A new Senate report finds the government is unprepared to stop ransomware attacks

In the past few years, ransomware attacks have crippled schools, hospitals, city governments, and pipelines. Yet, despite the heavy toll such incidents have on both the public and private sectors, government officials have only a limited understanding of ransomware attacks and how cryptocurrencies are being used to collect payment, according to a new report from the Senate Homeland Security and Governmental Affairs Committee. “Cryptocurrencies—which allow criminals to quickly extort huge sums of money, can be anonymized, and do not have consistently enforced compliance with regulations, especially for foreign-based attackers—have further enabled cybercriminals to commit disruptive ransomware attacks that threaten our national and economic security,” said Michigan Senator Gary Peters, the committee’s chair, in a statement. “My report shows that the federal government lacks the necessary information to deter and prevent these attacks, and to hold foreign adversaries and cybercriminals accountable for perpetrating them.” Part of the issue is in reporting: The federal government doesn’t have a standardized place for victims to log ransomware attacks, which typically encrypt data until a ransom is paid in cryptocurrency. Both the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have websites where victims can report incidents, and some people report the attacks directly to their local FBI field offices—all of which can leave people unsure of where to turn and lead to different agencies having records of different incidents. Financial regulators, including the Treasury Department’s Financial Crimes Enforcement Network, also gather some data on ransomware, particularly around payments, but it’s also far from comprehensive. A new law passed by Congress in March, as part of a broad government funding bill, will soon require operators of “critical infrastructure” to report to CISA within 72 hours when they’ve been the victims of a “substantial cyber incident,” and within 24 hours of paying a ransom, but the provision hasn’t yet gone into effect, pending regulatory decisions by CISA. As of now, many incidents likely go unreported: According to the report, the FBI received 3,729 complaints in 2021 with losses of more than $49.2 million, up from previous years, but anti-malware software provider Emsisoft estimated 24,770 ransomware incidents in the U.S. back in 2019, with total costs just under $10 billion. And a report from blockchain data analytics company Chainalysis estimated at least $692 million in cryptocurrency paid in ransom alone in 2020. The lack of data hampers officials’ ability to understand who’s being victimized, who’s behind ransomware attacks, and what can be done to aid victims and stop future attacks, according to the Senate report. “Aggregated and anonymized data from increased incident reporting could help inform policies regarding potential federal assistance for excessively burdened ransomware victims,” the report reads. “Increased reporting may also shed light on the specific burdens faced by small- and medium-size businesses, such as inability to access high cost prevention methods and the drastic economic consequences of these attacks.” The report calls on the Biden administration to quickly implement regulations around the new law requiring reports around critical infrastructure. It also suggested that agencies standardize how they track ransomware attacks and ransoms paid. And, according to the report, Congress should take action to facilitate sharing ransomware info between agencies and with private sector companies and academic researchers that are already doing their own research. “The continuing flow of ransom payments has encouraged illicit actors and contributed to a growing threat to businesses, the public, and to national security,” the report reads. “The lack of comprehensive data on these attacks prevents the U.S. government from developing a full picture of cyber threats.”

https://www.fastcompany.com/90755203/a-new-senate-report-finds-the-government-is-unprepared-to-stop-ransomware-attacks?partner=rss&utm_source=rss&utm_medium=feed&utm_campaign=rss+fastcompany&utm_content=rss

Utworzony 3y | 24 maj 2022, 19:21:22


Zaloguj się, aby dodać komentarz

Inne posty w tej grupie

Texas flood recovery efforts face an unexpected obstacle: drones

The flash floods that have devastated Texas are already a difficult crisis to manage. More than 100 people are confirmed dead

8 lip 2025, 17:40:02 | Fast company - tech
The internet is trying—and failing—to spend Elon Musk’s $342 billion

How would you spend $342 billion?

A number of games called “Spend Elon Musk’s Money” have been popping up online, inviting users to imagine how they’d blow through the

8 lip 2025, 15:20:07 | Fast company - tech
What happened at Wimbledon? ‘Human error’ blamed for ball-tracking tech mishap

The All England Club, somewhat ironically, is blaming “human error” for a glaring mistake by the electronic

8 lip 2025, 15:20:04 | Fast company - tech
Elon Musk has ‘fixed’ Grok—to be more like him than ever

As Elon Musk announced plans over the Fourth of July weekend to establish a third political party,

8 lip 2025, 12:50:09 | Fast company - tech
Dr. Becky is the parenting guru for the social media era. Now she’s an AI chatbot, too

Dolores Ballesteros, a Mexico-based mother of two, was getting desperate. Her 6-year-old son kept hitting his brother, age 3, and seemed angry at her all the time. No matter what she did, she coul

8 lip 2025, 12:50:07 | Fast company - tech