A new Senate report finds the government is unprepared to stop ransomware attacks

In the past few years, ransomware attacks have crippled schools, hospitals, city governments, and pipelines. Yet, despite the heavy toll such incidents have on both the public and private sectors, government officials have only a limited understanding of ransomware attacks and how cryptocurrencies are being used to collect payment, according to a new report from the Senate Homeland Security and Governmental Affairs Committee. “Cryptocurrencies—which allow criminals to quickly extort huge sums of money, can be anonymized, and do not have consistently enforced compliance with regulations, especially for foreign-based attackers—have further enabled cybercriminals to commit disruptive ransomware attacks that threaten our national and economic security,” said Michigan Senator Gary Peters, the committee’s chair, in a statement. “My report shows that the federal government lacks the necessary information to deter and prevent these attacks, and to hold foreign adversaries and cybercriminals accountable for perpetrating them.” Part of the issue is in reporting: The federal government doesn’t have a standardized place for victims to log ransomware attacks, which typically encrypt data until a ransom is paid in cryptocurrency. Both the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have websites where victims can report incidents, and some people report the attacks directly to their local FBI field offices—all of which can leave people unsure of where to turn and lead to different agencies having records of different incidents. Financial regulators, including the Treasury Department’s Financial Crimes Enforcement Network, also gather some data on ransomware, particularly around payments, but it’s also far from comprehensive. A new law passed by Congress in March, as part of a broad government funding bill, will soon require operators of “critical infrastructure” to report to CISA within 72 hours when they’ve been the victims of a “substantial cyber incident,” and within 24 hours of paying a ransom, but the provision hasn’t yet gone into effect, pending regulatory decisions by CISA. As of now, many incidents likely go unreported: According to the report, the FBI received 3,729 complaints in 2021 with losses of more than $49.2 million, up from previous years, but anti-malware software provider Emsisoft estimated 24,770 ransomware incidents in the U.S. back in 2019, with total costs just under $10 billion. And a report from blockchain data analytics company Chainalysis estimated at least $692 million in cryptocurrency paid in ransom alone in 2020. The lack of data hampers officials’ ability to understand who’s being victimized, who’s behind ransomware attacks, and what can be done to aid victims and stop future attacks, according to the Senate report. “Aggregated and anonymized data from increased incident reporting could help inform policies regarding potential federal assistance for excessively burdened ransomware victims,” the report reads. “Increased reporting may also shed light on the specific burdens faced by small- and medium-size businesses, such as inability to access high cost prevention methods and the drastic economic consequences of these attacks.” The report calls on the Biden administration to quickly implement regulations around the new law requiring reports around critical infrastructure. It also suggested that agencies standardize how they track ransomware attacks and ransoms paid. And, according to the report, Congress should take action to facilitate sharing ransomware info between agencies and with private sector companies and academic researchers that are already doing their own research. “The continuing flow of ransom payments has encouraged illicit actors and contributed to a growing threat to businesses, the public, and to national security,” the report reads. “The lack of comprehensive data on these attacks prevents the U.S. government from developing a full picture of cyber threats.”

https://www.fastcompany.com/90755203/a-new-senate-report-finds-the-government-is-unprepared-to-stop-ransomware-attacks?partner=rss&utm_source=rss&utm_medium=feed&utm_campaign=rss+fastcompany&utm_content=rss

Établi 3y | 24 mai 2022 à 19:21:22


Connectez-vous pour ajouter un commentaire

Autres messages de ce groupe

What to know about the American Airlines jet and Army helicopter that collided over D.C.

The Army helicopter and regional American Airlines jet that collided over Washington are both workhorse aircraft that operate around the world on a daily basis.

There were 60 passengers

30 janv. 2025 à 22:10:09 | Fast company - tech
How Apple Vision Pro is finding a home in healthcare

In early 2024, Ryan Broderick, a surgeon at UC San Diego Health, was commiserating with some colleagues about the profusion of screens in today’s operating rooms. Though the displays provided essen

30 janv. 2025 à 22:10:08 | Fast company - tech
If you were bored watching videos at a plodding 2x speed, you’re in luck: They can go faster

MrBeast’s fast-cutting, non-stop dramatics are already quick enough. Now, some users can watch his videos (and more) at 4x speed.

YouTube is continuing their push for pace. In a

30 janv. 2025 à 22:10:07 | Fast company - tech
After a week of DeepSeek freakout, doubts and mysteries remain

Welcome to AI DecodedFast Company’s weekly newsletter that breaks down the most important news in the world of AI. You can sign up to receive this newsletter ever

30 janv. 2025 à 19:50:02 | Fast company - tech
Microsoft posts 10% growth for Q4 as it plans to spend $80 billion on AI

Microsoft said Wednesday that its profit for the October-December

30 janv. 2025 à 17:30:05 | Fast company - tech
Tesla’s Q4 results fell short of Wall Street’s forecasts. Here’s why

Tesla’s fourth-quarter adjusted profits rose slightly amid a big p

30 janv. 2025 à 15:10:09 | Fast company - tech