FBI asks private sector for advice on ransomware attacks
The “Ransomware Summit” opens lines of communication between corporate and government

Over 100 public-sector ransomware attacks were reported in the US in 2019, roughly double the amount in 2018. The actual number of attacks, however, is likely much larger; many are never reported to federal law enforcement.
Jackson County, Georgia paid $400,000 in March to retrieve the county's data from the hackers that stole it, rather than rebuild its networks altogether. The city of Riviera Beach, Florida, paid $600,000 in a similar case in June. These are just two of the many poorly-secured local governments, businesses, and schools that have been forced to hand over millions of dollars to hackers who can buy ransomware as a service kits for cheap on the dark web.
In an effort to respond to the problem, the FBI quietly invited corporate ransomware experts to a two-day, closed-door conference in September. It was an unprecedented admission by the federal agency that it must rely on the private sector for more data to better investigate ransomware cases.
FBI cyber division section chief Herb Stapleton said the goal of this "Ransomware Summit" was for corporate executives to "help us fill in some of the gaps in the intel" on ransomware threats: "There are probably thousands of attacks every year that aren't reported to the FBI."
The most popular ransomware strains targeting UK businesses Ransomware attacks on UK businesses soar 195% 40% of cybersecurity professionals think paying ransomware demands should be illegal
One executive estimated that the companies in attendance represented more than half of key responders to enterprise ransomware attacks. Among them were representatives from tech giant IBM and law firm Kroll, sharing their knowledge from tracking attackers to helping victims recover. Additionally, cyber insurance companies and a cryptocurrency-tracing Silicon Valley startup claimed seats at the table.
Many details from the summit fall under the "TLP Amber" designation, which prohibits attendees from sharing sensitive information. However, Stapleton told CyberScoop that the FBI requested executives to anonymise victim data and share it with federal officials to "round out" the bureau's picture of the threat.
According to Stapleton, executives asked for a list of the types of information they could provide the FBI to assist in future investigations. In exchange, the bureau updated them on the current climate of ransomware threats.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Some of these private-sector entities have a lot broader reach than the FBI does," Stapleton admitted. "They have clients who are already concerned with these types of things and there's an opportunity [via the conference] for a unified message about instituting proper back-up protocols for your data."
One attendee, Coveware CEO Bill Siegel, praised the conference for fostering cooperation between federal and private ransomware specialists. Such discussions, he said, can "greatly augment investigations [and] recovery".
Stapleton agreed that the forum will lay the foundation for more thorough discourse between federal officials and the private sector on how to respond to future ransomware threats.
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
LockBit data dump reveals a treasure trove of intel on the notorious hacker group
News An analysis of May's SQL database dump shows how much LockBit was really making
-
‘I take pleasure in thinking I can rid society of at least some of them’: A cyber vigilante is dumping information on notorious ransomware criminals – and security experts say police will be keeping close tabs
News An anonymous whistleblower has released large amounts of data allegedly linked to the ransomware gangs
-
It's been a bad week for ransomware operators
News A host of ransomware strains have been neutralized, servers seized, and key players indicted
-
Everything we know about the Peter Green Chilled cyber attack
News A ransomware attack on the chilled food distributor highlights the supply chain risks within the retail sector
-
Scattered Spider: Who are the alleged hackers behind the M&S cyber attack?
News The Scattered Spider group has been highly active in recent years
-
Ransomware attacks are rising — but quiet payouts could mean there's more than actually reported
News Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents go away.
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.