Data Privacy Detective Podcast – Episode 69: Negotiating With Digital Kidnappers

FB
Frost Brown Todd

Contributor

Frost Brown Todd is a full-service law firm with more than 575 lawyers operating in 17 offices across nine states and Washington, D.C. Dedicated to refining the art of client service, we leverage technical, industry and legal knowledge and hands-on experience to serve a diverse client base, from leading multinationals to small, entrepreneurial companies.
Ransomware. It's in the headlines. It's digital organized crime across borders.
United States Privacy
To print this article, all you need is to be registered or login on Mondaq.com.

Ransomware. It's in the headlines. It's digital organized crime across borders.

When an organization's IT system freezes with its data locked by a ransomware gang, what happens? Ransom is demanded, and ransom often gets paid. But how does this work?

In this podcast episode, Bill Repasky, attorney with Frost Brown Todd LLC, shares key insights on the process of negotiating with ransomware criminals. They want payment in cryptocurrency. Victims want their data and systems restored. This becomes a business transaction. But not a typical one.

Ransomware strikes in 2021 involve highly sophisticated criminal syndicates. To them it's about the money. When they strike a target and freeze the organization's ability to operate an IT system, they reveal their digital identity and dictate how to send a ransom payment. The target may be willing to pay – but should do so only after negotiations to ensure that the payment will accomplish two essential objectives – (1) providing a decryption key to unlock the encrypted data and restore the IT system's operation; and (2) ensuring that the data has not been taken (exfiltrated) by the criminals, or if it has, to have it returned with no copies kept by the criminals. The victim organization should check before making payment to be certain it does not violate U.S. sanctions laws by paying a group or person listed on the OFAC list. See Specially Designated Nationals And Blocked Persons List (SDN) Human Readable Lists | U.S. Department of the Treasury.

Successful conclusion of a ransomware attack requires expertise, patience, and insight. Learn how it's done, pitfalls to avoid, lessons from past victims.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

We operate a free-to-view policy, asking only that you register in order to read all of our content. Please login or register to view the rest of this article.

Data Privacy Detective Podcast – Episode 69: Negotiating With Digital Kidnappers

United States Privacy

Contributor

Frost Brown Todd is a full-service law firm with more than 575 lawyers operating in 17 offices across nine states and Washington, D.C. Dedicated to refining the art of client service, we leverage technical, industry and legal knowledge and hands-on experience to serve a diverse client base, from leading multinationals to small, entrepreneurial companies.
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More