WannaCry Scenario: Morrison & Associates Case Crisis

Morrison & Associates Law Firm: 150 attorneys across 3 offices, specialized litigation
Worm • WannaCry
STAKES
Client case files + Attorney-client privilege + Court deadline compliance
HOOK
Morrison & Associates is 72 hours from filing critical motions in their biggest class-action lawsuit ever, representing 10,000 plaintiffs against a major corporation. The legal team has been working around the clock to meet court deadlines when ransomware begins encrypting case files, depositions, and expert witness reports that cannot be recreated before the filing deadline.
PRESSURE
Court filing deadline Monday 5 PM - missing deadline dismisses $500M class-action case
FRONT • 120 minutes • Advanced
Morrison & Associates Law Firm: 150 attorneys across 3 offices, specialized litigation
Worm • WannaCry
NPCs
  • Patricia Morrison (Managing Partner): Leading $500M class-action case with Monday filing deadline, watching years of legal work encrypt in real-time, must balance case preservation with security response
  • James Liu (IT Director): Discovering that law firm's case management systems lack proper network segmentation, watching worm spread through client files and legal databases
  • Dr. Sarah Kim (Expert Witness): Critical economic analysis stored on law firm servers, report needed for Monday filing cannot be reconstructed in time, represents years of specialized research
  • Michael Rodriguez (Opposing Counsel): Will argue for case dismissal if filing deadline is missed, represents corporate defendant with billions at stake
SECRETS
  • Law firm delayed security updates on case management systems to avoid disrupting ongoing litigation
  • Client files, depositions, and expert reports stored on interconnected systems without proper access controls
  • Network designed for attorney convenience with minimal security segmentation between practice areas

Planning Resources

Tip📋 Comprehensive Facilitation Guide Available

For detailed session preparation support, including game configuration templates, investigation timelines, response options matrix, and round-by-round facilitation guidance, see:

WannaCry Law Firm Case Crisis Planning Document

Planning documents provide 30-minute structured preparation for first-time IMs, or quick-reference support for experienced facilitators.

Note🎬 Interactive Scenario Slides

Ready-to-present RevealJS slides with player-safe mode, session tracking, and IM facilitation notes:

WannaCry Law Firm Scenario Slides

Press ‘P’ to toggle player-safe mode • Built-in session state tracking • Dark/light theme support


Scenario Details for IMs

Morrison & Associates: Class-Action Litigation Under Court Filing Deadline Crisis

Organization Profile

  • Type: Mid-size specialized litigation law firm focusing on complex commercial disputes, class-action lawsuits, intellectual property litigation, and corporate governance matters requiring extensive discovery processes and multi-year case preparation timelines
  • Size: 150 attorneys distributed across organizational functions including 45 senior partners managing client relationships and trial strategy for high-stakes litigation matters, 65 associate attorneys conducting legal research, document review, deposition preparation, and motion drafting supporting partner-led case teams, 25 paralegals coordinating discovery document management, witness interview scheduling, expert report compilation, and court filing procedures, 10 IT support staff maintaining case management systems, email infrastructure, and document sharing platforms, and 5 administrative personnel coordinating office operations across three geographic locations serving clients throughout regional federal and state court jurisdictions
  • Annual Operations: Generating approximately $95 million in annual legal fees through contingency arrangements and hourly billing for complex litigation matters including $500 million class-action lawsuit representing 4,200 plaintiffs alleging securities fraud against regional financial services corporation, multiple intellectual property disputes defending technology company patent portfolios, corporate governance litigation involving shareholder derivative claims, and employment class actions addressing wage and hour violations—firm’s reputation depends on trial success rate and ability to manage document-intensive litigation requiring review of millions of pages of electronic discovery materials, coordination of expert witness testimony, and preparation of comprehensive legal briefs meeting strict court filing deadlines with zero tolerance for procedural errors that could result in case dismissal
  • Current Litigation Crisis: Lead counsel for Morrison & Associates prepared for five years developing $500 million securities fraud class action scheduled for final motions hearing Tuesday morning at 9:00 AM—court filing deadline Monday 5:00 PM requires submission of 840-page comprehensive motion for summary judgment including supporting declarations from 12 expert witnesses, exhibit compilation totaling 2,300 documents, and legal memorandum synthesizing complex financial regulations and securities law precedents, with strict court rules mandating electronic filing through federal court system rejecting submissions after deadline creating automatic case dismissal if filing obligations not met precisely on schedule
  • Technology Infrastructure: Operating case management system containing complete litigation file repository including client communications protected by attorney-client privilege, witness depositions recorded in video and transcript formats, expert reports incorporating proprietary analysis methodologies, privileged attorney work product documenting litigation strategy and settlement negotiations, and comprehensive exhibit databases linking evidentiary documents to specific legal arguments—systems interconnected through shared network architecture enabling attorney access from any office location but creating vulnerability where ransomware infection in one practice area can rapidly spread laterally across entire document repository affecting multiple active cases simultaneously, firm delayed implementing critical security patches for Windows operating systems due to concerns that software updates might disrupt case management platform stability during intensive trial preparation periods when system availability takes absolute priority over cybersecurity maintenance

Key Assets & Impact

Impossible Decision Framework - Every Choice Creates Catastrophic Outcomes:

Morrison & Associates faces three simultaneously critical imperatives where protecting one asset category necessarily compromises others, creating impossible tradeoffs during court filing deadline crisis:

Asset Category 1: Class-Action Case Preservation & Court Deadline Compliance

  • What’s at stake: $500 million securities fraud class action representing firm’s largest contingency case with potential attorney fee recovery of $150 million (30% contingency plus litigation costs) distributed among partners as year-end profit distributions—Monday 5:00 PM electronic filing deadline is absolute under federal court rules with no extensions granted for technology failures, and missing deadline results in automatic case dismissal with prejudice preventing refiling and eliminating five years of invested attorney time, expert witness costs totaling $8.2 million, and opportunity for 4,200 plaintiff clients to recover securities fraud damages
  • Current vulnerabilities discovered: WannaCry ransomware encrypted all case management system files including 840-page summary judgment motion draft requiring 60+ hours of attorney effort to recreate from memory and rough notes, 12 expert witness declarations representing specialized financial analysis that experts may be unable to precisely reproduce without access to their original work product, and 2,300 exhibit documents requiring manual re-collection from opposing counsel production sets scattered across multiple storage locations with no guarantee that complete exhibit compilation can be reassembled before Monday deadline
  • Cascading failure scenario if compromised: Missing Monday 5:00 PM deadline triggers automatic case dismissal under federal court rules eliminating Morrison & Associates’ ability to recover $150 million contingency fee representing 158% of annual firm revenue, 4,200 plaintiff clients lose opportunity to recover securities fraud damages creating malpractice exposure if clients claim firm negligence in technology security caused financial harm, senior partners face year-end profit distribution shortfall affecting personal financial obligations and retirement planning, associate attorneys working on case exclusively for past two years require reassignment to different practice areas where firm may lack sufficient billable work capacity, firm reputation suffers damage as securities litigation referral sources learn that technology failure prevented case prosecution, and Morrison & Associates’ position in regional legal market becomes compromised if competitors exploit technology security incident to attract clients concerned about law firm operational competence

Asset Category 2: Attorney-Client Privilege & Confidential Information Protection

  • What’s at stake: Case management systems contain attorney-client privileged communications, litigation strategy memoranda, settlement negotiation positions, witness credibility assessments, and expert analysis methodologies that opposing counsel could exploit if confidentiality compromised—ransomware attacks create risk that encrypted files were exfiltrated before encryption occurred, meaning adversaries may possess complete litigation strategy giving opposing parties unfair advantage in trial preparation and settlement negotiations
  • Current vulnerabilities discovered: WannaCry variant analysis suggests malware operators prioritize data exfiltration before encryption deployment to maximize ransom leverage and monetization opportunities—if Morrison & Associates’ privileged case files were uploaded to adversary infrastructure before systems were encrypted, attorney-client privilege may be compromised requiring notification to all affected clients and potential malpractice claims if confidential strategy disclosure damages client positions
  • Cascading failure scenario if compromised: Discovery that privileged case files were exfiltrated requires Morrison & Associates to notify 4,200 class-action plaintiffs that their confidential litigation strategy may be known to opposing financial services corporation defendants, potential malpractice claims from clients alleging firm’s inadequate cybersecurity caused competitive disadvantage in settlement negotiations and trial preparation, state bar professional responsibility investigation examining whether firm’s delayed security patch implementation violated ethical duty to protect client confidential information, withdrawal of professional liability insurance coverage if insurer determines firm’s known security vulnerabilities constituted willful negligence excluding claim protection, and Morrison & Associates’ reputation as trusted counsel becomes permanently damaged if legal community perceives firm cannot maintain confidentiality obligations fundamental to attorney-client relationship

Asset Category 3: Operational Continuity & Multi-Case Practice Infrastructure

  • What’s at stake: Ransomware encryption affects not just $500 million class action but entire case management repository containing active litigation files for 180 ongoing matters representing $95 million annual revenue base—system restoration from backups requires 48-72 hours under best-case scenarios but firm’s backup protocols were inconsistently applied across distributed office locations creating uncertainty whether complete case file recovery is technically possible
  • Current vulnerabilities discovered: IT audit reveals backup systems were not regularly tested for restoration functionality, some practice areas maintained local file copies outside centralized backup infrastructure creating data fragmentation, and certain case files modified within 24 hours before ransomware attack may not be captured in most recent backup snapshot meaning latest attorney work product could be permanently lost even after successful system restoration
  • Cascading failure scenario if compromised: Extended operational disruption lasting 4-7 days prevents attorneys from accessing case files for client consultations, discovery responses, motion drafting, and court appearance preparation across 180 active matters—court deadlines in other cases beyond Monday class-action filing begin triggering procedural defaults, clients experiencing service disruption terminate engagement letters and transfer matters to competitor firms reducing Morrison & Associates’ revenue pipeline, attorneys unable to bill hours during system downtime face income disruption affecting personal financial obligations, and firm’s operational reputation becomes compromised if legal market perceives Morrison & Associates lacks technology resilience for managing complex litigation requiring reliable document access and deadline compliance

The Fundamental Impossibility:

Any prioritization sequence necessarily creates cascading failures across other asset categories—paying ransom to decrypt files before Monday deadline may enable case filing but validates criminal business model and provides no guarantee that decryption keys will work reliably, attempting manual case reconstruction without paying ransom requires 180+ attorney hours that firm cannot marshal before Monday 5:00 PM deadline, and requesting court deadline extension requires disclosing technology failure that demonstrates operational deficiency potentially influencing judge’s perception of firm competence. Every path forward through this crisis requires accepting catastrophic consequences in at least one critical domain while attempting to minimize damage across the other two imperatives competing for limited weekend time before Monday court deadline expires.

Immediate Business Pressure: The Weekend Court Filing Crisis

Saturday Morning, 8:15 AM - The System Encryption Discovery:

Jennifer Martinez, Morrison & Associates’ managing partner, received the emergency text message from Michael Chen, the firm’s IT director, at exactly 8:15 AM Saturday morning: “Office network completely encrypted. All case files inaccessible. Ransomware note demanding $450,000 bitcoin payment. Monday court deadline at risk.”

She was instantly awake, the implications crashing through her weekend calm like a judicial sanctions order destroying a carefully constructed legal strategy. Morrison & Associates had invested five years developing the $500 million securities fraud class action—840 pages of meticulously drafted summary judgment motion, 12 expert witness declarations representing $8.2 million in analysis costs, 2,300 exhibits carefully selected from millions of discovery documents. The complete case file resided on servers that were now encrypted by malware threatening to make Monday’s 5:00 PM federal court filing deadline impossible to meet.

Missing that deadline meant automatic case dismissal. Federal court rules provided no extensions for technology failures. Five years of attorney effort eliminated. $150 million contingency fee opportunity destroyed. 4,200 plaintiff clients denied recovery. Partnership profit distributions vanishing. Firm reputation damaged. Competitors circling to acquire clients from a law firm that couldn’t maintain basic operational security.

Jennifer dressed quickly and headed to the office, calling senior partners en route to convene emergency Saturday meeting. The next 56 hours would determine whether Morrison & Associates survived as viable litigation firm.

The Litigation Deadline That Created Vulnerability:

By 9:30 AM Saturday, twelve senior partners assembled in Morrison & Associates’ main conference room reviewing the ransomware incident scope. Michael Chen presented the technical details that transformed Jennifer’s initial alarm into comprehensive professional crisis.

“WannaCry variant entered our network Thursday evening through phishing email opened by paralegal in our intellectual property practice group,” Michael explained. “The malware exploited unpatched Windows vulnerability we had delayed installing due to concerns about disrupting case management system stability during your intensive trial preparation period. By Friday night, ransomware had spread laterally across all three office locations encrypting every file in our centralized case repository.”

Jennifer felt the defensive rationalization rising immediately—she had personally approved the decision to delay critical security patches three months ago when senior partners complained that system maintenance windows were disrupting evening trial preparation sessions. The litigation intensity had seemed to justify temporary security tradeoffs. Now that calculation felt catastrophically wrong.

David Hoffmann, the lead partner on the securities fraud class action, spoke with barely controlled panic. “The complete summary judgment motion is encrypted. I have rough outline notes and some case law citations, but recreating 840 pages of comprehensive legal analysis from memory would require minimum 60-80 attorney hours working continuously through weekend. We have 56 hours until Monday deadline. Even marshaling our entire litigation team, we cannot fully reconstruct the motion to the quality standard necessary for $500 million case.”

The mathematics were brutal and absolute. Morrison & Associates employed 110 attorneys across all practice areas. Even if Jennifer could reassign attorneys from their existing matters to emergency class-action reconstruction, the time required exceeded available hours before Monday 5:00 PM deadline.

“What about expert witness declarations?” Jennifer asked, already anticipating the answer.

“All encrypted,” David confirmed. “Dr. Sarah Williams spent eight months conducting forensic accounting analysis producing 120-page declaration with exhibits. Her work product was stored exclusively on our systems—she doesn’t maintain independent copies. Recreating her analysis from scratch would require minimum two weeks assuming she can even reproduce her exact methodology without access to her original work.”

Jennifer processed the cascading implications. Without expert declarations supporting summary judgment motion, the legal arguments became speculative rather than evidence-based. Federal judges rarely granted summary judgment without expert testimony establishing material facts. Submitting incomplete motion virtually guaranteed denial.

The Ransomware Demand & Impossible Calculations:

Michael displayed the ransomware message on the conference room screen:

“YOUR FILES ARE ENCRYPTED. PAYMENT REQUIRED: $450,000 BITCOIN TO DECRYPT. DEADLINE: 72 HOURS. AFTER DEADLINE, DECRYPTION IMPOSSIBLE.”

The 72-hour countdown showed 51 hours remaining—expiring Monday morning at 8:00 AM, nine hours before court filing deadline.

Robert Patterson, Morrison & Associates’ CFO, outlined the financial implications. “We maintain $2.8 million operating cash reserves. Paying $450,000 ransom is financially feasible but represents 16% of liquid assets. Our professional liability insurance specifically excludes ransomware payments from coverage. Partners would absorb ransom cost through reduced year-end distributions.”

Jennifer recognized the impossible calculation confronting her partnership. Paying ransom validated criminal business model, provided no guarantee that decryption would work reliably, potentially violated federal anti-terrorism laws if ransomware operators were sanctioned entities, and created ethical concerns about law firm judgment. But refusing to pay guaranteed missing Monday deadline eliminating $150 million contingency fee opportunity worth 333 times the ransom demand.

“If we pay ransom and receive decryption keys, what’s the timeline for system restoration?” Jennifer asked Michael.

“Assuming decryption keys work properly—which historical data suggests succeeds approximately 70% of time—we could potentially restore case file access within 8-12 hours. That would give David’s team Sunday evening through Monday afternoon to verify motion completeness and submit filing. However, 30% probability that decryption fails means paying ransom with no file recovery creates worst outcome: lose both $450,000 payment and Monday deadline.”

The risk calculation made Jennifer’s legal training recoil. Paying ransom represented 30% probability of catastrophic failure where Morrison & Associates suffered both financial loss and case dismissal simultaneously.

The Privilege Compromise Discovery:

At 11:45 AM, Michael returned to the conference room with findings that elevated the crisis from operational emergency to ethical catastrophe. “Our forensic analysis suggests this WannaCry variant includes data exfiltration capabilities. Before encrypting files, malware uploaded case management database to external servers. The 4,200 plaintiff client files, attorney work product, litigation strategy memoranda, settlement negotiation positions—everything may have been copied to adversary infrastructure before encryption occurred.”

The conference room silence carried the weight of professional responsibility nightmares. Attorney-client privilege represented fundamental legal ethics obligation. If Morrison & Associates’ confidential case files were now possessed by ransomware operators—potentially including opposing counsel defendants in the securities fraud litigation who might pay adversaries for competitive intelligence—the privilege breach created malpractice exposure independent of whether Monday deadline was met.

Jennifer understood the cascading legal obligations. State bar rules required attorneys to notify clients when confidential information was compromised. 4,200 class-action plaintiffs would need individual notification letters explaining that their litigation strategy might be known to opposing defendants. Potential malpractice claims would follow asserting firm negligence in cybersecurity caused competitive disadvantage.

“How certain are we about data exfiltration?” she asked Michael.

“Network forensics shows 2.3 GB uploaded to external IP addresses Thursday night before encryption began Friday. That volume is consistent with case management database size. We cannot confirm which specific files were exfiltrated without decrypting systems to compare, but circumstantial evidence strongly suggests complete case file upload.”

Critical Timeline & Operational Deadlines

Immediate Crisis Timeline:

  • Thursday, 6:30 PM: Paralegal opens phishing email containing WannaCry malware
  • Thursday, 6:45 PM - Friday, 11:00 PM: Malware spreads laterally across network, exfiltrates 2.3 GB case files, establishes encryption
  • Saturday, 8:15 AM (Session Start): IT director discovers complete system encryption, notifies managing partner
  • Saturday, 11:45 AM: Forensic analysis confirms likely data exfiltration before encryption
  • Monday, 8:00 AM: Ransom payment deadline expires (decryption allegedly becomes impossible)
  • Monday, 5:00 PM: COURT FILING DEADLINE—summary judgment motion must be electronically submitted or case dismissed

Decision Windows:

  • Saturday-Sunday (48 hours): Maximum time available for ransom payment decision, system restoration attempts, or manual case reconstruction
  • Monday, 8:00 AM: Ransom deadline—after this time, adversaries claim decryption keys destroyed
  • Monday, 9:00 AM-5:00 PM: Final 8-hour window for motion filing if systems restored

Cultural & Organizational Factors: How Litigation Pressure Created Ransomware Vulnerability

Factor 1: Trial preparation intensity created organizational pressure delaying security patches to avoid system disruptions:

Law firm attorneys working 70-80 hour weeks during intensive trial preparation periods resisted IT maintenance windows that temporarily disrupted case management system access—senior partners approved delays to critical Windows security patches citing litigation deadline priorities, creating exact vulnerability WannaCry exploited.

Factor 2: Interconnected network design prioritized attorney convenience over security segmentation:

Morrison & Associates implemented shared network architecture enabling attorneys to access any case file from any location without authentication barriers—design optimized for attorney workflow convenience but created lateral movement vulnerability allowing ransomware to spread from single infected workstation across entire case repository within hours.

Factor 3: Backup testing neglect meant system restoration capabilities remained untested and potentially unreliable:

IT department focused resources on maintaining system availability rather than validating backup restoration functionality—firm discovered during crisis that backup protocols were inconsistently applied and restoration procedures had never been tested under actual emergency conditions.

Factor 4: Attorney-client privilege sensitivity prevented cloud storage adoption that might have provided recovery options:

Legal ethics concerns about maintaining confidentiality of privileged communications prevented Morrison & Associates from implementing cloud backup solutions that might have enabled faster recovery—firm’s commitment to privilege protection ironically created single point of failure vulnerability.

Key Stakeholders & Their Conflicting Imperatives

Stakeholder 1: Jennifer Martinez - Managing Partner

What she cares about: Preserving firm’s $150 million contingency fee opportunity, protecting 4,200 plaintiff clients’ recovery rights, maintaining attorney-client privilege obligations, demonstrating responsible partnership leadership to 150 attorneys depending on her crisis decisions.

Immediate response: “We face impossible choice between paying ransom supporting criminal enterprise versus missing court deadline destroying five years of litigation work. Need to determine whether Monday filing is achievable through any combination of ransom payment, backup restoration, or manual reconstruction—and whether privilege breach requires client notification regardless of deadline outcome.”

Stakeholder 2: David Hoffmann - Lead Class-Action Partner

What he cares about: Successfully prosecuting $500 million securities fraud case representing career-defining litigation achievement, recovering damages for 4,200 harmed investors, securing $150 million fee justifying five years of intensive legal work.

Immediate response: “Cannot recreate 840-page motion to necessary quality standard before Monday deadline without access to encrypted files. Paying ransom represents only path enabling Monday filing—ethical concerns about supporting criminals are secondary to client representation obligations.”

Stakeholder 3: Michael Chen - IT Director

What he cares about: Restoring system functionality, identifying security vulnerability root cause, demonstrating technical competence despite ransomware incident, protecting professional reputation.

Immediate response: “Ransom payment provides 70% probability of successful decryption enabling Monday deadline, but 30% failure risk means potentially losing both payment and deadline. Backup restoration is possible but untested and may not capture most recent work product. Manual reconstruction timeline exceeds available hours.”

Stakeholder 4: Ethics Advisory Counsel (External)

What they care about: Ensuring Morrison & Associates complies with professional responsibility obligations, protecting attorney-client privilege, advising on ransom payment legal implications.

Perspective: “Paying ransom to criminal enterprise raises ethical concerns and potentially violates anti-terrorism laws if adversaries are sanctioned entities. But attorneys’ primary duty is zealous client representation—if ransom payment enables Monday filing protecting client interests, ethical obligation may justify payment despite policy concerns.”

Why This Matters

You’re not just deciding whether to pay ransomware—you’re determining whether attorney obligations to clients override policy concerns about validating criminal business models when case dismissal would harm 4,200 plaintiffs who trusted your firm with their legal representation.

You’re not just recovering encrypted files—you’re defining whether law firm operational security is fundamental professional responsibility or acceptable risk when litigation intensity creates pressure for convenience over cybersecurity maintenance.

You’re not just meeting court deadlines—you’re demonstrating whether legal profession’s self-regulation through ethics rules can address modern cybersecurity challenges or whether traditional attorney-client privilege frameworks need adaptation for ransomware threat environment.

IM Facilitation Notes

1. Emphasize time pressure—56 hours from Saturday discovery to Monday deadline creates genuine constraint forcing decisions under uncertainty

2. Make 4,200 plaintiff clients tangible—describe specific investors who lost retirement savings in securities fraud that Morrison & Associates is trying to recover

3. Use David to create zealous advocacy pressure pushing for ransom payment prioritizing client representation over policy concerns

4. Present ransom payment as probability calculation rather than binary choice—70% success rate versus 30% failure creates genuine risk assessment challenge

5. Address attorney-client privilege breach independently from deadline crisis—notification obligations exist regardless of whether Monday filing succeeds

6. Celebrate transparent response that prioritizes client communication and ethical obligations over solely deadline-focused decision-making

Opening Presentation

“It’s Friday morning at Morrison & Associates, and the law firm is in the final sprint toward Monday’s critical court filing deadline. The $500M class-action case represents two years of work by 20 attorneys, and the case management systems contain irreplaceable depositions, expert witness reports, and legal research. But since Thursday evening, computers throughout the firm have been displaying ransom messages, and critical case files are being encrypted faster than they can be backed up. In the legal profession, missing a court deadline can mean losing a case entirely.”

Initial Symptoms to Present:

Warning🚨 Initial User Reports
  • “Case management systems displaying ransom demands instead of legal documents”
  • “Attorney workstations losing access to client files and litigation materials”
  • “Document servers encrypting depositions and expert witness reports”
  • “New systems failing across different practice areas and client matters”

Key Discovery Paths:

Detective Investigation Leads:

  • Network forensics reveal worm spreading through document management and case file systems
  • File analysis shows systematic encryption of legal documents, depositions, and client communications
  • Timeline analysis reveals attack began during late-night document preparation for Monday deadline

Protector System Analysis:

  • Real-time monitoring shows ransomware spreading through attorney work files and client databases
  • System integrity analysis reveals potential compromise of attorney-client privileged communications
  • Network architecture assessment shows inadequate segmentation between client matters and practice areas

Tracker Network Investigation:

  • Traffic analysis reveals worm exploiting shared network infrastructure across law firm offices
  • Propagation patterns show movement toward email servers containing client communications
  • Network scanning shows potential spread to cloud-based legal research and e-filing systems

Communicator Stakeholder Interviews:

  • Attorneys report loss of access to critical case documents needed for Monday filing
  • IT staff explain security update delays due to concerns about disrupting ongoing litigation
  • Expert witnesses describe irreplaceable research data stored on compromised systems

Mid-Scenario Pressure Points:

  • Hour 1: Senior associate reports inability to access key depositions needed for motion drafting
  • Hour 2: Expert witness calls reporting economic analysis files are inaccessible
  • Hour 3: Opposing counsel files motion requesting dismissal due to “plaintiff preparation failures”
  • Hour 4: Court clerk confirms no extensions available - Monday 5 PM deadline is absolute

Evolution Triggers:

  • If document recovery fails, two years of legal work becomes inaccessible before deadline
  • If network isolation affects e-filing systems, court submissions cannot be completed
  • If attorney-client communications are compromised, ethical violations and malpractice claims arise

Resolution Pathways:

Technical Success Indicators:

  • Team implements emergency document recovery protecting critical case files
  • Worm containment prevents spread to email servers and attorney-client communications
  • Network segmentation preserves legal research and court filing capabilities

Business Success Indicators:

  • Critical case documents recovered enabling Monday court filing deadline compliance
  • Attorney-client privilege maintained throughout cybersecurity incident response
  • Law firm operations continue without malpractice exposure or ethical violations

Learning Success Indicators:

  • Team understands worm propagation through professional service networks and shared file systems
  • Participants recognize unique cybersecurity challenges in legal profession and privileged communications
  • Group demonstrates coordination between IT security, legal operations, and professional compliance

Common IM Facilitation Challenges:

If Attorney-Client Privilege Is Ignored:

“While you’re containing the worm, James just realized that encrypted systems may contain privileged attorney-client communications. How do you ensure professional ethical compliance during incident response?”

If Professional Service Context Is Missed:

“Dr. Kim’s expert economic analysis represents two years of specialized research that cannot be recreated by Monday. What’s your strategy for protecting irreplaceable professional work product?”

Success Metrics for Session:


Template Compatibility

Quick Demo (35-40 min)

  • Rounds: 1
  • Actions per Player: 1
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: Use the “Hook” and “Initial Symptoms” to quickly establish law firm deadline crisis. Present the “Guided Investigation Clues” at 5-minute intervals. Offer the “Pre-Defined Response Options” for the team to choose from. Quick debrief should focus on recognizing worm propagation patterns and professional service deadline vulnerabilities.

Lunch & Learn (75-90 min)

  • Rounds: 2
  • Actions per Player: 2
  • Investigation: Guided
  • Response: Pre-defined
  • Focus: This template allows for deeper exploration of legal profession cybersecurity challenges. Use the full set of NPCs to create realistic court deadline pressures. The two rounds allow WannaCry to spread toward attorney-client communications, raising stakes. Debrief can explore balance between case preservation and security controls.

Full Game (120-140 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Focus: Players have freedom to investigate using the “Key Discovery Paths” as IM guidance. They must develop response strategies balancing court filing deadlines, attorney-client privilege, case file recovery, and professional ethical obligations. The three rounds allow for full narrative arc including worm’s legal-profession-specific propagation and impact.

Advanced Challenge (150-170 min)

  • Rounds: 3
  • Actions per Player: 2
  • Investigation: Open
  • Response: Creative
  • Complexity: Add red herrings (e.g., legitimate case management system updates causing unrelated access issues). Make containment ambiguous, requiring players to justify legal-deadline-facing decisions with incomplete information. Remove access to reference materials to test knowledge recall of worm behavior and professional service security principles.

Quick Demo Materials (35-40 min)

Guided Investigation Clues

Clue 1 (Minute 5): “Network forensics reveal WannaCry ransomware worm exploiting unpatched Windows SMB vulnerability (MS17-010) in document management systems. The worm is spreading autonomously through shared case file repositories across all three law firm offices, encrypting legal documents faster than manual containment efforts.”

Clue 2 (Minute 10): “File analysis shows systematic encryption of case files, depositions, and expert witness reports for Monday’s filing. Timeline analysis reveals the attack began Thursday evening during late-night document preparation, and approximately 60% of critical case materials are already encrypted with military-grade encryption.”

Clue 3 (Minute 15): “Real-time monitoring shows WannaCry propagating toward email servers containing attorney-client privileged communications and cloud-based e-filing systems. Network architecture assessment reveals the law firm delayed security patches to avoid disrupting ongoing litigation, creating the vulnerability that enabled worm entry and rapid propagation.”


Pre-Defined Response Options

Option A: Emergency Network Isolation & Document Recovery Priority

  • Action: Immediately isolate all networked systems to stop worm propagation, implement emergency document recovery from offline backups for Monday filing, establish isolated e-filing system for court submission.
  • Pros: Completely stops worm spread and enables recovery of critical case documents; protects attorney-client privileged communications from compromise.
  • Cons: Requires complete network shutdown affecting all legal operations; backup recovery may not include Thursday evening’s final document revisions.
  • Type Effectiveness: Super effective against Worm type malmons like WannaCry; prevents autonomous propagation through network isolation.

Option B: Selective Quarantine & Case File Triage

  • Action: Quarantine confirmed infected systems, implement network segmentation to protect e-filing and communication systems, prioritize recovery of Monday filing documents from partially encrypted systems.
  • Pros: Allows continued access to unencrypted legal research and filing systems; enables selective document recovery for critical deadline.
  • Cons: Risks continued worm propagation in segmented network areas; may not recover all case materials needed for comprehensive Monday filing.
  • Type Effectiveness: Moderately effective against Worm threats; reduces but doesn’t eliminate autonomous spread risk.

Option C: Ransom Payment & Rapid Decryption

  • Action: Pay ransomware demand to obtain decryption key, attempt rapid document recovery to meet Monday deadline while implementing network security improvements.
  • Pros: Potentially fastest path to document recovery for court deadline; maintains law firm operations and case file access.
  • Cons: No guarantee decryption will work or complete before Monday; funds criminal enterprise and may violate professional responsibility standards; doesn’t address underlying worm propagation.
  • Type Effectiveness: Not effective against Worm malmon type; addresses encryption symptom but not worm propagation; ethically problematic for legal profession.

Lunch & Learn Materials (75-90 min, 2 rounds)

Round 1: Critical Document Protection & Worm Containment (30-35 min)

Investigation Clues:

  • Clue 1 (Minute 5): Network monitoring shows unprecedented SMB traffic surge across law firm systems. IT Director James Liu reports, “We’re seeing automated port 445 scanning from infected document management servers spreading to attorney workstations and case file repositories - this is autonomous worm propagation through our entire legal document infrastructure.”
  • Clue 2 (Minute 10): Security logs reveal successful exploitation of EternalBlue vulnerability (MS17-010) on unpatched Windows systems throughout the firm. The worm spreads without user interaction - every unpatched system containing legal documents is vulnerable.
  • Clue 3 (Minute 15): Managing Partner Patricia Morrison reports critical case deadline impact: “Our $500M class-action filing is due Monday at 5 PM. The case files, depositions, and expert witness reports are encrypting. Two years of legal work representing 10,000 plaintiffs is at risk. Missing this deadline means automatic case dismissal.”
  • Clue 4 (Minute 20): Expert Witness Dr. Sarah Kim discovers her economic analysis is inaccessible: “My specialized research took two years to complete and is essential for the Monday filing. The data cannot be recreated in this timeline. It’s stored on the law firm’s encrypted servers.”

Response Options:

  • Option A: Emergency Network Isolation with Document Recovery Priority - Immediately isolate all networked systems to stop worm spread, disconnect case management infrastructure, prioritize emergency recovery of Monday filing documents from offline backups, establish air-gapped system for court submission.
    • Pros: Halts worm propagation to all legal systems; enables focused recovery of critical case files; protects attorney-client privileged communications from further compromise.
    • Cons: Complete network shutdown affects all legal operations; backup may not include Thursday evening’s final document revisions; inter-office communication severely disrupted.
    • Type Effectiveness: Super effective against Worm - prevents autonomous spread to remaining legal systems but creates significant operational challenges.
  • Option B: Deploy Kill Switch with Selective Document Triage - Register or access the domain found in WannaCry malware code to activate kill switch, halt encryption while maintaining network connectivity for case file assessment and selective recovery of Monday deadline materials.
    • Pros: Immediately stops encryption without network disruption; allows continued access to unencrypted legal documents; elegant technical solution enabling deadline-focused recovery.
    • Cons: Only effective against this specific WannaCry variant; doesn’t remove existing infections; requires rapid execution during case crisis; already-encrypted documents remain inaccessible.
    • Type Effectiveness: Highly effective against WannaCry Ransomware specifically; stops further encryption but doesn’t recover encrypted case files.
  • Option C: Case File Priority with Rapid Selective Recovery - Focus all resources on recovering specific documents needed for Monday filing, attempt selective decryption or backup restoration of critical case materials, accept worm propagation in lower-priority practice areas temporarily.
    • Pros: Ensures court deadline compliance through targeted document recovery; addresses immediate legal obligation to clients; demonstrates case-first legal practice values.
    • Cons: Worm continues propagating to other client files and attorney communications; may compromise attorney-client privilege in other matters; creates differential security across cases.
    • Type Effectiveness: Partially effective - addresses deadline impact but allows continued worm propagation threatening broader legal practice.

Round Transition Narrative

After Round 1 → Round 2:

The team’s initial response determines whether Morrison & Associates faces complete network isolation challenges (segmentation approach), dependency on kill switch effectiveness (domain-based solution), or continued worm propagation with ethical implications (selective approach). Regardless of choice, the situation evolves when opposing counsel Michael Rodriguez files a motion for dismissal citing plaintiff preparation failures, and legal ethics counsel confirms that compromised attorney-client communications create mandatory disclosure obligations to affected clients. The court clerk reiterates that Monday 5 PM deadline is absolute with no extensions available. Backup integrity assessment reveals potential compromise complicating recovery strategies. The team discovers that this is not just a technical incident but a test of legal professional responsibility, client representation obligations, court deadline compliance, and attorney-client privilege protection - all while containing a rapidly spreading worm that threatens the firm’s ability to practice law and serve clients effectively.

Debrief Focus:

  • Recognition of worm propagation mechanics through professional service networks and document systems
  • Balance between court deadline compliance, attorney-client privilege, and comprehensive security response
  • Legal profession-specific challenges including professional responsibility rules, privileged communications, and malpractice exposure
  • Kill switch discovery and deployment as emergency response technique for deadline-facing organizations
  • Importance of backup isolation and document recovery planning in professional service environments

Full Game Materials (120-140 min, 3 rounds)

Round 2: Professional Responsibility & Document Recovery (35-40 min)

Opening Scenario:

The team’s Round 1 response has created a new legal practice reality. If they chose network isolation, attorneys are now disconnected from legal research and e-filing systems needed for submission. If they deployed the kill switch, encryption has stopped but 60% of case materials remain inaccessible. If they chose selective recovery, the worm continues spreading to other client matters and privileged communications.

Patricia Morrison convenes an emergency partner meeting. “We need comprehensive strategy addressing our legal obligations. We have duties to the class-action clients, ethical responsibilities for attorney-client privilege, court filing deadlines, and potential malpractice exposure. What is our path forward?”

Investigation Clues:

  • Clue 1 (Minute 45): Legal research reveals that similar ransomware incidents have resulted in bar association discipline for attorneys who failed to adequately protect client confidential information. Professional responsibility obligations extend beyond just the current case.
  • Clue 2 (Minute 50): Document assessment shows that critical expert witness analysis, key depositions, and essential legal memoranda are among the encrypted files. Manual reconstruction would require weeks of work that cannot be completed before Monday deadline.
  • Clue 3 (Minute 55): Email server analysis reveals the worm is approaching systems containing attorney-client privileged communications for dozens of client matters beyond the class-action case. Broader ethical notification obligations may be triggered.
  • Clue 4 (Minute 60): Court filing specialist reports that even if documents are recovered, final assembly, citation checking, and electronic filing procedures require minimum 24 hours with functioning systems. The timeline is extraordinarily tight.

NPC Interactions:

  • Patricia Morrison: Evaluating all options. “I can attempt to negotiate with opposing counsel for agreed extension, but Michael will demand major concessions that harm our clients. I can request court mercy, but judges rarely grant extensions for law firm technical failures. Or we push for Monday filing despite all obstacles.”
  • James Liu: Planning technical recovery. “Comprehensive remediation requires patching every system, rebuilding document servers, and implementing proper network segmentation - that’s weeks of work. We need to decide between minimal recovery enabling Monday filing versus thorough security restoration.”
  • Dr. Sarah Kim: Offering alternatives. “I can attempt to reconstruct summary analysis from my independent research notes, but it won’t have the depth or precision of the original two-year study. It may be sufficient for initial filing but will weaken the case substantially.”
  • Michael Rodriguez: (via phone) Increasing pressure. “My client is prepared to agree to extension if plaintiff counsel acknowledges case management deficiencies and accepts liability limitations. Otherwise, we proceed with dismissal motion and your clients get nothing.”

Pressure Events:

  • Minute 70: Law firm malpractice insurance carrier requests incident details and warns about potential coverage issues if professional negligence is established
  • Minute 80: Several class-action plaintiff representatives call asking about case status and Monday filing confidence
  • Minute 85: Legal ethics hotline confirms that compromised attorney-client communications may require client notification under professional responsibility rules
  • Minute 90: Senior partner calculates that case dismissal would result in approximately $3M in unrecoverable costs and catastrophic firm reputation damage

Round 2 Response Strategy:

Teams must develop comprehensive legal profession recovery strategy addressing technical remediation, case filing capability, professional responsibility compliance, client communication, and malpractice risk management. The response should balance Monday deadline with long-term professional obligations.

Facilitation Questions:

  • “How do you coordinate document recovery, ethical compliance, and case filing preparation simultaneously?”
  • “What is your recommendation to Patricia Morrison about accepting opposing counsel’s extension offer versus pursuing Monday filing?”
  • “How do you ensure attorney-client privilege protection and professional responsibility compliance while implementing security remediation?”

Victory Conditions:

  • Comprehensive legal practice response strategy balancing all professional obligations
  • Clear plan for Monday filing or acceptable alternative protecting client interests
  • Path forward addressing immediate case needs and long-term firm security and ethical compliance

Advanced Challenge Materials (150-170 min)

Additional Complexity Elements:

Red Herrings & Misdirection

  • Legitimate System Updates: Law firm IT had scheduled document management system updates for this week, creating confusion about whether file access issues are attack-related or planned maintenance complications.
  • Unrelated Document Issues: Some attorneys report missing files that are actually due to incorrect folder organization unrelated to the attack, creating noise in incident investigation.
  • Opposing Counsel Tactics: Michael Rodriguez sends multiple communications that could be legitimate legal strategy or attempts to exploit the firm’s technical difficulties - team must assess his intentions.
  • Client Anxiety: Multiple clients call with various concerns that pull attorney attention away from incident response and case filing preparation.

Removed Resources & Constraints

  • No External Threat Intelligence: Remove access to pre-existing WannaCry knowledge - team must deduce worm behavior, kill switch mechanism, and EternalBlue vulnerability details from legal environment investigation alone.
  • Limited IT Expertise: IT Director Liu has general technology knowledge but no advanced incident response experience - team cannot rely on NPC technical cybersecurity guidance.
  • Budget Constraints: Law firm partnership is cost-conscious and questions expensive security solutions - emergency expenditures require partner approval creating decision delays.
  • Backup Uncertainty: Complete uncertainty about backup integrity and recovery capability due to inadequate backup testing and documentation.

Enhanced Pressure & Consequences

  • Client Impact Stories: Specific narratives of individual plaintiffs in the class-action case who will lose legal recourse if Monday deadline is missed - personalizes the case filing pressure.
  • Professional Reputation: Local legal community learns of the incident, creating reputation pressure and potential competitive disadvantage for the firm’s future client development.
  • Bar Association Inquiry: State bar association’s professional responsibility committee sends inquiry letter about the incident and client information protection measures.
  • Expert Witness Dependency: Dr. Kim’s analysis is truly irreplaceable and cannot be adequately reconstructed - team must recover the encrypted data or accept significantly weakened case.

Ethical Dilemmas

  • Court Extension Request: Should the firm request extension acknowledging technical failures (potentially harming client interests through opposing counsel concessions) or push for Monday filing with incomplete materials?
  • Client Notification: Should the firm immediately notify clients about potential attorney-client privilege compromise creating reputation risk, or wait until full scope is determined?
  • Ransom Payment: Is paying ransom ethically acceptable for law firms given professional responsibility standards and the imperative to recover client confidential information?
  • Security vs. Service: Should the firm implement strict security controls that reduce attorney efficiency and convenience, or maintain accessible systems accepting some security risk?

Advanced Investigation Challenges

  • Privilege Protection: Investigation must protect attorney-client privilege even while analyzing compromised communications - creates complex forensic constraints.
  • Multi-Office Complexity: Worm spread across three law firm offices with different network configurations requires coordinated investigation and response.
  • E-Discovery Implications: If privileged communications were compromised, opposing counsel may argue they are no longer privileged - creates legal and technical investigation complexity.
  • Vendor Dependencies: Document management and e-filing systems require vendor support for recovery, but vendors have limited weekend availability during critical deadline period.

Complex Recovery Scenarios

  • Document Version Control: Recovery reveals multiple versions of critical documents creating uncertainty about which versions contain final attorney revisions essential for filing.
  • Citation Verification: Recovered legal documents may have citation errors from partial encryption requiring time-intensive verification before court submission.
  • E-Filing Technical Requirements: Court electronic filing system has strict formatting requirements that may be disrupted by recovery process creating last-minute technical compliance challenges.
  • Expert Witness Coordination: Dr. Kim is traveling with limited availability during recovery period, complicating coordination for alternative analysis if primary data cannot be recovered.

Advanced Debrief Topics

  • Professional Responsibility & Cybersecurity: How should legal professional responsibility rules address law firm cybersecurity obligations for client confidential information protection?
  • Professional Service Constraints: What unique challenges do law firms face in cybersecurity compared to other professional service organizations or corporate environments?
  • Deadline-Driven Security: How can professional service organizations approach cybersecurity realistically when client deadlines create pressure for operational convenience over security protocols?
  • Privileged Information Protection: How should legal profession balance attorney-client privilege protection with necessary incident response investigation and remediation?
  • Competitive Pressures: How do law firms justify cybersecurity investments to cost-conscious clients and competitive billing rate pressures?

Advanced Challenge Debrief Questions:

  • “How did professional responsibility obligations and court deadline pressure affect your incident response decision-making differently than corporate environment scenarios?”
  • “What unique approaches might legal profession require for cybersecurity compared to other industries with similar confidential information?”
  • “How do you balance attorney-client privilege protection with necessary technical investigation during cybersecurity incidents?”
  • “What systemic changes would make law firms more resilient to cybersecurity threats while respecting professional ethics, competitive economics, and client service obligations?”