216.696.8700

Ransomware Warning: White House Issues Advisory to Business Leaders

June 3, 2021
NCAA

In the wake of the highly publicized attacks on both gasoline and food infrastructures by Russian-based ransomware attackers, the Biden administration on June 3 issued an advisory to business leaders directing them to take action to harden their systems against ransomware and to be more resilient against similar attacks. It has also been reported that President Biden intends to discuss the issue of Russian-based cyber attacks on U.S. critical infrastructure when he meets with President Vladimir Putin later this month.

The ransomware memo, issued by Deputy National Security Advisor for Cyber and Emerging Technology Anne Neuberger, called upon private sector companies — particularly those in the critical infrastructure — to recognize and respond to the threats posed by ransomware attacks. Neuberger’s memo noted:

“All organizations must recognize that no company is safe from being targeted by ransomware, regardless of size or location. Much as our homes have locks and alarm systems and our office buildings have guards and security to meet the threat of theft, we urge you to take ransomware crime seriously and ensure your corporate cyber defenses match the threat.”

“To understand your risk, business executives should immediately convene their leadership teams to discuss the ransomware threat and review corporate security posture and business continuity plans to ensure you have the ability to continue or quickly restore operations,” she added.

Government Recommendations Against Ransomware

When it came to solutions — particularly solutions that the government might make available to the private sector, the memo seemed a bit more ephemeral. It recommended that companies harden their systems against phishing attacks, the principal vector for ransomware infiltration, and to implement multifactor authentication as part of their anti-phishing protocols. The memo also recommended strengthening and training the security staff on ransomware responses, having more robust data backup and restoration, and encrypting data at rest to prevent or deter extortionware. This is in addition to things like patch management, restricting access to files and networks.

Among the steps Neuberger said companies should take are implementing multifactor authentication, bolstering security teams, regularly testing backups and updating patches, testing incident response plans and separating and limiting internet access to operational networks.

In other words – duh.

Threat of Criminal Prosecution for Companies that Pay Ransoms

At the same time that the government is recommending that companies be prepared for the threat of ransomware and have robust systems to respond to ransomware attacks, it is also threatening to criminally prosecute not the ransomware attackers, but the companies that, either directly or through digital incident response or insurance companies, pay ransoms to get access to their data back. Late last year, both the Treasury Department and financial regulators issued warnings that the payment of ransom by victims may violate U.S. and international restrictions on conducting business with “prohibited entities,” and that a license from the Treasury Department’s Office of Foreign Asset Control might be needed to be permitted to pay the ransom — particularly in cryptocurrency. The government also warned entities paying ransom that they are subject to prosecution for violating the “know your customer,” “anti-money laundering” and “money transfer agent” statutes, if they pay or facilitate the payment of ransom. That’s public/private cooperation for you.

Analyzing Neuberger’s Memo

Neuberger noted that “The U.S. Government is working with countries around the world to hold ransomware actors and the countries who harbor them accountable, but we cannot fight the threat posed by ransomware alone. The private sector has a distinct and key responsibility. The federal government stands ready to help you implement these best practices.” However, the memo did not commit the government — particularly the law enforcement or intelligence agencies — to sharing data about ransomware threat actors, their identity, their methodologies or their networks with the private sector. It’s not clear that such robust information sharing would be successful in mitigating the threat of ransomware, but the government has certainly encouraged the private sector to report ransomware attacks and to share information with the government. It’s not clear that the government is committed to sharing this information the other way.

Moreover, while the government seems to see encryption of data as a partial solution to the problem of ransomware (actually, extortionware) the FBI and intelligence agencies have insisted that encryption technologies be developed and deployed that would allow the government (governments?) that would prevent “warrant-proof” encryption. In other words (and the government would disagree with this accurate assessment) back doors to encryption.

The Neuberger memo also did not discuss whether the government could (or would) provide some kind of subsidy to companies that cannot afford the level of security that the government deems necessary, or provide resources (or tax breaks) to encourage the deployment of such security resources. It simply recommends that companies continue to have “good security hygiene” — you know, things we should be doing anyway. And even if every company did this, it’s not clear that this would prevent ransomware — just make it somewhat less pervasive, or make the attackers that much more clever.

It’s kind of like when you were a kid carrying a bunch of breakables, and your mom would say helpfully, “hey — don’t drop that…”  Thanks, mom.

If you have questions about your company’s cyber strategy or how to protect against threats of ransomware, contact KJK Cyber Security attorney Mark Rasch at mdr@kjk.com or 301.547.6925