Skip to content

Discerning Data

  • About Us
  • Additional Resources
  • Contact Us

DISCERNING DATA

A Faegre Drinker Blog Covering the Latest in Privacy, Cybersecurity and Data Strategy

  • Privacy
  • Cybersecurity
  • Data Strategy
  • Disruptionware

Federal Legislation Considers Banning Ransom Payments to Hackers

Share

The year 2021 continues to reveal an alarming rise in ransomware attacks. Two of the most notable of such attacks include the ransomware attack on CNA Financial Corp., with resulting payment of $40 million in ransom, and the attack on Colonial Pipeline Co., with a ransom payment of $4.4 million.

With these two recent ransomware attacks—and subsequent payments—receiving massive publicity, congressional law makers have begun to question whether ransom payments should be permitted or remain legal, or if federal law makers should step in to prohibit such ransom payments as a means to curtail these forms of attacks. Although no bill taking that approach has been introduced yet, recent discussions of such a law have given rise to debate on the issue.

In 2020, the average ransom reportedly paid to cybercriminals was an appalling $312,493, a 171% increase from the average amount paid in 2019. This average ransom demand surge is consistent with the increasingly high demands made —in 2019 the highest demand for ransomware was $15 million, and in 2020 this demand cost increased to $30 million.

A large part of the increase in 2020 was linked to ransomware attacks on healthcare organizations. COVID-19 has increased the vulnerability of healthcare organizations to cyberattacks due to the necessity of their continued operations, and the havoc that would ensue should their systems be locked by hackers. Ransomware allows hackers to encrypt their victim’s data, rendering it locked or unusable. During a ransomware attack, cyber-threat actors will often steal the victim’s data as well and post it publicly to force negotiation on payment.

Supporters of such a new law suggest that prohibiting ransom payments will decrease hackers’ incentives to act and that ransomware attacks will decrease. Rep. Jim Langevin (D-R.I.) suggested his support for such a bill, saying “As the scourge of ransomware continues to grow, all options must be on the table, including prohibiting ransom payments … we need to make sure that crime doesn’t pay. We can do that by improving our cyber defenses and by actually going after the cybercriminals, as well as by making it harder for them to cash out.”

Consistent with this proactive approach, on April 22, 2021, U.S. Senator Gary Peters (D-Mich.) and Senator Rob Portman (R-Ohio), Chair and Ranking Member of the Homeland Security and Governmental Affairs Committee, introduced the Cyber Response and Recovery Act, a bipartisan bill seeking to provide resources and coordination efforts to combat cyberattacks and breaches.

Those who oppose such a law argue that a prohibition oversteps the appropriate boundaries and would be harmful to victims who may not have any other way to regain access to their systems or who may not be able to prevent sensitive data from being leaked.

Phil Reitinger, a former director of the National Cyber Security Center within the Department of Homeland Security, cautions that such a law may have consequences to business. Reitinger sympathizes with victims on this issue, noting that “it’s difficult to criticize businesses for paying ransoms because they have to consider many factors, including the survival of the firm and the safety of employees.” He also cautions that a single nation banning ransom payments may not have the desired effect on the global ransomware challenge. Others in this camp have noted that banning ransomware payments would be a “regulatory overreach that would ultimately act to weaken the safety of individuals and private parties … hinder[ing] a company’s ability to stop an attacker from leaking stolen data that might contain personally identifiable information on its customers or clients.”

While there is no current federal or state law prohibiting the payment of ransom to a ransomware attacker, on October 1, 2020, the U.S. Treasury Department issued an advisory, warning, that financial institutions, cyber-insurance firms and others that facilitate a ransom payment after a ransomware attack could face federal civil penalties or sanctions. However, these penalties are only applied if the Trading with the Enemy Act or the International Emergency Economic Powers Act are triggered by paying ransom to a ransomware attacker who is placed on the U.S. Treasury Department’s Office of Foreign Assets Control Specially Designated Nationals and Blocked Persons List.

Ransomware attacks continue to be a vexing problem both in the United States and globally. Although passing a law prohibiting ransom payments may have positive public policy implications to discourage ransomware attackers, such a law is certainly not without risk or consequence to a victim’s ability to respond.

The material contained in this communication is informational, general in nature and does not constitute legal advice. The material contained in this communication should not be relied upon or used without consulting a lawyer to consider your specific circumstances. This communication was published on the date specified and may not include any changes in the topics, laws, rules or regulations covered. Receipt of this communication does not establish an attorney-client relationship. In some jurisdictions, this communication may be considered attorney advertising.

About the Author: Jane Blaney

Jane Blaney assists clients seeking solutions related to insurance matters, with concentrated knowledge in health insurance, health insurance regulation and technology services. View Jane's full bio on the Faegre Drinker website.

About the Author: Jason G. Weiss

Jason G. Weiss leverages a past career as a cybersecurity and computer forensics Supervisory Special Agent with more than 22 years of decorated service at the FBI to guide clients through the complex and high-stakes issues associated with cybersecurity incident preparedness and response and compliance. View Jason's full bio on the Faegre Drinker website.

Receive Email Alerts to New Articles

SUBSCRIBE

June 17, 2021
Written by: Jane Blaney and Jason G. Weiss
Category: Cybersecurity
Tags: disruptionware, federal legislation, ransomware

Post navigation

Previous Previous post: Faegre Drinker on Law and Technology Podcast: Privacy Issues and COVID-19
Next Next post: Faegre Drinker on Law and Technology Podcast: Computer Forensics

Search the Blog

Sign Up for Email Alerts

PODCASTS

Faegre Drinker on Law and Technology

©2023 Faegre Drinker Biddle & Reath LLP. All Rights Reserved. Lawyer Advertising.

  • About Us
  • Additional Resources
  • Contact Us
We use cookies to improve your experience with our website. By browsing our site, you are agreeing to the use of cookies. For more information about how we use cookies, please review our privacy policy and cookie policy. OK
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT