
Trump Administration Executive Order (EO) Tracker
Ransomware victims face a nearly impossible decision: pay criminals holding their business hostage or refuse and face possible crippling consequences. This decision requires careful analysis of a number of considerations, and regulators and law enforcement are increasingly weighing in.
On February 4, 2021, the New York State Department of Financial Services (NYDFS) became the latest government entity to provide ransomware guidance when it released a statement recommending that ransomware victims not make ransom payments to cyber threat actors. NYDFS, calling cybersecurity the “biggest risk for government and industry, bar none,” noted that the “biggest driver” in the increasing impact of cybercrime on organizations and insurers is the rise in the frequency and cost of ransomware incidents. According to NYDFS, ransomware payments continue to drive this growing risk because they “fuel the vicious cycle” by enabling cybercriminals to develop and deploy more frequent and sophisticated ransomware campaigns.
In publishing this recommendation as part of the voluntary circular guidelines applicable to insurance companies, NYDFS joins a chorus of other U.S. regulators and law enforcement making similar recommendations of varying applicability to businesses more broadly. For example:
While this guidance rightfully identifies the societal risks of paying ransoms, these regulators and law enforcement agencies thus far have not gone as far as prohibiting payment to non-sanctioned threat actors. Other federal agencies have provided perspectives that acknowledge the complicated nature of ransomware:
Implicit in this guidance is the recognition of a significant collective action problem in the community of ransomware victims. While the reward for perpetrating ransomware crimes would be diminished if every victim refused to pay, the practical reality is that a ransomware attack can mean failure or survival for a business. In weighing the societal impact articulated by regulators against the obligation to make a decision in the best interest of the company, all victims will not reach the same decision, and many may grudgingly conclude that paying a ransom is the most sensible – if extremely difficult – business decision.
While the business community cheers recent reports of law enforcement take downs of ransomware networks, including actions against those responsible for Netwalker and Emotet, organizations should continue to strengthen their cyber and ransomware incident response plans. For example, it is increasingly important to notify and cooperate with law enforcement in the early aftermath of a ransomware attack and provide law enforcement with information to help bring cybersecurity threat actors to justice. Meanwhile, the clear trend in regulator recommendations is that ransomware payment is an important legal issue that requires careful consideration and reflection in incident response planning and response.
Authored by Scott Loughlin, Peter Marta, Paul Otto, Tim Tobin, Gregory Lisa, Asmaa Awad-Farid, and Jacob Wall.