No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Ransomware: It’s Time to Stop Negotiating

A System Overhaul is Needed to Stem the Flow of Money to Attackers

by Seth Berman and James Gately
January 15, 2021
in Cybersecurity, Featured
illustration of ransomware and hand paying ransom

As unpleasant an option as it is, victims of ransomware attacks often just pay up in order to recover sensitive data. Nutter’s Seth Berman and James Gately offer an alternative.

Ransomware attacks hit suddenly and without apparent warning. One morning, your computers don’t function. You quickly realize you’ve been hacked: Your data has been stolen and your servers, along with all your crucial data, have been encrypted. In short, your business is crippled.

The attackers leave clear instructions: They will provide you the decryption key and promise to destroy the copy of the data they’ve stolen if you pay a ransom. They know how big your company is and what being out of business for a few days will cost you. Thus, their multimillion-dollar ransom demand is tailored to you – perhaps the equivalent of several days’ revenue.

Companies facing a ransomware attack have two options: They can rebuild their systems from scratch at great cost over the course of several weeks – all while losing millions in revenue and suffering untold reputational damage – or they can negotiate and ultimately pay a ransom. Because of the realities of the first option, most companies (and their insurers) opt for the second, perpetuating ransomware as a lucrative stream of income for hackers. We propose a third option designed to address the collective action problem created by America’s ransomware epidemic.

The Collective Action Problem

Ransomware is a type of malicious software, or malware, that encrypts a computer network, locking out legitimate users until a “ransom” is paid in exchange for a decryption key. No one is immune; individuals, Forbes 100 companies, municipalities and governments have all fallen victim. Threat actors typically penetrate a victim’s system by exploiting security holes or using social engineering to trick an unsuspecting user into clicking a link or opening an attachment that downloads malware. Once this occurs, the threat actor works invisibly to escalate user privileges, find sensitive data and prepare to strike, all while the oblivious victim goes about their business for days, weeks or even months. And then, suddenly, everything is locked.

It would be better for everyone if no one paid ransoms. As the hackers make clear, they are in it for the money. If everyone stopped paying ransoms, ransomware would no longer be lucrative and the incentive for hackers would be radically reduced. Indeed, the FBI discourages victims from paying ransoms, but – except in certain rare circumstances where an attacker or its cryptocurrency wallet has been specifically included on the U.S. Department of the Treasury’s Office of Foreign Assets Control list – it is not illegal to do so.

In practice, law enforcement understands that most victims pay the ransom to avoid ruinous consequences. Indeed, oftentimes, insurance companies will even foot the bill for the ransom, as it is typically cheaper than covering the cost of the business interruption. Not surprisingly, the cybercrime insurance market is one of the fastest growing, and insurance companies play a critical role in keeping organizations and their data safe. But because attacks are easy to perpetrate and payoffs from deep-pocketed insurance companies are easy to obtain, ransomware has become a one-way ratchet, resulting in higher ransom demands and higher insurance premiums.

Law enforcement is working hard to investigate attacks and bring perpetrators to justice, but it is severely hampered in the effort. Few attackers are traceable. Those that are often live in countries without extradition treaties or are foreign officials who need not fear arrest. Cryptocurrencies make the ransom payment virtually untraceable and efforts to stop the flow – such as tagging specific bitcoin wallets as Specially Designated and Blocked – are essentially useless, since hackers can easily create new wallets. As a result, the cost and frequency of ransomware attacks have been increasing rapidly. The FBI estimates that more than 4,000 ransomware attacks have occurred daily since 2016. Moreover, the size of ransom demands has skyrocketed. In just the last few years, ransom demands for businesses have climbed from a few tens of thousands of dollars to millions of dollars. It’s time for a new approach.

A New National Strategy for Ransomware

To stop ransomware attacks, we need to make ransomware unprofitable. In other words, victims need to stop paying ransoms. However, merely making ransom payments illegal likely won’t work and wouldn’t be fair – it would be difficult to enforce and doubly victimize the victims of attacks. Before outlawing ransom payments, we must create a system that provides financial support for ransomware victims to rebuild without paying the ransom. Such a system could be publicly or privately run.

The public option would require the federal government to set up an FDIC-like fund for businesses. It would require that each business over a certain size contribute a small payment each year (perhaps a fraction of a percent of revenue) that would go into a fund. Once the fund was established, a business facing a ransomware attack could obtain funds to rebuild their system and cover a portion of lost profits, provided that they don’t pay any ransom.

The private option would work similarly, but would be administered by insurance companies who have committed to not paying ransoms. If attackers became convinced that businesses covered by this type of anti-ransomware insurance would never pay, organizations may even advertise that they have such insurance to communicate to attackers that it would be fruitless to seek ransoms from them.

Some might object to this arrangement on the theory that the system might incentivize companies to underinvest in cybersecurity. Though that might be a concern, it could be mitigated by requiring companies to publicly announce that they were victims of a successful attack and by ensuring that insurance would only cover costs associated with ransomware attacks, not other types of cyberattacks. There is also a concern that attackers might increase their efforts as the system is being set up to ensure it collapses. In this scenario, a company would never advertise that they have anti-ransomware insurance for fear that it would invite, rather than prevent, attacks. This risk is real and should be acknowledged, but it isn’t so different from the situation we are in now. In our view, it is a risk worth taking.


Tags: CybercrimeRansomware
Previous Post

DOJ Launches 2 Criminal Prosecutions of Illegal No-Poach and Wage-Fixing Agreements

Next Post

General Counsel Post-Pandemic: A Catalyst for Risk Fragmentation

Seth Berman and James Gately

Seth Berman and James Gately

Seth Berman leads Nutter McClennen & Fish LLP’s Privacy and Data Security practice group and teaches a cyber crime law class at Harvard Law School.
James Gately is a Privacy and Data Security associate in Nutter’s Litigation Department.

Related Posts

robot hand pointing to sky

Agentic AI Can Be Force Multiplier — for Criminals, Too

by Steve Durbin
April 21, 2025

How polymorphic malware and synthetic identities are creating unprecedented attack vectors

cyber insurance concept data and umbrella

Think Your Cyber Insurance Has You Covered? Think Again.

by Bill McLaughlin
February 20, 2025

Security audits and compliance frameworks often predict whether insurers will pay your claim

news roundup new

News Roundup: 90% of Businesses Face Elevated Risk Levels Over Technology

by Staff and Wire Reports
June 7, 2024

Business email compromise remains key threat, while online payments industry most frequent ID theft target

Kroll Q3 Threat Landscape Report

Kroll Q3 Threat Landscape Report

by Corporate Compliance Insights
November 16, 2023

“Human hacking,” better known as social engineering, is surging Social engineering takes center stage Kroll Q3 Threat Landscape Report What’s...

Next Post
challenge and solution concept with person standing at large gap

General Counsel Post-Pandemic: A Catalyst for Risk Fragmentation

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights