[PEAR] – Ransomware Victim: Gerson & Schwartz Accident & Injury Lawyers

image

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the PEAR Onion Dark Web Tor Blog page.

Ransomware group:
PEAR
Victim name:
GERSON & SCHWARTZ ACCIDENT & INJURY LAWYERS

AI Generated Summary of the Ransomware Leak Page

On October 29, 2025, a ransomware leak post attributed to the threat group PEAR (Pure Extraction And Ransom) claimed a breach affecting Gerson & Schwartz Accident & Injury Lawyers, a Miami-based law firm that handles personal injury, accident, and wrongful death matters. The post frames the incident as a data-leak event rather than a purely encrypted compromise, stating that a substantial dataset was exfiltrated from the firm’s network. The leak page references a site linked to the victim, defanged here as hxxp://injuryattorneyfla[.]com, and notes that a claim URL is present on the page. The posting situates the victim within the U.S. legal services sector and implies that sensitive client and internal data were compromised.

The leaked material is described as including Partners’ and Vendors’ Data, Clients’ Privileged & Confidential Data, PII and PHI Records, Police Reports & Court Files, Exhibits & Evidences, and Internal and External Email Correspondence, among other items. The page lists a data volume of about 1.1 TB and cites a reported revenue figure of $6.5 million for the firm. There are no accompanying screenshots or images indicated on the page (the images count is 0). The post references a claim URL but provides no disclosed ransom amount, which is consistent with a double-extortion framing without specifying any monetary demand in the posted text.

Given the nature of the claimed data types—PII/PHI and privileged client information—coupled with the large exfiltration volume, the leak suggests meaningful privacy and regulatory risks for the firm and its clients. The victim’s name remains the non-redacted identifier in the excerpt, while contact emails and other PII appear redacted. The post date serves as the publication date for this leak: October 29, 2025, in the absence of a separately documented compromise date.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features