UK Plans To Ban Public Sector Organizations From Paying Ransomware Hackers (techcrunch.com) 15
U.K. public sector and critical infrastructure organizations could be banned from making ransom payments under new proposals from the U.K. government. From a report: The U.K.'s Home Office launched a consultation on Tuesday that proposes a "targeted ban" on ransomware payments. Under the proposal, public sector bodies -- including local councils, schools, and NHS trusts -- would be banned from making payments to ransomware hackers, which the government says would "strike at the heart of the cybercriminal business model."
This government proposal comes after a wave of cyberattacks targeting the U.K. public sector. The NHS last year declared a "critical" incident following a cyberattack on pathology lab provider Synnovis, which led to a massive data breach of sensitive patient data and months of disruption, including canceled operations and the diversion of emergency patients. According to new data seen by Bloomberg, the cyberattack on Synnovis resulted in harm to dozens of patients, leading to long-term or permanent damage to their health in at least two cases.
This government proposal comes after a wave of cyberattacks targeting the U.K. public sector. The NHS last year declared a "critical" incident following a cyberattack on pathology lab provider Synnovis, which led to a massive data breach of sensitive patient data and months of disruption, including canceled operations and the diversion of emergency patients. According to new data seen by Bloomberg, the cyberattack on Synnovis resulted in harm to dozens of patients, leading to long-term or permanent damage to their health in at least two cases.
Screw Javascript (Score:5, Insightful)
and sites that require javascript can go to hell.
Cloud (Score:2)
Doesn't this seem like an opportunity for a government to standardize and require a few different approved cloud setups?
It also would include approved and verified security for each cloud solution.
I've a much better idea. (Score:2)
1. Databases should never be directly reachable. Neither should any other type of server. Internal networks should access via some sort of intermediate, such as a higher level server, so that no software on users' machines can cause damage to data.
2. Nothing on internal networks should be exposed to the public Internet. If remote sites need access, use a secure extranet.
Illegal for everyone (Score:5, Interesting)
Paying random should be illegal, period. Paying ransom is funding a criminal enterprise, and should be punished as such.
No backups? No practiced disaster recovery process? Tough, do better.
Re: (Score:3)
Agree - the only way to protect companies from being targets is to make sure that they can't pay.
The way to do it would be to fine companies who pay ransomware an amount equal to 10x the loss they would have experienced from not paying it.
Re: (Score:2)
Yup.
If said criminal knows they can't get money from a target, said criminal doesn't really have any incentive to ransom that target.
Tolerating ransom payments is why there are ransom demands.
Easy workaround -- hire a consulting firm. (Score:2)
Very easy way to work around this, and it works well here in the US, where technically giving money to North Korean operators is illegal... but not enforceable:
1: Hire an offshore consulting firm. The ransom is $10,000, so the company pays the consulting firm $11,000 or so.
2: The consulting firm pays the ransomware operators their $10,000.
3: The decryption keys get passed to the company, with the memo that the consulting firm "broke the encryption", just for that company.
4: ????
5: The company slaps a
Re: (Score:2)
Very easy way to fix that loophole: ban the organizations from paying an offshore company, if it's not already the case.
Re: (Score:2)
I don't see how this can be possible in the US. Especially with the reliance on offshore labor and offshore companies to do everything, be it manufacturing a product, staffing the internal helpdesk, designing products, or even mass production.
Even if it were, the offshore company just needs to have a small office in the US, and they are home free.
Would be nice if government could do something about this, but unlike China where government controls business, it is the opposite here. I wouldn't be surprised
holding people accountable. (Score:1)
The obvious answer (Score:2)
Treat attempts at data ransom the same as hardware failures
Be prepared for both with a robust backup strategy
While they are at it, (Score:2)
If I can do it at home, surely public bodies can do the same?
Yes, the UK Government sector is the target (Score:1)
Dear UK Government Officials.
Hackers really don't care about you. You're target-PRACTICE. They're really going after wealthy fortune-500 companies you don't have. Don't worry. When one of your companies becomes successful they move somewhere they can grow and thrive, and that's not LakenHeathByTheThemes or ShoresideDownByCrownPhilip.
But hey you go passing laws that affect nothing. How's that setting sun doing on your empire?
Mod me a troll. It's not often I get to troll an entire empire drowning in its