November 24, 2021 By David Bisson 2 min read

Two U.S. congresswomen introduced a bill that would require ransomware victims to publicly disclose ransom payments to the federal government.

Introducing the ‘Ransom Disclosure Act’

In early October, Senator Elizabeth Warren (D-Mass.) and Representative Deborah Ross (D-N.C.) introduced a bill for the Ransom Disclosure Act.

Senator Warren said the bill has two main goals. First, it would help the U.S. government to learn how ransomware gangs work. Next, it would deepen their knowledge of the larger ransomware threat.

“Ransomware attacks are skyrocketing, yet we lack critical data to go after cyber criminals,” said Senator Warren. “My bill with Congresswoman Ross would set disclosure requirements when ransoms are paid and allow us to learn how much money cyber criminals are siphoning from American entities to finance criminal enterprises ⁠— and help us go after them.”

If passed, entities that paid a ransom must disclose the details to the government within 48 hours. Those specifics would include the date on which the victim received the ransom demand, the date on which they fulfilled it, the amount paid and in what currency.

If passed, the Department of Homeland Security will be responsible for removing identifying information from ransom payment reports. It would organize the reports submitted during the previous year and publish those records. It will also create a website where people can report ransom payments.

At that point, the DHS secretary will analyze those ransom payment records for common factors such as the extent to which threat actors relied on cryptocurrency to run their attacks. The DHS secretary will then make recommendations. They will do so with an eye to how the U.S. government can protect federal information systems and strengthen their level of security.

Next, the House and Senate will consider the bill.

Potential Drawbacks for Ransomware Victims

Bleeping Computer pointed out a potential drawback of the Ransom Disclosure Act, noting how “many believe that it would merely result in making ransomware attack repercussions more severe”. Harsher punishments could prolong victims’ business disruption and/or delay the return to business as usual, the computer self-help website went on to explain. Victims could suffer more punishment if they end up paying a ransom actor named by the Office of Foreign Assets Control (OFAC) at the U.S. Department of the Treasury.

Indeed, victims could incur sanctions from the federal government under strict liability. This means that the government can hold them liable for a ransomware payment. That would be the case even if they didn’t know that the attacker was sanctioned.

How to Prevent a Ransomware Attack

Regardless of whether the Ransom Disclosure Act becomes law, there are steps businesses can take today. It’s important that the federal government focuses on helping prevent a ransomware attack. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) offered several suggestions in this regard. These include maintaining data backups and testing them on a regular basis, creating an incident response plan and testing their effectiveness in multiple types of scenarios. They can also use a vulnerability management plan to prioritize and remediate their systems’ known security weaknesses.

More from News

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally. The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets. Who is exploiting the NGFW zero-day? As of now, little is known about the…

Will arresting the National Public Data threat actor make a difference?

3 min read - The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place? As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today