FBI still frowns on ransomware payments
Even though major companies are paying millions in ransom, the FBI’s policy hasn’t changed
In just the past month, major companies have made multimillion-dollar payments to ransomware hackers to get their systems back online. But even so, the FBI still discourages ransomware victims from paying up.
"It is our policy, it is our guidance, from the FBI, that companies should not pay the ransom for a number of reasons," FBI director Christopher Wray testified Thursday before the House Judiciary Committee.
For one thing, the FBI believes paying these ransoms only encourages more cyber attacks. For another thing, companies or governments that pay millions to hackers still might not get their data back, "and that's not unknown to happen," Wray said.
Ransomware is one of the biggest cyber security threats facing businesses today. It's a type of malware that attackers can use to lock a device or encrypt its contents so they can extort money from the owner or operator.
Given its potential to deliver a high return on investment and the relative ease at which it can spread, this type of attack has become extremely popular among cyber criminals.
Just recently, two major ransomware cases have illustrated the dangers:
On Wednesday, JBS Foods, the world's largest meat processor, confirmed it paid an $11 million ransom to hackers who compromised its IT systems late last month. The company, which produces close to a quarter of the US' beef, fell victim to a ransomware attack on May 30. The firm was forced to suspend all affected systems and, in some areas, shut down production for 24 hours.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Last month, Colonial Pipeline, which transports nearly half the fuel consumed on the East Coast, confirmed the company paid $4.4 million to cyber criminals who launched a ransomware attack against it earlier in the month.
The Department of Justice ended up recovering $2.3 million of that ransomware payment by tracking Bitcoin transfers.
FBI Director Wray told Congress on Thursday that, in addition to helping companies that way, the FBI has sometimes obtained hackers' encryption keys and unlocked the seized data without paying a dime.
RELATED RESOURCE
Defend your organisation from evolving ransomware attacks
Learn what it takes to reduce risk and strengthen operational resiliency
"There are a whole bunch of things we can do to prevent this activity from occurring, whether they pay the ransom or not, if they communicate and coordinate and work closely with law enforcement right out of the gate," he said. "That's I think the most important part."
Last week, the Justice Department announced it was elevating ransomware investigations to a similar status as terrorism. Internal guidance sent to US attorney's offices across the country said ransomware investigations in the field should be centrally coordinated with a new task force in Washington, DC.
-
Dell PowerRack launches at Dell Technologies World 2026 as a ‘turnkey’ networking, storage, and compute system for AIThe newly announced solution is designed to help organizations get up and running at super speed
-
Dell unveils Deskside Agentic AI at Dell Technologies World 2026News Deskside Agentic AI is the latest in the Dell AI Factory with Nvidia stable, with the company saying it further demonstrates its end-to-end enterprise AI capability
-
Instructure chose to a pay ransom following the Canvas cyber attack – research shows more than half of security leaders would follow suitAnalysis Opting to pay ransoms creates huge risks for enterprises – you’re relying on the word of criminals
-
Ransomware negotiator sentenced for role in major cyber crime groupNews Deniss Zolotarjovs was a key player in a group associated with Conti
-
Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitationNews A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation
-
Security leaders overconfident about ransomware recoveryNews Few manage to recover all their data, and many experience business disruption
-
German authorities want your help finding the hackers behind GandCrab and REvilNews Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos