A quiet law firm network disruption that started as a technical hiccup hardened into a high-stakes privacy event when confirmation arrived that Social Security numbers were among the data at risk, sharpening public scrutiny and elevating the legal exposure for everyone involved. The incident centered on Adsuar Muñíz Goyco Seda & Pérez Ochoa PSC, a San Juan-based firm that handles corporate, labor, litigation, and estate matters, and it drew the attention of Strauss Borrelli PLLC, which opened an investigation into how sensitive records were handled before and after the breach. The firm notified the New Hampshire Attorney General that an intrusion may have enabled unauthorized access to personally identifiable information, including names and SSNs. In a year defined by escalating attacks on professional services, the episode underscored how legal practices—custodians of confidential documents—present tempting targets for threat actors.
1. Investigative Timeline And Exposure
According to notices filed with regulators, Adsuar detected a network disruption on February 26, 2025, then initiated a forensic review to determine what, if anything, had been accessed. That process, typical in complex cyber events, involved isolating affected systems, reconstructing logs, and mapping the potential pathways an intruder might have used. Over the ensuing months, investigators concluded that an unauthorized third party could have accessed personal data stored on firm systems. While the firm has not publicly quantified the total number of impacted individuals, it described the categories of data as including names and Social Security numbers. On November 21, 2025, notification letters began going out, offering recipients credit monitoring and detailing the personal fields implicated.
Strauss Borrelli’s inquiry focused on the adequacy of security controls prior to the disruption and the speed and clarity of post-incident communications. Central questions included whether multi-factor authentication was universally enforced, how privileged accounts were segmented, and whether routine backups and encryption covered repositories holding SSNs. In addition, the timeline mattered: the stretch between discovery and notification is governed by state law and can shape exposure to regulatory findings. New Hampshire’s filing offered a window into remediation steps and data review protocols. However, the breadth of the firm’s client base in corporate and employment matters suggested that the data at stake might span multiple jurisdictions, complicating both legal obligations and consumer protection strategies.
2. Next Steps And Broader Stakes
The path forward for those named in the notices depended on rapid risk containment and longer-term identity safeguards, and the practical playbook already included credit monitoring, fraud alerts, and strong-password hygiene. Best practice also extended to security freezes at the major bureaus, IRS Identity Protection PIN enrollment for added tax-filing defense, and careful review of benefits or employment records that could reveal misuse. On the institutional side, the discussion moved toward continuous monitoring, endpoint detection and response, and stronger identity governance to curtail lateral movement inside a network. Because SSNs are effectively immutable, mitigation hinged less on data replacement and more on layered controls that reduced opportunities for new-account fraud, account takeover, and synthetic identity schemes.
From a legal vantage, the episode carried implications for professional responsibility, vendor oversight, and state privacy compliance, and it catalyzed scrutiny of how law firms protected client data that mixed consumer identifiers with case files. Potential claims traditionally explored negligence, unfair practices, or inadequate safeguards, while regulators assessed whether notifications were timely and sufficiently informative. The investigation also framed a broader lesson: firms that handled SSNs benefited from encryption at rest, strict access controls, and tested incident response plans that included cross-state legal mapping from day one. As the year closed, the most constructive next steps lay in validating technical fixes through independent assessment, documenting control improvements for regulators, and aligning cyber insurance and tabletop exercises so a future intrusion would be met with faster containment and less harm.


