Stay up to date with notifications from The Independent

Notifications can be managed in browser preferences.

Hackers who stole data from entertainment law firm threaten to release Trump’s ‘dirty laundry’

Criminal group demands £35m in ransom over supposedly damaging stolen documents

Conrad Duncan
Saturday 16 May 2020 07:48 EDT
Comments
A hacking group claim to have obtained compromising information on Donald Trump from an entertainment law firm
A hacking group claim to have obtained compromising information on Donald Trump from an entertainment law firm (AFP via Getty Images)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Hackers who have stolen data from a major entertainment law firm have threatened to release Donald Trump’s “dirty laundry” unless they receive $42m (£35m) in ransom.

The criminal group hacked the law firm Grubman Shire Meiselas & Sacks last week and released documents which appeared to show a contract for pop singer Madonna.

However, the group has not provided any proof that it has compromising information on Mr Trump and the law firm has insisted the president is not one of its clients and never has been.

“The next person we'll be publishing is Donald Trump. There's an election race going on, and we found a ton of dirty laundry on time,” the group wrote in a blog post, seen by Variety magazine.

“To you voters, we can let you know that after such a publication, you certainly don't want to see him as president.”

The hackers claimed they had obtained up to 756GB of data, stolen using ransomware (a type of malware), including contracts, nondisclosure agreements, phone numbers and email addresses for well-known clients.

Earlier this week, Grubman Shire Meiselas & Sacks confirmed it had suffered a cyberattack and said it had notified its clients and staff.

“We have hired the world's experts who specialise in this area, and we are working around the clock to address these matters,” the firm said.

In a statement sent to US media, the company added: “The leaking of our clients’ documents is a despicable and illegal attack by these foreign cyberterrorists who make their living attempting to extort high-profile US companies, government entities, entertainers, politicians, and others.”

Allen Grubman, the firm’s founder, is thought to be refusing to negotiate with the hackers because it is possible that they could release the documents after ransom money has been sent, according to Page Six.

Grubman Shire Meiselas & Sacks is reported to have represented celebrities such as Sir Elton John, Lady Gaga, Drake, Robert De Niro and Mike Tyson.

Although it is unclear what information, if any, the group could have on Mr Trump, the president’s personal life and business dealings have been a source of controversy throughout his time in office.

In particular, Mr Trump’s refusal to release his tax returns during his presidency has led to speculation about the nature of his past business dealings.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in