News & Analysis as of

Ransomware Extortion

Akin Gump Strauss Hauer & Feld LLP

New CISA Cybersecurity Incident Reporting Requirements Proposed for Critical Infrastructure Companies

On April 4, 2024, the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) officially published its Notice of Proposed Rulemaking (NPRM) detailing significant new cybersecurity...more

Patterson Belknap Webb & Tyler LLP

Recent Ransomware Attacks Highlight the Evolving Challenges in Responding to Cyber Extortion

A spate of recent ransomware attacks illustrates the increasingly difficult calculations that businesses face following the theft or encryption of their data....more

Guidepost Solutions LLC

Cyber Bullets for Small Law Firms

In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more

ASKramer Law

Digital Asset Theft Loss Deductions are More Complicated Than You Think

ASKramer Law on

Taxpayers can take a tax deduction with respect to “theft” losses that result from an illegal “taking of property” done with criminal intent. Among various other types of criminal activities, fraud is treated as theft under...more

BakerHostetler

DSIR Deeper Dive: 2023 Crypto Threat Landscape

BakerHostetler on

Following one of the most turbulent years in crypto history, 2023, in contrast, unfolded as a year of reprieve, including from crypto threats. According to a July 12, 2023, report from blockchain analytics firm Chainalysis,...more

Kohrman Jackson & Krantz LLP

Sextortion, Deepfakes, and AI Scams: How to Protect Children from Cyberattacks

Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more

Kohrman Jackson & Krantz LLP

A New Twist in the Ransomware Debate: Is it Negligent to Fail to Pay Ransom?

Lehigh Valley Health Network (LVHN) is a healthcare network based in Allentown, Pennsylvania, and serves eastern and northeastern Pennsylvania. On Feb. 6th of this year, LVHN was hit with a combination ransomware and...more

Dechert LLP

Dechert Cyber Bits - Issue 27

Dechert LLP on

FBI Seizes Hive Ransomware Servers—Blocks US$130 Million in Demanded Ransoms - On January 26, Attorney General Merrick Garland announced that the Department of Justice dismantled the “Hive” ransomware group, which had...more

BakerHostetler

For Educational Institutions, Post-Ransomware Harassment Requires A+ Messaging

BakerHostetler on

Educational institutions have not been excluded from the ransomware epidemic, and stakeholder communications are critical to an effective response. In a typical double-extortion ransomware attack, threat actors demand that...more

BakerHostetler

NYDFS Proposed Amendments to Its Cybersecurity Rules

BakerHostetler on

​​​​​​​On July 29, the New York Department of Financial Services (NYDFS) released Draft Amendments to its Part 500 Cybersecurity Rules that include a number of significant amendments to the rules, including notification...more

Wiley Rein LLP

Multi-Faceted Extortion: Insider Look at Ransom Payments and Cyber Defense

Wiley Rein LLP on

Day 3 at RSA Conference 2022 was filled with fascinating discussions on enhancing our cyber defenses to defeat the ever-proliferating spate of increasingly common and expensive ransomware attacks....more

Orrick - Finance 20/20

FinCEN Urges Financial Institutions to Focus on Detecting Proceeds of Foreign Public Corruption

Orrick - Finance 20/20 on

The Financial Crimes Enforcement Network (“FinCEN”) recently issued an advisory urging financial institutions (including certain cryptocurrency businesses) to implement controls to help detect proceeds of foreign public...more

Fenwick & West LLP

To Pay or Not to Pay: Five Critical Approaches to Beating a Ransomware Threat

Fenwick & West LLP on

It’s the call you hope you never get. Your company has been hit with a ransomware attack. Your systems are offline. Your customer data was stolen by an unknown threat actor who is threatening to leak it. You have lots of...more

Alston & Bird

US, UK, and Australia Issue Joint Cybersecurity Advisory on Ransomware Threat to Critical Infrastructure

Alston & Bird on

On February 9, 2022 the United States, United Kingdom, and Australia issued a joint Cybersecurity Advisory on the “Increased Globalized Threat of Ransomware” against critical infrastructure sectors (“Advisory”).  The Advisory...more

Pillsbury - Internet & Social Media Law Blog

The Many-Headed Threat of Ransomware

It may seem that the very term “ransomware” wasted little time going from “newish-sounding threat” to expected, constant presence in the news and IT meetings alike. But, of course, it’s ultimately just a modern word for one...more

Burr & Forman

U.S. and Europe Target Top Ransomware Cartel

Burr & Forman on

An international law-enforcement effort has led to the arrest of multiple individuals affiliated with the most prolific ransomware cartel operating today. In November, Justice Department officials announced indictments and an...more

Lowenstein Sandler LLP

Ransomware Case Signifies Shift In Cyber Insurers' Stance

Lowenstein Sandler LLP on

Ransomware attacks are on the rise. Lax security measures, which have become more acute in the work-from-home environment, continue to be exploited. Companies' systems are hacked into, their data is encrypted, and they face...more

Morrison & Foerster LLP

OFAC Issues New Ransomware Guidance And First Sanctions Designation Against Virtual Currency Exchange

In the Biden Administration’s latest effort to respond to the growing threat of ransomware attacks, on September 21, 2021, the U.S. Department of the Treasury (“Treasury”) announced new sanctions and ransomware guidance in an...more

Alston & Bird

EU Spotlight: Top 6 Issues All General Counsel Need to Know About Ransomware

Alston & Bird on

Ransom demands from cyber-attacks show no signs of slowing down, and the costs—both from ransom payments and repairing the damage—are rising precipitously. Our Privacy, Cyber & Data Strategy Team outlines six ways companies...more

Alston & Bird

DOJ Seizure of Ransom Payment Signals More Aggressive Stance by U.S. Government

Alston & Bird on

Following the creation of the DOJ’s Ransomware and Digital Extortion Task Force in April 2021 and on the heels of the Biden administration’s characterization of ransomware as a national security threat, on June 7, 2021, the...more

Pillsbury - Policyholder Pulse blog

Insuring a King’s Ransom: The Role of Cyber Insurance in Ransomware Risk Management

Nearly 700 years ago, England captured King John II of France and held him for ransom for four million écus. But France could not afford to pay, and King John II ultimately traded his two sons as substitute hostages to try...more

Miller Canfield

Cyber-Attacks On The Rise: COVID-19 Scams to Watch Out For

Miller Canfield on

As the COVID-19 pandemic unfolds, we are witnessing countless stories of courageous men and women rising up to face the challenges and obstacles of this crisis. Unfortunately, crisis also presents opportunity for unscrupulous...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2020 #3

Robinson & Cole LLP on

Natural Gas Compressor Facility Shut Down After Ransomware Attack - The Department of Homeland Security (DHS) announced this week that a ransomware attack shut down a natural gas compressor facility for two days. While in...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #227 – Sextortion Ransomware

Criminal minds are creative, and new ransomware strains show just how creative cyber-attackers can be. A new strain of ransomware, dubbed Ransomwared, requests a different kind of payment from the victim than the typical...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Fueling the Fire: How Extortion Has Changed the Face of Data Breaches

Ransomware attackers typically encrypt victims’ data and demand ransom in exchange for the decryption keys. Ransomware is not a new cybercriminal activity. In fact, ransomware attacks are over 30 years old. However, around...more

36 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide