US to give ransomware 'terrorism' status

Department of Justice will require all ransomware cases to be centrally coordinated via Washington

The US Department of Justice (DoJ) is elevating ransomware investigations to a similar status as terrorism, following critical attacks across the country, such as the Colonial Pipeline hack. 

On Thursday, internal guidance sent to US attorney's offices across the country said that ransomware investigations in the field should be centrally coordinated with a new task force in Washington, according to Reuters

All investigating officers will be expected to share both updated case details and active technical information with the officials in Washington, with further stipulations to included other investigations around cyber crime. 

"It's a specialised process to ensure we track all ransomware cases regardless of where it may be referred in this country, so you can make the connections between actors and work your way up to disrupt the whole chain," said John Carlin, the principal associate deputy attorney general at the DoJ.

The change comes amid growing concerns about the rise of ransomware cases, particularly in the US. Last month, a suspected Russian-based group hacked into the Colonial Pipeline operator and locked its system down with a demand for ransom. The incident lasted several days and led to a spike in gas prices, panic buying and localised fuel shortages. 

Related Resource

Four ransomware resiliency challenges you can combat with confidence

The benefits of a multi-layered security solution

Windows of a high rise building - Four ransomware resiliency challenges you can combat with confidence - whitepaper from VeritasDownload now

"The US government is absolutely right to raise the fight against cybercriminals to the same level as its efforts against violent extremism, with attacks in recent months highlighting the devastating impact that ransomware can have," said Dr Francis Gaffney, director of threat intelligence and response at the cybersecurity firm Mimecast.

"These attacks can have massive ramifications for organisations such as downtime and loss of productivity. Our research also showed that 33% of UK businesses affected by ransomware suffered between two and three days of downtime, with business disruption (38%), impact on employee productivity (35%), and data loss (29%) the most common consequences"

Featured Resources

How to choose an AI vendor

Five key things to look for in an AI vendor

Download now

The UK 2020 Databerg report

Cloud adoption trends in the UK and recommendations for cloud migration

Download now

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

Download now

The impact of AWS in the UK

How AWS is powering Britain's fastest-growing companies

Download now

Recommended

FBI still frowns on ransomware payments
ransomware

FBI still frowns on ransomware payments

11 Jun 2021
New ransomware targets unpatched Microsoft Exchange servers
ransomware

New ransomware targets unpatched Microsoft Exchange servers

1 Jun 2021
Cyber attacks on manufacturing up 300% in a year
Security

Cyber attacks on manufacturing up 300% in a year

11 May 2021
Hackers used SonicWall zero-day flaw to plant ransomware
ransomware

Hackers used SonicWall zero-day flaw to plant ransomware

30 Apr 2021

Most Popular

Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021
Fastly blames software bug for major outage
public cloud

Fastly blames software bug for major outage

9 Jun 2021
GitHub to prohibit code that’s used in active attacks
cyber security

GitHub to prohibit code that’s used in active attacks

7 Jun 2021