US law passed forcing companies to report cyber attacks, ransomware payments
Operators of critical infrastructure will face a subpoena for failing to report cyber incidents


Legislation aiming to force critical infrastructure companies to declare when they have experienced a cyber attack was approved by the Senate on Friday.
The cross-party provision, authored by US senators Gary Peters and Rob Portman, aims to enhance the nation’s ability to combat ongoing cyber security threats against critical infrastructure.
It passed the Senate as part of government funding legislation and the last step it faces is being signed into law by President Biden.
The provision requires critical infrastructure owners and operators to report to CISA within 72 hours if they’re experiencing a substantial cyber attack, and within 24 hours of making a ransomware payment.
It also gives CISA the authority to subpoena entities that fail to report cyber security incidents or ransomware payments. Organisations that fail to comply with the subpoena can be referred to the Department of Justice.
The provision also requires CISA to launch a programme that warns organisations of vulnerabilities that ransomware actors exploit. It also directs CISA’s director to establish a joint ransomware task force to coordinate federal efforts, in consultation with industry, to prevent and disrupt ransomware attacks.
The Homeland Security and Governmental Affairs US Senate Committee said that once signed into law, the provision will mark a significant step to help the US combat potential cyber attacks sponsored by foreign adversaries, including online threats from the Russian government in retaliation for US support in Ukraine.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
“This provision will create the first holistic requirement for critical infrastructure operators to report cyber incidents so the federal government can warn others of the threat, prepare for widespread impacts, and help get our nation’s most essential systems back online so they can continue providing invaluable services to the American people,” said senator Peters, chairman of the committee. “Our provision will also ensure that CISA – our lead cyber security agency – has the tools and resources needed to help reduce the impact that these online breaches can have on critical infrastructure operations.”
CISA director Jen Easterly said the organisation applauds the passage of cyber incident reporting legislation, calling it a game-changer. She underlined that CISA will now have the data and visibility it needs to help better protect critical infrastructure and businesses across the country from cyber attacks.
RELATED RESOURCE
The best defence against ransomware
How ransomware is evolving and how to defend against it
“CISA will use these reports from our private sector partners to build a common understanding of how our adversaries are targeting U.S. networks and critical infrastructure,” said Easterly. “This information will fill critical information gaps and allow us to rapidly deploy resources and render assistance to victims suffering attacks, analyse incoming reporting across sectors to spot trends, and quickly share that information with network defenders to warn other potential victims.”
The US has been seeking to bolster its cyber defences, as in February it announced it would consider proactively disrupting cyber criminals’ operations even if doing so might impede the state’s ability to arrest and indict the alleged perpetrators. The measures it is considering include providing decryptor keys to ransomware victims or even seizing servers used to launch cyber attacks.
Zach Marzouk is a former ITPro, CloudPro, and ChannelPro staff writer, covering topics like security, privacy, worker rights, and startups, primarily in the Asia Pacific and the US regions. Zach joined ITPro in 2017 where he was introduced to the world of B2B technology as a junior staff writer, before he returned to Argentina in 2018, working in communications and as a copywriter. In 2021, he made his way back to ITPro as a staff writer during the pandemic, before joining the world of freelance in 2022.
-
Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward
News The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.
-
Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack
News The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector
-
Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities
News The attack on IT systems supplier Miljödata has impacted public sector services across the country
-
A notorious hacker group is ramping up cloud-based ransomware attacks
News The Storm-0501 threat group is refining its tactics, according to Microsoft, shifting away from traditional endpoint-based attacks and toward cloud-based ransomware.
-
Security researchers have just identified what could be the first ‘AI-powered’ ransomware strain – and it uses OpenAI’s gpt-oss-20b model
News Using OpenAI's gpt-oss:20b model, ‘PromptLock’ generates malicious Lua scripts via the Ollama API.
-
Data I/O shuts down systems in wake of ransomware attack
News Regulatory filings by Data I/O suggest the costs of dealing with the attack could be significant
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos