New law in Australia will require mandatory reporting of ransomware payments

Avatar

Australia is set to become the world’s first country to require companies to report to the government any ransomware payments they make as part of a “landmark” new Cyber Security Bill introduced to the Australian Federal Parliament on Thursday.

It comes as cybersecurity has shot up the political agenda in Australia, spurred by a series of high-profile cyberattacks against private businesses, including those affecting Optus, Medibank and MediSecure.

These incidents were followed by an updated national cybersecurity strategy published last November. The strategy was costed at AU$587 million ($382 million) over the next seven years with the intention of preventing AU$3 billion ($1.9 billion) in annual damages caused by ransomware attacks on the Australian economy.

The new Cyber Security Bill 2024 aims to implement seven initiatives set out in that strategy, according to the Australian government, some of which will see the country’s legislation aligned with what is considered best practice elsewhere in the world, while other provisions are the first of their kind.

The most notable and unique aspect of the proposed law is its section on reporting obligations that will apply to all business entities that generate enough revenue to declare it to the tax authorities. Businesses that are impacted by an incident will only have a duty to report to the government in the case they, or someone acting on their behalf, makes a payment to the attackers.

Those who fail to make a report within 73 hours of making an extortion payment will be subject to 60 penalty units under the country’s civil penalty system, equivalent to a fine of around AU$18,000 ($12,000).

In a memorandum accompanying the bill, the Australian government warned: “Ransomware and cyber extortion attacks remain one of the most destructive types of cybercrime. These attacks present a persistent threat to Australia.”

Visibility over ransomware attacks and payments has been a significant challenge for multiple governments dealing with the increasingly successful cybercrime ecosystem.

“Current voluntary reporting mechanisms are underutilised and consequently, ransomware and cyber extortion attacks remain significantly underreported,” stated the Australian government on Thursday.

“The Australian Institute of Criminology indicates that only one in five victims of a ransomware attack report the attack. As a result, government lacks visibility of the economic and social impact of ransomware in Australia.”

Tony Burke, the Australian minister for cybersecurity, told Parliament: “In 2023 it was estimated that Australian businesses who paid in response to ransomware attacks paid an average of $9.27 million. This issue needs to be tackled.

“Mandatory reporting of ransomware payments will crystalise our picture of how much is being extorted from businesses via ransomware attacks, whom these payments are being made to and how.” 

The bill’s other provisions include specifying security standards for smart devices — including banning default passwords, similar to the United Kingdom’s  Product Security and Telecommunications Infrastructure Act 2022 (PSTI) and the European Union’s  Cyber Resilience Act.

Further measures include supporting cooperation between government and industry by protecting information sharing between the two parties, and establishing a Cyber Incident Review Board to investigate major incidents — similar to what is set out in EU legislation.

The bill will be now reviewed by the Parliamentary Joint Committee on Intelligence and Security for amendments.

GovernmentCybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

DDoS attacks on Internet Archive continue after data breach impacting 31 million

Next Post

Russian cyber firm Dr.Web denies data leak by pro-Ukraine hackers

Related Posts

New Android Malware ‘Ajina.Banker’ Steals Financial Data and Bypasses 2FA via Telegram

Bank customers in the Central Asia region have been targeted by a new strain of Android malware codenamed Ajina.Banker since at least November 2023 with the goal of harvesting financial information and intercepting two-factor authentication (2FA) messages. Singapore-headquartered Group-IB, which discovered the threat in May 2024, said the malware is propagated via a network of Telegram channels
Avatar
Read More

FTC proposes tougher children’s data privacy rules for first time in a decade

The Federal Trade Commission (FTC) is proposing new restrictions on the use and disclosure of children’s personal data and wants to make it much harder for companies to exclude children from their services if they can’t monetize their data, the agency announced Wednesday.
Jason Macuray
Read More