26.11.2023 Views

CM December 2023

THE CICM MAGAZINE FOR CONSUMER AND COMMERCIAL CREDIR PROFESSIONALS

THE CICM MAGAZINE FOR CONSUMER AND COMMERCIAL CREDIR PROFESSIONALS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ransomware can also be used to manipulate victims into<br />

complying with demands for other criminal purposes, or<br />

to advance personal or political agendas. Ransomware<br />

therefore represents risks to individuals, to businesses,<br />

and even to national security.<br />

organisation involved in facilitating the payment (such as<br />

a financial institution acting in its transactional capacity on<br />

behalf of the victim) to other civil and criminal liability.<br />

The distinction may be subtle, but it’s crucial. Civil liability<br />

could include breaches of data protection legislation,<br />

contractual breaches (financial institutions may have<br />

contractual obligations with customers or business partners<br />

that require them to maintain certain security standards and<br />

promptly report security incidents) and regulatory breaches.<br />

Criminal liability, such as money laundering offences, could<br />

arise if the ransomware attack involves the receipt or transfer<br />

of funds that are the proceeds of criminal activity. Deliberately<br />

concealing a ransomware attack or impeding a criminal<br />

investigation could amount to obstruction of justice. And, in<br />

some case, failing to report a ransomware attack that affects<br />

the financial institution's customers or ongoing operations<br />

could result in the commission of a fraud or misrepresentation.<br />

It should be remembered that every ransomware attack that<br />

is hushed up – with no investigation, information-sharing or<br />

lesson-learning – makes other attacks more likely; that as well<br />

as the risk of civil and criminal liability, financial institutions<br />

involved in ransomware attacks or making ransom payments<br />

could be under a regulatory obligation to report cyberattacks;<br />

and liability for financial services organisations can result from<br />

ransomware even where, on the face of it, data may not (yet)<br />

have been stolen or leaked. The NCSC and ICO recommend<br />

that as soon as there is any intimation of a ransomware attack,<br />

organisations should assume that data has been compromised.<br />

Ransomware and sanctions<br />

The UK operates a cyber sanctions regime that includes<br />

regulations such as the Cyber (Sanctions) (EU Exit) Regulations<br />

2020, aimed at furthering the prevention of cyberthreats like<br />

ransomware. The regulations provide for the imposition of<br />

asset freezing and travel bans on persons involved in relevant<br />

cyberactivity. Other UK sanctions, known as sectoral sanctions,<br />

can restrict and prohibit certain activities, such as the transfer<br />

of funds to or from other jurisdictions.<br />

continues on page 22 ><br />

Brave | Curious | Resilient / www.cicm.com / <strong>December</strong> <strong>2023</strong> / PAGE 21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!