics through professional service networks and document systems
  • Balance between court deadline compliance, attorney-client privilege, and comprehensive security response
  • Legal profession-specific challenges including professional responsibility rules, privileged communications, and malpractice exposure
  • Kill switch discovery and deployment as emergency response technique for deadline-facing organizations
  • Importance of backup isolation and document recovery planning in professional service environments

Full Game Materials (120-140 min, 3 rounds)

Round 2: Professional Responsibility & Document Recovery (35-40 min)

Opening Scenario:

The team’s Round 1 response has created a new legal practice reality. If they chose network isolation, attorneys are now disconnected from legal research and e-filing systems needed for submission. If they deployed the kill switch, encryption has stopped but 60% of case materials remain inaccessible. If they chose selective recovery, the worm continues spreading to other client matters and privileged communications.

Patricia Morrison convenes an emergency partner meeting. “We need comprehensive strategy addressing our legal obligations. We have duties to the class-action clients, ethical responsibilities for attorney-client privilege, court filing deadlines, and potential malpractice exposure. What is our path forward?”

Investigation Clues:

  • Clue 1 (Minute 45): Legal research reveals that similar ransomware incidents have resulted in bar association discipline for attorneys who failed to adequately protect client confidential information. Professional responsibility obligations extend beyond just the current case.
  • Clue 2 (Minute 50): Document assessment shows that critical expert witness analysis, key depositions, and essential legal memoranda are among the encrypted files. Manual reconstruction would require weeks of work that cannot be completed before Monday deadline.
  • Clue 3 (Minute 55): Email server analysis reveals the worm is approaching systems containing attorney-client privileged communications for dozens of client matters beyond the class-action case. Broader ethical notification obligations may be triggered.
  • Clue 4 (Minute 60): Court filing specialist reports that even if documents are recovered, final assembly, citation checking, and electronic filing procedures require minimum 24 hours with functioning systems. The timeline is extraordinarily tight.

NPC Interactions:

  • Patricia Morrison: Evaluating all options. “I can attempt to negotiate with opposing counsel for agreed extension, but Michael will demand major concessions that harm our clients. I can request court mercy, but judges rarely grant extensions for law firm technical failures. Or we push for Monday filing despite all obstacles.”
  • James Liu: Planning technical recovery. “Comprehensive remediation requires patching every system, rebuilding document servers, and implementing proper network segmentation - that’s weeks of work. We need to decide between minimal recovery enabling Monday filing versus thorough security restoration.”
  • Dr. Sarah Kim: Offering alternatives. “I can attempt to reconstruct summary analysis from my independent research notes, but it won’t have the depth or precision of the original two-year study. It may be sufficient for initial filing but will weaken the case substantially.”
  • Michael Rodriguez: (via phone) Increasing pressure. “My client is prepared to agree to extension if plaintiff counsel acknowledges case management deficiencies and accepts liability limitations. Otherwise, we proceed with dismissal motion and your clients get nothing.”

Pressure Events:

  • Minute 70: Law firm malpractice insurance carrier requests incident details and warns about potential coverage issues if professional negligence is established
  • Minute 80: Several class-action plaintiff representatives call asking about case status and Monday filing confidence
  • Minute 85: Legal ethics hotline confirms that compromised attorney-client communications may require client notification under professional responsibility rules
  • Minute 90: Senior partner calculates that case dismissal would result in approximately $3M in unrecoverable costs and catastrophic firm reputation damage

Round 2 Response Strategy:

Teams must develop comprehensive legal profession recovery strategy addressing technical remediation, case filing capability, professional responsibility compliance, client communication, and malpractice risk management. The response should balance Monday deadline with long-term professional obligations.

Facilitation Questions:

  • “How do you coordinate document recovery, ethical compliance, and case filing preparation simultaneously?”
  • “What is your recommendation to Patricia Morrison about accepting opposing counsel’s extension offer versus pursuing Monday filing?”
  • “How do you ensure attorney-client privilege protection and professional responsibility compliance while implementing security remediation?”

Victory Conditions:

  • Comprehensive legal practice response strategy balancing all professional obligations
  • Clear plan for Monday filing or acceptable alternative protecting client interests
  • Path forward addressing immediate case needs and long-term firm security and ethical compliance

Advanced Challenge Materials (150-170 min)

Additional Complexity Elements:

Red Herrings & Misdirection

  • Legitimate System Updates: Law firm IT had scheduled document management system updates for this week, creating confusion about whether file access issues are attack-related or planned maintenance complications.
  • Unrelated Document Issues: Some attorneys report missing files that are actually due to incorrect folder organization unrelated to the attack, creating noise in incident investigation.
  • Opposing Counsel Tactics: Michael Rodriguez sends multiple communications that could be legitimate legal strategy or attempts to exploit the firm’s technical difficulties - team must assess his intentions.
  • Client Anxiety: Multiple clients call with various concerns that pull attorney attention away from incident response and case filing preparation.

Removed Resources & Constraints

  • No External Threat Intelligence: Remove access to pre-existing WannaCry knowledge - team must deduce worm behavior, kill switch mechanism, and EternalBlue vulnerability details from legal environment investigation alone.
  • Limited IT Expertise: IT Director Liu has general technology knowledge but no advanced incident response experience - team cannot rely on NPC technical cybersecurity guidance.
  • Budget Constraints: Law firm partnership is cost-conscious and questions expensive security solutions - emergency expenditures require partner approval creating decision delays.
  • Backup Uncertainty: Complete uncertainty about backup integrity and recovery capability due to inadequate backup testing and documentation.

Enhanced Pressure & Consequences

  • Client Impact Stories: Specific narratives of individual plaintiffs in the class-action case who will lose legal recourse if Monday deadline is missed - personalizes the case filing pressure.
  • Professional Reputation: Local legal community learns of the incident, creating reputation pressure and potential competitive disadvantage for the firm’s future client development.
  • Bar Association Inquiry: State bar association’s professional responsibility committee sends inquiry letter about the incident and client information protection measures.
  • Expert Witness Dependency: Dr. Kim’s analysis is truly irreplaceable and cannot be adequately reconstructed - team must recover the encrypted data or accept significantly weakened case.

Ethical Dilemmas

  • Court Extension Request: Should the firm request extension acknowledging technical failures (potentially harming client interests through opposing counsel concessions) or push for Monday filing with incomplete materials?
  • Client Notification: Should the firm immediately notify clients about potential attorney-client privilege compromise creating reputation risk, or wait until full scope is determined?
  • Ransom Payment: Is paying ransom ethically acceptable for law firms given professional responsibility standards and the imperative to recover client confidential information?
  • Security vs. Service: Should the firm implement strict security controls that reduce attorney efficiency and convenience, or maintain accessible systems accepting some security risk?

Advanced Investigation Challenges

  • Privilege Protection: Investigation must protect attorney-client privilege even while analyzing compromised communications - creates complex forensic constraints.
  • Multi-Office Complexity: Worm spread across three law firm offices with different network configurations requires coordinated investigation and response.
  • E-Discovery Implications: If privileged communications were compromised, opposing counsel may argue they are no longer privileged - creates legal and technical investigation complexity.
  • Vendor Dependencies: Document management and e-filing systems require vendor support for recovery, but vendors have limited weekend availability during critical deadline period.

Complex Recovery Scenarios

  • Document Version Control: Recovery reveals multiple versions of critical documents creating uncertainty about which versions contain final attorney revisions essential for filing.
  • Citation Verification: Recovered legal documents may have citation errors from partial encryption requiring time-intensive verification before court submission.
  • E-Filing Technical Requirements: Court electronic filing system has strict formatting requirements that may be disrupted by recovery process creating last-minute technical compliance challenges.
  • Expert Witness Coordination: Dr. Kim is traveling with limited availability during recovery period, complicating coordination for alternative analysis if primary data cannot be recovered.

Advanced Debrief Topics

  • Professional Responsibility & Cybersecurity: How should legal professional responsibility rules address law firm cybersecurity obligations for client confidential information protection?
  • Professional Service Constraints: What unique challenges do law firms face in cybersecurity compared to other professional service organizations or corporate environments?
  • Deadline-Driven Security: How can professional service organizations approach cybersecurity realistically when client deadlines create pressure for operational convenience over security protocols?
  • Privileged Information Protection: How should legal profession balance attorney-client privilege protection with necessary incident response investigation and remediation?
  • Competitive Pressures: How do law firms justify cybersecurity investments to cost-conscious clients and competitive billing rate pressures?

Advanced Challenge Debrief Questions:

  • “How did professional responsibility obligations and court deadline pressure affect your incident response decision-making differently than corporate environment scenarios?”
  • “What unique approaches might legal profession require for cybersecurity compared to other industries with similar confidential information?”
  • “How do you balance attorney-client privilege protection with necessary technical investigation during cybersecurity incidents?”
  • “What systemic changes would make law firms more resilient to cybersecurity threats while respecting professional ethics, competitive economics, and client service obligations?”