CRI members affirm the importance of strong and aligned messaging discouraging paying ransomware demands. Credit: Zach Copley The members of the International Counter Ransomware Initiative (CRI) have agreement a joint policy statement declaring that member governments should not pay ransoms demanded by cybercriminal groups. The agreement was announced during the third CRI summit in Washington, D.C this week. CRI members affirmed the importance of strong and aligned messaging discouraging paying ransomware demands and leading by example, endorsing a statement that relevant institutions should not pay ransomware extortion demands. Members also agreed to the creation of a shared blacklist of wallets through the US Department of the Treasury's pledge to share data on illicit wallets used by ransomware actors. The 50 members of the CRI include Australia, Canada, India, the UK, and the US as well as the European Union (EU) and INTERPOL. The debate around whether it is ever right to pay ransoms in the wake of a ransomware attack in a contentious one. On the one hand, it can be seen as funding malicious activity without any guarantee than payments will see stolen or encrypted data returned to victims. On the other, it may be considered a victim's only feasible option to maintain operations by regaining access to information and systems. Last year, the UK's National Cyber Security Centre (NCSC) and data protection regulator the Information Commissioner's Office (ICO) issued a joint letter to the Law Society urging lawyers to warn their clients against paying cybercrime ransoms. The guidance followed a rise in ransomware payments being made by businesses and emphasized the stance of both the NCSC and ICO that payment of a ransom will not keep data safe or be viewed as mitigation. CRI members commit to building collective resilience to ransomware During the third CRI gathering, members reaffirmed a joint commitment to building a collective resilience to ransomware, cooperating to undercut the viability of ransomware and pursuing the actors responsible, countering illicit finance that underpins the ransomware ecosystem, working with the private sector to defend against ransomware attacks, and continuing to cooperate internationally across all elements of the ransomware threat, read a White House statement. Members will work toward attaining a comprehensive understanding of the ransomware threat by sharing information and exchanging knowledge through virtual seminars and labs, with plans to create and share resources to build national counter-ransomware capacity, working to develop practical tools for governments to prevent, respond to, and recover from ransomware attacks, it added. The ICR Task Force - established at least year's meeting - will also continue to support transnational operations conducted by its members and collaborate with industry to target disruptive activities at key components of ransomware ecosystem, in recognition that ransomware is a cross-border and cross-sectoral threat that necessitates close collaboration across governments and sectors to be effectively combatted, the statement continued. Related content news Is China waging a cyber war with Taiwan? Nation-state hacking groups based in China have sharply ramped up cyberattacks against Taiwan this year, according to multiple reports. By Gagandeep Kaur Dec 01, 2023 4 mins Cyberattacks Government Government news Apple patches info-stealing, zero day bugs in iPads and Macs The vulnerabilities that can allow the leaking of sensitive information and enable arbitrary code execution have had exploitations in the wild. By Shweta Sharma Dec 01, 2023 3 mins Zero-day vulnerability feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff Dec 01, 2023 6 mins Technology Industry IT Skills Events news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware Malware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe