16/5/25 | Read time: 4 min
The Cyber Security Act became law on 29 November 2024.
In part 2 of our 4 part series, we discuss the key considerations for businesses on mandatory ransomware reporting obligations under the Cyber Security Act.[1]
The Government explained that mandatory reporting is to provide much needed intelligence to formulate appropriate policy responses to ransomware payments.[2]
However, the measure appears to have a secondary indirect effect of discouraging businesses from making ransomware payments.
The key nuance is that the measure catches ransomware payments, not demands.[3] Mandatory ransomware reporting is only triggered if a ransomware payment is made. If a business does not make the ransomware payment, it is not required to report the ransomware demand (though may voluntarily do so to obtain assistance or may be required to by the Cyber Incident Review Board (covered in part 3 of this blog series)).
It is unclear if this was intended. The Government considered that ransomware payments fund criminal enterprises so there is a strong policy argument against this. However, the sensitivity of compromised data and the potential harm makes an outright ban of ransomware payments too broad brush and problematic.[4] Requiring mandatory reporting may be a softer first step towards shaping business decisions around whether to pay.
Given that mandatory reporting is triggered by ransomware payment, there is now a regulatory overlay to a decision whether to pay.
Overall, this makes deciding whether to pay weightier and forces affected businesses to think twice before doing so (linking back to the point above about nudging behaviour to ransomware demands).
Mandatory reporting obligations apply to an entity where ransomware payments are indirectly made by the entity or on its behalf in relation to a ransomware incident.
This is relevant to ransomware payments by international corporate groups and affected businesses in relation to ransomware incidents on unrelated third parties. Consider the following:
(a) Australian company is part of an international group.
The group suffers a ransomware attack, disabling its system or locking up its data, including those of the Australian company. A non-Australian member of the group makes the ransomware payment. The Australian company may be required to report the ransomware payment.
(b) Australian company buys IT solutions from a supplier.
The supplier may be overseas or does not meet the mandatory reporting turnover threshold. The supplier suffers a ransomware attack which disables the system purchased by the Australian company or locks up the Australian company’s data. The supplier receives a ransomware payment demand. The Australian company pays to ensure business continuity. The Australian company may be required to report the ransomware payment.
These scenarios are entirely possible given the international nature and connectivity of IT supply, systems and networks. Australian business should be aware and ready of their reporting obligations in these situations of indirect ransomware payments.
It remains to be seen how this new measure will be applied and enforced. To be prepared in an uncertain environment, the above points show businesses should focus on:
For any assistance with your mandatory ransomware reporting obligations under the Cyber Security Act, contact us today.