Beware Of Paying That Ransomware Threat

Lowenstein Sandler LLP
Contact

Security - December 31, 2020

At a time when the U.S. healthcare system is already overwhelmed by the COVID-19 pandemic, hospitals and healthcare companies have been hit with an unprecedented number of ransomware attacks. A joint cybersecurity advisory issued on October 29, 2020 by the FBI, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency and the Department of Health and Human Services warns that it will only get worse, assessing that there is “an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.”

Ransomware has already demonstrated its capability to disrupt and devastate organizations beyond healthcare companies: large corporations, small businesses and startups, municipalities and government entities are all vulnerable. In 2020 alone, victims of the 11 biggest ransomware attacks spent over $144 million on investigations, restorations and preventative measures, in addition to actual ransom payments.

Now companies face even more risk if they pay these ransoms. In October 2020, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) advised that companies may violate U.S. sanctions laws if they make ransomware payments to certain cybercriminals. This warning applies to not just hospitals and healthcare providers, but also financial institutions, insurance firms, cybersecurity and forensic businesses, and technology firms that could be in any way involved in the transfer of funds for this purpose.

The U.S. Government notes that facilitating ransomware payments can further enable criminals to further their illicit activities. Additionally, payments made to certain actors or embargoed nations could be used to fund activities adverse to U.S. national security. The International Emergency Economic Powers Act (IEEPA) prohibits U.S. citizens from engaging in transactions with any entity on the Specially Designated Nationals and Blocked Persons List (SDN List). These sanctions are imposed with strict liability: a victim may be held liable even if they did not know they were conducting a transaction with a prohibited entity.

OFAC has added certain known cybercriminals to its Specially Designated Nationals and Blocked Persons List (SDN List), prohibiting U.S. persons and companies from conducting transactions with them. Moreover, OFAC sanctions prohibit transactions involving individuals located in embargoed countries, such as Cuba, Iran, North Korea, Syria and the Crimea region of Ukraine. Therefore, if a victim organization pays one of these SDNs or an entity in an embargoed location to release critical information that is being held hostage by ransomware, even where the payment is made in order to save a business or even lives, it may be exposed to sanctions.

So, what should an enterprise do if it has been the victim of a cyberattack, or if it assists the victim of a cyberattack when a prohibited entity demands payment for the release of critical data?

In addition to building sufficient cybersecurity controls, companies must make sure they have in place an effective compliance program, including screening tools that would notify the company if an individual or organization is an SDN, to mitigate the risk of sanction violations and penalties. Companies that are subject to ransomware attacks that may have been conducted by an SDN should consider engaging law enforcement, as OFAC may consider such cooperation as a mitigating factor in assessing penalties.

Reprinted with permission from the December 31, 2020, issue of Security. © 2020-2021 BNP Media. All Rights Reserved.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Lowenstein Sandler LLP | Attorney Advertising

Written by:

Lowenstein Sandler LLP
Contact
more
less

Lowenstein Sandler LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.