November 24, 2021 By David Bisson 2 min read

Two U.S. congresswomen introduced a bill that would require ransomware victims to publicly disclose ransom payments to the federal government.

Introducing the ‘Ransom Disclosure Act’

In early October, Senator Elizabeth Warren (D-Mass.) and Representative Deborah Ross (D-N.C.) introduced a bill for the Ransom Disclosure Act.

Senator Warren said the bill has two main goals. First, it would help the U.S. government to learn how ransomware gangs work. Next, it would deepen their knowledge of the larger ransomware threat.

“Ransomware attacks are skyrocketing, yet we lack critical data to go after cyber criminals,” said Senator Warren. “My bill with Congresswoman Ross would set disclosure requirements when ransoms are paid and allow us to learn how much money cyber criminals are siphoning from American entities to finance criminal enterprises ⁠— and help us go after them.”

If passed, entities that paid a ransom must disclose the details to the government within 48 hours. Those specifics would include the date on which the victim received the ransom demand, the date on which they fulfilled it, the amount paid and in what currency.

If passed, the Department of Homeland Security will be responsible for removing identifying information from ransom payment reports. It would organize the reports submitted during the previous year and publish those records. It will also create a website where people can report ransom payments.

At that point, the DHS secretary will analyze those ransom payment records for common factors such as the extent to which threat actors relied on cryptocurrency to run their attacks. The DHS secretary will then make recommendations. They will do so with an eye to how the U.S. government can protect federal information systems and strengthen their level of security.

Next, the House and Senate will consider the bill.

Potential Drawbacks for Ransomware Victims

Bleeping Computer pointed out a potential drawback of the Ransom Disclosure Act, noting how “many believe that it would merely result in making ransomware attack repercussions more severe”. Harsher punishments could prolong victims’ business disruption and/or delay the return to business as usual, the computer self-help website went on to explain. Victims could suffer more punishment if they end up paying a ransom actor named by the Office of Foreign Assets Control (OFAC) at the U.S. Department of the Treasury.

Indeed, victims could incur sanctions from the federal government under strict liability. This means that the government can hold them liable for a ransomware payment. That would be the case even if they didn’t know that the attacker was sanctioned.

How to Prevent a Ransomware Attack

Regardless of whether the Ransom Disclosure Act becomes law, there are steps businesses can take today. It’s important that the federal government focuses on helping prevent a ransomware attack. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) offered several suggestions in this regard. These include maintaining data backups and testing them on a regular basis, creating an incident response plan and testing their effectiveness in multiple types of scenarios. They can also use a vulnerability management plan to prioritize and remediate their systems’ known security weaknesses.

More from News

Insights from CISA’s red team findings and the evolution of EDR

3 min read - A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity. Among the most pressing issues was a heavy reliance on endpoint detection and response (EDR) solutions, paired with a lack of network-level protections. These findings underscore a familiar challenge: Why do organizations place so much trust in EDR alone, and what must change to address its shortcomings? EDR’s double-edged sword A cornerstone of cyber resilience strategy, EDR solutions are prized for…

DHS: Guidance for AI in critical infrastructure

4 min read - At the end of 2024, we've reached a moment in artificial intelligence (AI) development where government involvement can help shape the trajectory of this extremely pervasive technology. In the most recent example, the Department of Homeland Security (DHS) has released what it calls a "first-of-its-kind" framework designed to ensure the safe and secure deployment of AI across critical infrastructure sectors. The framework could be the catalyst for what could become a comprehensive set of regulatory measures, as it brings into…

Apple Intelligence raises stakes in privacy and security

3 min read - Apple’s latest innovation, Apple Intelligence, is redefining what’s possible in consumer technology. Integrated into iOS 18.1, iPadOS 18.1 and macOS Sequoia 15.1, this milestone puts advanced artificial intelligence (AI) tools directly in the hands of millions. Beyond being a breakthrough for personal convenience, it represents an enormous economic opportunity. But the bold step into accessible AI comes with critical questions about security, privacy and the risks of real-time decision-making in users’ most private digital spaces. AI in every pocket Having…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today