Australian firms could be forced to declare ransom payments
The ransomware bill was introduced by an opposition legislator in the wake of numerous global attacks
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
A bill has been introduced into the Australian House of Representatives that requires organisations to disclose when they make ransomware payments.
The Ransomware Payments Bill 2021 was introduced on Monday by Labour Shadow Assistant Minister for Cyber Security Tim Watts, who said there was an “urgent need for this bill”.
The bill requires entities who make a ransomware payment to notify the Australian Cyber Security Centre (ACSC) of key details of the attack, the attacker, and the payment.
The information will be used to share de-identified information to the private sector through the ACSC’s threat-sharing platform, to collect and share information that may be used by law enforcement, and to inform policymaking and track the effectiveness of policy responses.
“The ransom payment notification scheme created by this bill is the starting point for such a comprehensive plan to tackle ransomware,” said Watts. “It will require large businesses and government entities that choose to make ransomware payments to notify the ACSC before they make the payment.”
Watts added that this information it will provide a “fuller picture of ransomware attacks in Australia and the scale of the threat”. The minister also underlined that ransoms should not be paid as it does not guarantee an organisation can restore its systems quickly or prevent further disruption and “it does not guarantee your data won’t be leaked”.
RELATED RESOURCE
He added that where an organisation feels “compelled” to make a ransom payment, the government should be involved.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The minister used examples of various ransomware attacks in the last 12 months, including the Colonial Pipeline hack in the US which led to fuel shortages, an attack on Australian broadcaster Nine Entertainment which disrupted its ability to broadcast, and the attack on JBS Foods which paralysed the company that employs 11,000 Australians on 47 sites.
Earlier this month, JBS Foods ended up paying an $11 million (£7.8 million) ransom to hackers who compromised its IT systems last month. It made the payment in Bitcoin and CEO Andre Nogueira said it was a “difficult” decision to make. The company also confirmed that at the time of payment, the vast majority of its facilities were operational.
Zach Marzouk is a former ITPro, CloudPro, and ChannelPro staff writer, covering topics like security, privacy, worker rights, and startups, primarily in the Asia Pacific and the US regions. Zach joined ITPro in 2017 where he was introduced to the world of B2B technology as a junior staff writer, before he returned to Argentina in 2018, working in communications and as a copywriter. In 2021, he made his way back to ITPro as a staff writer during the pandemic, before joining the world of freelance in 2022.
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen


