Today’s Lesson
Every Entry Point Is a Promise to Attackers
An attack surface is the sum total of all points where an unauthorised user can attempt to enter or extract data from a system. OWASP defines it as1 “all of the different points where an attacker could get into a system, and where they could get data out.” NIST SP 800-53 control SA-15(5)2 frames attack surface reduction as “giving attackers less opportunity to exploit weaknesses.”
Key stat: Exploitation of vulnerabilities as an initial access vector increased 180% in the 2024 Verizon DBIR,3 driven primarily by web application flaws.
Anatomy of a Legal Tech Attack Surface
| Attack Surface | Entry Points | Primary Threat |
|---|---|---|
| Web Application | Login pages, document viewers, admin panels | Credential stuffing, XSS, session hijacking |
| API Layer | REST/GraphQL endpoints, webhooks, OAuth callbacks | BOLA, injection, broken authentication |
| Database | Connection strings, query interfaces, backups | SQL injection, credential theft |
| Object Storage | S3/Blob buckets, pre-signed URLs, CDN origins | Misconfiguration, over-permissive ACLs |
| LLM Integrations | Prompt endpoints, RAG pipelines, embeddings | Prompt injection, data poisoning |
| Email Systems | SMTP relay, IMAP ingestion, OAuth tokens | Phishing relay, token theft |
| Document Ingestion | Upload endpoints, file parsers, format converters | Malicious payloads, parser exploits, XXE |
The Document Ingestion Pipeline: Your Most Dangerous Surface
Most SaaS applications receive trusted input from their own users. Legal tech receives adversary-supplied content as a core workflow. Opposing counsel sends contracts. Third parties attach evidence. Clients forward hostile correspondence.
Case study — PDF exploits: CVE-2023-26369 demonstrated4 that a crafted PDF could achieve arbitrary code execution through a heap-based buffer overflow. Apache Tika has faced XXE injection through XFA content embedded in PDFs,5 allowing attackers to access local files and internal network resources from the parser itself.
What Makes Legal Document Ingestion Uniquely Dangerous
- The sender is often adversarial by design. In litigation, opposing counsel has a direct interest in the outcome.
- Documents traverse the entire stack. An uploaded contract touches web server, object storage, parser, AI pipeline, database, and notifications.
- Content becomes trusted input downstream. Once parsed, document text feeds into search indexes, AI models, and reporting.
- Format complexity creates parser attack surface. DOCX files are ZIP archives containing XML. PDFs can embed JavaScript and arbitrary binary streams.
The Distinctive Threat Profile of Legal Tech
ABA Formal Opinion 477R6 requires lawyers to make reasonable efforts to prevent unauthorised access to client information. The platform bears professional-conduct-grade obligations. A BOLA vulnerability7 — number one on the OWASP API Security Top 10, roughly 40% of API attacks — in a legal platform exposes privileged communications belonging to non-users who never consented to the platform handling their information.
The Proskauer Rose Incident
In April 2023, Proskauer Rose exposed approximately 184,000 files8 containing private M&A documents, NDAs, and financial deals on an unsecured Microsoft Azure cloud server for six months. Indexed by GrayHatWarfare and accessible to anyone with the URL. One misconfigured object storage bucket — one row in the attack surface table — causing catastrophic privilege breach across hundreds of matters.
LLM Integration: The Newest Attack Surface
The OWASP Top 10 for LLM Applications (2025)9 catalogues risks specific to language model integrations. The fundamental problem: LLMs cannot reliably distinguish data from instructions. When your AI processes a contract from opposing counsel, the contract’s content is data — but the LLM may treat embedded text as instructions.
Internal Attack Surfaces: The Admin Panel Problem
INC Ransomware’s 2024 campaign against law firms10 exploited vulnerabilities in remote management tools — Citrix, Fortinet, SimpleHelp — to gain initial access. They didn’t attack the main application. They attacked the admin tools.
Attack Surface Reduction: Least Exposure
| Action | What It Eliminates |
|---|---|
| Disable unused API endpoints | Orphaned routes with stale auth |
| Remove default admin panels from production | Predictable URL attack surface |
| Restrict object storage to private + pre-signed URLs | Public bucket enumeration |
| Network-segment AI inference services | Lateral movement from LLM to DMS |
| Enforce allowlist-only file formats | Parser exploit surface for exotic formats |
| Require VPN/zero-trust for all internal tools | Network-exposed admin interfaces |
Ransomware attacks on law firms increased 30% in Q1 2024,13 with average demands exceeding $500,000. The cheapest defence is removing things attackers could target. You can’t exploit a service that isn’t running.
Conclusion
Map every surface. Reduce what you can. Isolate what remains so that breaching one surface doesn’t give access to others. Legal tech has an attack surface unlike any other vertical — your users receive adversary-supplied content by design, your data carries professional-conduct obligations, and your AI integrations create novel exploitation pathways.