© Copyright Acquisition International 2026 - All Rights Reserved.

Article Image - Cyber Criminals Target M&A  Negotiations
Posted 22nd June 2015

Cyber Criminals Target M&A Negotiations

We hear from Stuart Poole-Robb, Chief Executive of the security, business intelligence and cyber security adviser, the KCS Group Europe.

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

Cyber Criminals Target M&A Negotiations
Image

Cyber Criminals Target M&A Negotiations

We hear from Stuart Poole-Robb, Chief Executive of the security, business intelligence and cyber security adviser, the KCS Group Europe.

Industry predictions that a growth in the number of merger and acquisitions (M&A) deals would attract the unwanted attention of international organised criminal gangs (OCGs) are proving correct.

Last year, Ernst & Young (now known as EY) predicted that, as M&A activity increases, there will be more scope for cyber criminals to use increasingly sophisticated malware of the kind that is available on the Dark Web to influence the negotiation strategies and pricing of major transactions, either working directly for a party on either side of the transaction or simply as observers taking positions based on the outcomes.

Large law firms are now being targeted by OCGs, particularly during M&A discussions, where the legal firm and the negotiating parties typically open their systems to each other whilst transmitting vast amounts of confidential data to one another over the Internet. Former low-level hackers have also become increasingly ambitious in the last 12 months as the internet’s mirror economy, the Dark Web, has become an increasingly sophisticated marketplace for stolen data.

“We’re all used to criminals stealing identities and credit card information to sell on the black market. But in recent years, as more and more of this information has flooded the market, the price earned per record has dropped to the level where it’s not worth stealing any more,” says Jamie Graves, chief executive of cyber security software developer ZoneFox, a partner of KCS Group Europe.

He adds: “As a result, criminals are targeting organisations with other, higher value, information. This can be seen in the recent spate of healthcare breaches, and it will also be a trend in the legal sector, where security is traditionally relaxed, but a great deal of very sensitive information can be stolen for the purpose of blackmail, fraud, and other activities.”

OCGs are also realising that sensitive information at a corporate level has a very real market value to many large corporates, who do not always to enquire too closely into how such market-sensitive data was originally obtained.

According to Graves: “Certain unscrupulous corporates have also realised that legal practices are honeypots for extremely sensitive information that can be used to inform them of commercial matters that, should they be disclosed, would have a significant effect on legal proceedings, a merger or acquisition, or other commercially sensitive activities.”

This kind of cyber breach is far harder to detect and prosecute than, for example, a cyber-breach that is followed directly by a fraudulent funds transfer. By appearing to conduct legitimate industry research for a major organisation involved in potential M&A negotiations, the OCG can seem to be involved in a legitimate business activity; this is a process known as ‘data laundering’. Should the OCG decide to profit from the illegally obtained information by insider market trading on its own account, the crime is hard to detect and even harder to prosecute, particularly in the case of criminals based in a country which may be on a different continent from the city where the cyber breach occurred.

Law firms are now seen as particularly vulnerable to this type of attack as large organisations in other sectors, such as finance, start to shore up their cyber defences.

“Legal firms need to wise up to the fact that threat-actors are going after valuable low-hanging fruit, and, since the banks have been investing a great deal in security, their practices are likely to be next,” says Jamie Graves.

Some legal firms are already not only improving their own IT security but are also realising that a crucial part of their role is helping clients deal with the growing security risk now associated with situations such as M&A negotiations.

According to Andrew Cheung, General Counsel UKMEA at global law firm Dentons: “The global risks that our clients need to tackle are increasing in complexity, variety, impact and number. To meet these increasingly complex risks, clients should be able to demand more than simply good legal advice from their lawyers. Dentons recognises that we also need to consider the success of our clients’ projects, goals and transactions as a whole.”

Many law firms, however, still live in a state of blissful ignorance as to the growing level of risk they and their clients face from cyber criminals. While the malware used by OCGs has become increasingly sophisticated over the past 12 months, the legal profession overall has not generally managed to keep pace.

The OCGs themselves now deploy malware variants that are routinely sold on the Dark Web, where all kinds of illegal services and goods are available – at a price. According to Russia-based research organisation Kaspersky Labs, cyber criminals are now developing over 300,000 new and unique variants of malware every day. In Russia alone, the market in this type of illicit malware is reported be worth around US$2 billion a year. OCGs are also taking increasing advantage of the fact that the Russian authorities are unwilling to prosecute anyone inside Russia for cyber breaches that occur elsewhere.

According to Interpol: “Traditional OCGs, including those with a mafia-style structure, are beginning to use the service-based nature of the cybercrime market to carry out more sophisticated crimes, buying access to the technical skills they require.” In some cases, even trained state cyber experts in some countries are being encouraged to moonlight, knowing full well they won’t be caught or prosecuted.

Too many legal firms still rely on old-fashioned anti-virus and password protection. This is essentially 20th Century security that stands little or no chance of stopping a determined and co-ordinated cyber attack using modern malware, which often sits undetected on an IT system for months or even years.

Law firms and their corporate clients therefore need to deploy cyber security software capable not only of recognising incoming threats, but also detecting whether an IT system has already been compromised and whether confidential and market- sensitive data is already being put up for sale on the Dark Web.

Categories: Innovation


You Might Also Like
Read Full PostRead - Eye Icon
Tech-led M&A: How to Attract a Buyer
Leadership
05/06/2019Tech-led M&A: How to Attract a Buyer

The tech sector is one of the most targeted for M&A activity, attracting a wide variety of cross-industry buyers.

Read Full PostRead - Eye Icon
Working Together Keeps Port in High  Demand
Strategy
26/06/2017Working Together Keeps Port in High Demand

Taylor’s is celebrating its 325th this year. For many, Taylor’s is the archetypal Port house and its wines are the quintessential Ports. Established over three centuries ago in 1692, Taylor’s is one of the oldest of the founding Port houses. Dedicated en

Read Full PostRead - Eye Icon
Grakon LLC Acquires BMAC Limited
M&A
11/10/2016Grakon LLC Acquires BMAC Limited

Grakon LLC, a global leader in the design and manufacture of custom LED interior and exterior lighting solutions

Read Full PostRead - Eye Icon
Avoid Making These Common Small Business Mistakes
Corporate Social Responsibility
17/05/2023Avoid Making These Common Small Business Mistakes

All business owners make mistakes, whether they’re new business owners or seasoned professionals in charge of multi-million-dollar corporations. While everyone is capable of making mistakes, that doesn’t mean you can’t avoid certain ones by being well-in

Read Full PostRead - Eye Icon
What is Phishing and How to Guard Against it
News
12/01/2023What is Phishing and How to Guard Against it

Maybe you've heard or read the term "phishing" before and have wondered what, exactly, it was referring to. In the below article, we are going to discuss phishing, some of the most common ways cybercriminals attempt to use phishing tactics and how to guard aga

Read Full PostRead - Eye Icon
Why More Female Founders Are Turning to Crowdfunding and Tips from a Female Founder on How to Raise Funds
Leadership
13/12/2022Why More Female Founders Are Turning to Crowdfunding and Tips from a Female Founder on How to Raise Funds

It’s widely reported that female founded businesses get less funding than male, and while venture capital boomed in 2021, women-led start-ups didn’t reap the benefits. Research from the European Investment Bank revealed that female entrepreneurs secured on

Read Full PostRead - Eye Icon
How to Choose the Best Tax Lien Service for Your Business
News
23/05/2025How to Choose the Best Tax Lien Service for Your Business

Suppose your organization faces back taxes, penalties or collections from the Internal Revenue Service (IRS). In that case, firms with the best tax lien services for businesses may be able to help you reduce the owed amount. The following tax resolution compan

Read Full PostRead - Eye Icon
Leading Corporate Finance Management Firm of the Year – Kent
Finance
05/08/2022Leading Corporate Finance Management Firm of the Year – Kent

Unlike many of its competitors, which focus on numbers, Chantler Kent Investments focuses on finding out what its clients want to accomplish during their lifetime and builds profitable portfolios with dreams in mind.

Read Full PostRead - Eye Icon
Transforming Corporate Travel with ehotel®: A Global Shift in Efficiency and Innovation
Innovation
06/09/2024Transforming Corporate Travel with ehotel®: A Global Shift in Efficiency and Innovation

In today’s rapidly evolving business landscape, managing corporate travel efficiently while ensuring compliance with ever-changing regulations is more critical than ever.



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have a number of unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow