The Increasing Risks and Prohibitions Associated With Paying a Ransom After a Ransomware Attack
In 2021, the FBI received 3,729 complaints of ransomware, representing only a portion of the overall ransomware threat landscape.1 EXISTING RISKS FOR MAKING OR FACILITATING A RANSOMWARE PAYMENT The FBI, not surprisingly, does not advise organizations to pay criminals their ransom demands because the...
Saved in:
Published in | Computer and Internet Lawyer Vol. 40; no. 8; pp. 3 - 4 |
---|---|
Main Authors | , , |
Format | Trade Publication Article |
Language | English |
Published |
Frederick
Aspen Publishers, Inc
01.09.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In 2021, the FBI received 3,729 complaints of ransomware, representing only a portion of the overall ransomware threat landscape.1 EXISTING RISKS FOR MAKING OR FACILITATING A RANSOMWARE PAYMENT The FBI, not surprisingly, does not advise organizations to pay criminals their ransom demands because the payment contributes to a criminal enterprise, does not guarantee that an organization will regain access to its data and may incentivize more attacks. [...]there is typically minimal legal benefit to paying a ransom because payment does not eliminate an organization's potential notification obligations under applicable data breach notification laws. The North Carolina law also goes a step further and prohibits government entities from even communicating with ransomware groups.2 Government entities experiencing a ransom request in connection with a cybersecurity incident are also required to notify the North Carolina Department of Information Technology.3 The applicability of the North Carolina law is broad and includes any "agency, department, institution, board, commission, committee, division, bureau, officer, official or other entity of the executive, judicial or legislative branches of State government" as well as "The University of North Carolina and any other entity for which the State has oversight responsibility"4 The law's prohibition on communicating with threat actors is notable, as even victims with no desire or need to pay a ransom will often communicate with threat actors to gain information that can aid the forensic investigation (e.g., information about what data was stolen and from what systems) and to buy time to investigate and inform involved individuals before data is leaked. [...]some argue that constraints on the ability to purchase decryption keys will force government entities to take a more proactive and aggressive approach to cybersecurity designed to prevent successful attacks in the first place. |
---|---|
ISSN: | 1531-4944 |